malware

General Malware Spam - You have received a new fax message

Fax or malware? This is clearly malware.




malware

General Malware Spam - Homicide Suspect

From payroll to fax to a homicide suspect. Where do these spammers get their inspiration from?





malware

Malware Sample Reporting Form

It came to our attention that our malware sample reporting form was rejecting submissions for quite some time now. The problem has been resolved and members of the public may once again use this form to submit malware samples to us. We apologize for any inconvenience caused.




malware

Users are urged to get malware protection immediately

Due to a sharp increase in malware related spam, we urge everyone to make sure that their computers are adequately protected against malware attacks. If you don't have protection against malware, we strongly suggest an Internet Security suite. Feel free to contact us if you need any information about malware protection. You might also want for check out the latest examples of malware spam e-mails.




malware

Aria-body Malware

Aria-body virus removal guide

What is Aria-body?

Aria-body is a piece of malicious software, also known as Aria-body RAT (Remote Access Trojan). RATs allow remote access and control over an infected machine. Aria-body malware has various abilities/features that enable likewise varied misuse. It has been observed being employed primarily for stealing information; this trojan can locate and exfiltrate specific data. This malicious program has been used for espionage, extensively targeting the APAC (Asia Pacific) region. Aria-body has been leveraged against governmental institutions (e.g. science and technology, foreign affairs ministries, government-owned companies, etc.) of Australia, Indonesia, Brunei, Philippines, Vietnam, Myanmar and Thailand.




malware

COVID-Themed Lures Target SCADA Sectors With Data Stealing Malware

A new malware campaign has been found using coronavirus-themed lures to strike government and energy sectors in Azerbaijan with remote access trojans (RAT) capable of exfiltrating sensitive documents, keystrokes, passwords, and even images from the webcam. The targeted attacks employ Microsoft Word documents as droppers to deploy a previously unknown Python-based RAT dubbed "PoetRAT" due to




malware

New Android Malware Steals Banking Passwords, Private Data and Keystrokes

A new type of mobile banking malware has been discovered abusing Android's accessibility features to exfiltrate sensitive data from financial applications, read user SMS messages, and hijack SMS-based two-factor authentication codes. Called "EventBot" by Cybereason researchers, the malware is capable of targeting over 200 different financial apps, including banking, money transfer services,




malware

New Malware Jumps Air-Gapped Devices by Turning Power-Supplies into Speakers

Cybersecurity researcher Mordechai Guri from Israel's Ben Gurion University of the Negev recently demonstrated a new kind of malware that could be used to covertly steal highly sensitive data from air-gapped and audio-gapped systems using a novel acoustic quirk in power supply units that come with modern computing devices. Dubbed 'POWER-SUPPLaY,' the latest research builds on a series of




malware

New Coronavirus Strain? Nope, Just Hackers Trying to Spread Malware

The hackers have been using files and emails that warn about a new coronavirus strain to trick users into opening them. Doing so can secretly deliver malware to the victim's machine.




malware

Malware Steals Data By Adjusting Screen Brightness

Malware on an air-gapped computer can transmit data like Morse code by changing screen brightness in a way that's invisible to the naked eye but easily recorded with a camera.




malware

Newly Discovered Mac Malware Uses Fileless Technique







malware

Facebook Vulnerable To Critical XSS, Could Lead To Malware Attacks









malware

Cisco Plugs VoIP Malware Loophole








malware

IoT Malware Forces Wi-Fi Routers To Join Botnet Army




malware

Sneaky Malware Disguises Itself As An Adobe Flash Installer






malware

IBM Warns Of Malware On USB Drives Shipped To Customers











malware

Games Of Thrones Has The Most Malware Of Any Pirated TV Show







malware

LookBack Malware Targeting Utility Sector





malware

Malware Analysis Part I

Malware Analysis Part I - This guide is the first part of a series of three where we begin with setting up the very foundation of a analysis environment; the analysis station. It will give the reader a quick recap in the different phases of malware analysis along with a few examples. It will then guide the reader in how to build an analysis station optimized for these phases. Along with this, the guide also introduces a workflow that will give the reader a good kick-start in performing malware analysis on a professional basis, not only on a technical level.




malware

COVID-19 Malware Wipes Your PC And Rewrites Your MBR




malware

Box Adds Automated Malware Detection To Box Shield