Vawtrak Malware: Expands The Capability In Newer Version

Malware Developers are always on the hunt for new methodology to exploit computers and attack them in a ways that undermine the abilities to detect and remove such viruses. In the latest accomplishment of computer hackers and cyber criminals, they use new targets and expand capabilities to deliver Vawtrak Trojan virus.

Vawtrak malware

Security researchers found that, Vawtrak Malware has came with expansion to include social networks, analyst firms, online retailers and Game portal across different countries including Canada, U.K and the United States. In addition, a newer version of Vawtrak botnet have advanced web injects that enables the cyber culprits to theft of additional personal information for exploiting the compromised account. However a modified version of the banking malware Vawtrak was discovered and considered to be among the most advanced threats. Vawtrak was first detected in June 2014, targeting users in the USA. Vawtrak is also known as Neverquest and part of the Gozi family of malware, classified as one of the most dangerous computer threats as Trojans. This malware is specially designed to target bank accounts of several users. The threat may gain unauthorized access to a number of platforms and systems and let cybercriminals perform their malicious goals. Vawtrak may expose your computer to a serious risk – including your personal information, e-mail credentials and user names and passwords for online accounts.

Read more

Rig Exploit Kit Is Now Focusing On Cryptocurrency Coinminers

The infamous Rig Exploit Kit is on its downfall and instead of focusing on Ransomware it is interested in Cryptocurrency Coinminers. The exploit kit was first detected in 2016 where it use to install threats on the targeted computer. The very malicious component was implicated in the distribution of trojan and ransomware. But at the end of 2016 its downfall has been reported and report unfold that it is now aiming to spread data stealing Trojans and cryptocurrency miners. However since 2017 Rig Exploit Kit was one of the most significant in the market of Exploit Kit and according to research reports it still contains vast majority of Exploit Kit traffic that is discover till now. But its downfall start dramatically and it has changed its interest.

Read more

Latest Computer Virus Design in 2018 And Malware Components

With the advancement in technology, there have been great improvement in the information technologies as well as in its use. Information technology where is proved to be a boon for the users, has also been proved as curse for them too. Not is the technology which is developed and has provided benefits to it’s users but computer viruses have also evolved and is continue to emerge as more powerful and more dangerous than ever before. Viruses are created with the only motive of damaging the entire computer system or to extort money from innocent users. Hackers are behind such scams that are conducted to earn illegal profits quickly and easily. Computer malware are growing rapidly with lots of improvement in their technology and infection mechanism.

Viruses are growing due to the creation of new types of malware and their delivery methods. However, still, most of the computer users receive a single executable file for viruses that can execute a predefined script behavior. In fact, the landscape of the computer malware is continuously changing as the next-generation malware programs are being developed. The current attack depicts entirely different manner of handling files. According to reports, it is found that hackers in form of virus infection can remain undetected on the PC for longer time. In this post, some contemporary virus design samples and essential malware components are described.

Read more

Security Breach By Cryptocurrency Miners: More Than Four Thousand Govt Sites Hacked World Wide

According to the report, more than four thousand sites including those of UK, US, and Australian Government were infected with cryptocurrency miners threat. The sites were affected for several hours on Sunday containing a secret code (Browsealoud plug-in) that mines cryptocurrencies through web browsers. Cryptocurrency Miners uses Browsealoud plug-in (a popular plugin used to improve accessibility online, reading out website content to users who are partially sighted or blind), has been used to infect entire website.

Moreover, the affected sites all use a fairly popular plugin Browsealoud, made by Brit biz Texthelp, which reads out webpages for blind or partially sighted people. This technology was infected in some way either by cyber hackers or rogue insiders changing Browsealoud’s source code to silently inject Coinhive’s Monero miner into every webpage offering Browsealoud. Anyone who visited a site that embedded Browsealoud inadvertently execute this hidden mining code on there PC for several hours, generating money for the miscreants behind the caper. A list of 4000 plus compromised web sites can be found here.

