New BBTok Banking Malware Generates Victim-Specific Payload
Banking malware is a malicious program that is mainly designed and used by threat actors to steal the following sensitive financial information from victims' computers or mobile devices:-
Login credentials
Banking details
These malware variants can be...
Chinese Hackers use .chm Files to Hijack Execution Chain and Deploy Malware
The Chinese state-backed group TAG-74 is known for conducting intelligence collection on organizations in the following countries:-
South Korea
Japan
Russia
The TAG-74 utilizes .chm files to trigger a DLL search order hijack execution chain and deploy malware...
ChatGPT-Powered Malware Analysis
In November 2022, OpenAI launched ChatGPT, an AI-powered chatbot. It's based on OpenAI's GPT-3 family of big language models, and users interact with it via queries.
An interactive online malware analysis sandbox ANY.RUN has recently introduced...
APT36 Using Customized Malware to Attack Indian Government Linux and Windows Servers
APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia and is strongly linked to Pakistan.
While this APT group is known for targeting the...
Interactive Malware Sandbox – Free File Analysis, Live Malware Hunting & Threat Intelligence
The versatility of malware sandboxes extends beyond behavioral analysis, making them a valuable assets in many contexts. The list of use cases grows even larger when you add a layer of interactivity provided by...
Loda Malware Attack Windows To Control RDP, Spread Malware, And Log User Inputs
Threat actors have been actively employing Loda, a remote access trojan (RAT) developed in AutoIT, an accessible language for automating Windows computer scripting.
The malware may deliver various harmful payloads in addition to keylogging, taking...
Detecting Malicious HTTP Traffic that Hides Under the Real Traffic
The malware generates malicious network behavior, often hiding it in HTTP traffic to avoid detection. So, in cyber security, detecting malicious traffic is one of the critical issues caused by malware.
However, besides this, all...
WiKI-Eve – Stealing Wi-Fi Passwords by Eavesdropping on Keystrokes
Mobile devices and apps play a growing role in user identification, but password theft, resembling identity theft, invites diverse eavesdropping attacks, including stealthy indirect ones using side-channels.
Indirect attacks, like those using side channels (acoustic,...
Threat Actors Modify Malware DGA Patterns to Improve C2 Communication and Complicate Analysis
A Domain Generation Algorithm (DGA) creates numerous domain names, serving as meeting points for malware C&C servers.
DGAs help malware evade security measures by generating new, random domains, making it challenging for victims to block...
Pandora Malware Attacks Android TVs via Firmware Updates and Pirated Videos
A new threat to Android devices named androidpandora has been identified that compromises the devices when pirated video content is installed or during firmware updates.
This malware belongs to the variant of Mirai Trojan, which...