Tech News
-
CCleaner Malware uses Secondary Backdoor to Infect Tech Companies
A group of unknown hackers, which hijacked CCleaner’s download server to distribute a malicious version of the system optimization software, targeted at least 20 major international technology companies with a secondary payload. Beginning of this week, when the hack was reported, researchers assured users that there’s no second stage malware used in the massive attack […]
-
New Email Campaign Sends Locky Ransomware to Millions of Users
Researchers from two security firms have independently spotted two mass email campaigns, spreading two different, but new variants of the Locky ransomware. Lukitus Campaign: Sends 23 Million Emails in 24 Hours The campaign found by researchers at AppRiver sent out more than 23 million messages containing the Locky ransomware, in just 24 hours on 28 […]
-
Millions of Email Addresses Exposed From SpamBot Server
A massive database of over 630 million email addresses used by a spambot to send large amounts of spam to has been published online in what appears to be one of the biggest data dumps of its kind. A French security researcher, who uses the online name Benkow, has spotted the database on an “open […]
-
Hackers Hijack Chrome Extension to Push Malware
Recently an extension for Google Chrome has been hacked, after compromising the Chrome Web Store account of a German developer team from a9t9 GmbH, and abused it to distribute spam messages to unsuspecting users. Named Copyfish, the extension allows users to extract text from images, PDF documents and video, and has more than 37,500 users. […]
-
The way Hackers Cash Out Thousands of Bitcoins Received in Ransomware Attacks
Digital currencies have emerged as a favorite method of payment, not only for regular folks, but also for hackers and cyber criminals, as digital currency transactions are nearly anonymous, allowing cyber criminals to use it in underground markets for illegal trading, and to receive thousands of dollars in ransomware attacks—WannaCry, Petya, LeakerLocker, Locky and Cerber […]
-
Microsoft Workplace Analytics
SoftwareMicrosoft Workplace Analytics Microsoft Just released a new monitoring tool, that allows company leaders to see how teams within their organization spend their time. The brand-new program, Microsoft Workplace Analytics is available for purchase as an add-on to the Office 365 Enterprise plans. According to the director of Microsoft Office 365, Alymn Rayani, ” the […]
-
New Petya Ramsom classified as Wiper Malware
The Petya ransomware attacks that has spread in several countries, including Russia, Ukraine, France, India and the United States on Tuesday, and demands $300 ransom, was not created with the purpose of restoring infected computers at all. Comae Technologies Founder Matt Suiche, who closely looked at the operation of the malware, said after analyzing the […]
-
Built-in Keylogger Discovered On Several HP Laptop Models
Your HP laptop may be silently recording everything you are typing on your keyboard. While examining Windows Active Domain infrastructures, security researchers from the Switzerland-based security firm Modzero have discovered a built-in keylogger in an HP audio driver that is spying on all your keystrokes. Keylogger is a program that records every keystroke by monitoring […]
-
Don’t Fall for Chrome and Firefox “HoeflerText Font Wasn’t Found” Banking Malware Scam
The malicious scam campaign, “The ‘HoeflerText’ font wasn’t found,” is back, which was previously targeting Google Chrome users to trick them into installing Spora ransomware on their computers. This time the campaign has been re-designed to target Mozilla Firefox users with a banking trojan, called Zeus Panda. Interestingly, the attackers behind this new campaign are […]