Read more

WannaMine Cryptoworm Forcefully Mines Monero Cryptocurrency

With the increasing value of cryptocurrency, the demand of mining cryptowarm has increases as well. Cryptocurrency miner malware has become the profitable and popular choice of cyber crooks. WannaMine is the latest name in this list which firs come in the attention of malware analyst in October 2017. This malicious threat has been used for mining cryptocurrency and according to cyber security experts the number of infection is rising day by day. These type of malware are so sophisticated that they easily get enter in the targeted system and designed so that victim can’t notice it easily in the system. One thing is clear that it will mess-up the targeted computer and put it in poor condition.

Read more

More Than Thousands Of WordPress Websites Attacked By Malware

Reportedly, more than 2,000 WordPress websites have been found compromised with a piece of cryptomining malware that acts as cryptocurrency miner and a keystroke logger. The malware is found to steal away the resources of visitor’s computers to mine digital currencies but logs visitor’s every keystroke as well. At Sucuri, security researchers discovered a suspicious malicious campaign that intends to target WordPress websites with the help of malign script that will deliver an in-browser cryptocurrency miner from CoinHive and a keylogger. The Sucuri team, few months ago, came up with a infection called “” malware. This malware is a CoinHive cryptominer concealed with Google Analytics and jQuery and the WordPress keylogger from Cloudflare[.]solutions.

Read more

Cryptocurrency Mining Malware Is Going To Create Trouble This Year

Mining Cryptocurrency has become latest trend of cyber criminals through which they generate income. But recently an unique cryptocurrency mining malware has found which targets browser. Today the value of Bitcoin is very high and the world of Bitcoin in under danger by malware which use to mine cryptocurrency. These malware are so sophisticated that they can make use of your computer even smartphone to carry out their malicious tasks which allow them to complete transaction of cryptocurrency. However there are several mining malware detected by cyber security researchers but this is a different kind of malware because it target Internet browser. Research also reveal that user’s whose favorite browser is Google chrome have to face this trouble.

Read more

Shark Ransomware : Delivering Wonking Payloads For Newcommers Cyber Crooks

A ransomware project called Shark, which is freely distributed on the Deep Web and recognized by Serbian security researchers GrujaRS. It was first observed in July 2016 rather than being Dark web, the Shark Ransomware is accessible through a WordPress website on the regular web. The worst thing of this malware is that, the author of this malware allow fraudsters to create a ransomware customized to their needs. The malware is a part of Raas. Shark Ransomware offers extortionists the ability to create their own ransomware without the need of any technical knowledge or experience.

The con artist provide a web form, after filling out and clicking on a button to create Shark Ransomware variant. Essentially, fraudsters can create a version of the Shark Ransomware that matches up to the kind of attack they want to carry out and then spread it using their own distribution methods. The developers of the Shark Ransomware RaaS keep 20% of any ransom collected by the con artists using the Shark Ransomware.

Read more

Russian Hackers Disguised Kelihos Trojan as Anti-Government Software

Kelihos Trojan virus is being widely distributed by hackers mostly attacking Russian nationals, making them to believe that the software is designed to attack online resources which belongs to US and Western governments. The apparently found malware appeals the victims to install the threat making them to believe that the only aim is to to retaliate against US imposed sanctions to Russia. But the fact is that, URL used in the malign message leads to Kelihos Trojan virus.

Read more

Ursnif v3 Banking Trojan Attacks : Targeting Small Australian Banks

According to a recent research from IBM, majority of new malware infections are in the form of a banker Trojan, mostly designed to steal online banking login credentials. Malware hackers are commencing new efforts to infect computer users with the notorious banking Trojan again which means user could be facing an epidemic of online banking theft.

PC security experts have noticed a new banking Trojan horse called “Ursnif v3” is on the scene to overtake online banking account credentials. Ursnif v3 was identified by the security firm IBM, variant of Ursnif Trojan attacks to target business and corporate banking customers in Australia. Through their research, they found that Ursnif v3 is based on the same malcode of the original Ursnif Trojan (aka Gozi ISFB), but features some modifications on the code injection level and to attack tactics. So far, it has been seen that the internal build number of the Trojan has also been updated to fit this new version and is currently set to Ursnif v3. However, it should be noted that the previous build, Ursnif v2, is also active in the wild.

Read more

1 2 3 8