Shamoon: Back from the dead and destructive as ever

Malware hit targets in Saudi Arabia and was configured to wipe disks on November 17. Twitter Card Style:  summary Shamoon (W32.Disttrack), the aggressive disk-wiping malware which was used in attacks against the Saudi energy sector in 2012, has made a surprise comeback and was used in a fresh wave of attacks against targets in Saudi…

Read More

Mirai: New wave of IoT botnet attacks hits Germany

New variant of malware used in attacks that knocked 900,000 home internet users offline. Blog Feature Image:  exploit_skull.jpg Twitter Card Style:  summary A new wave of attacks involving the Mirai botnet has crippled internet access for nearly a million home users in Germany. The latest attacks used a new version of the Mirai malware (Linux.Gafgyt.B)…

Read More

Gatak: Healthcare organizations in the crosshairs

Mysterious threat group infects organizations using malicious key generators for pirated software. Twitter Card Style:  summary The group behind the Gatak Trojan (Trojan.Gatak) continues to pose a threat to organizations, with the healthcare sector in particular heavily affected by attacks. Gatak is known for infecting its victims through websites promising product licensing keys for pirated…

Read More

Android banking malware whitelists itself to stay connected with attackers

New Android.Fakebank.B variants use social engineering to bypass a battery-saving process and stay active in the background. Twitter Card Style:  summary Recent variants of Android.Fakebank.B have been updated to work around the battery-saving process Doze. The variants display a pop-up message asking the user to add the threat to the Battery Optimizations exceptions whitelist. read…

Read More

Latest Intelligence for October 2016

Number of new malware variants rises to over 96 million and global spam hits highest rate in nearly a year. Twitter Card Style:  summary Some of the key takeaways from October’s Latest Intelligence, and the threat landscape in general, include a sudden spike in new malware variants, spam reaching the highest rate in almost a…

Read More

New BEC scams seek to build trust first, request wire transfer later

Business email compromise scammers have gradually changed their tactics to improve their scam success rate. Twitter Card Style:  summary Symantec has been continuously tracking scam emails targeting businesses with fake wire transfer requests, and found that scammers behind these Business Email Compromise (BEC) emails have added some tricks to increase their chances of success. Click…

Read More

Microsoft Patch Tuesday – November 2016

This month the vendor is releasing 14 bulletins, six of which are rated Critical. Twitter Card Style:  summary Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor is releasing 14 bulletins, six of which are rated Critical. As always, customers are advised to follow these security best practices: read…

Read More

Android ransomware gets around auto-start restrictions by pretending to be a launcher

The latest Android.Lockscreen variants declare their activity as part of the launcher category to get around Android's security restrictions. Twitter Card Style:  summary New variants of Android.Lockscreen are using a simple, yet effective technique to improve their chances of successfully compromising devices. Click to Tweet:  Android.Lockscreen variant masquerades as launcher to sidestep security restrictions Click…

Read More

Flash zero-day being exploited in targeted attacks

Adobe patches vulnerability (CVE-2016-7855) which was being used in a limited number of targeted attacks. Twitter Card Style:  summary A newly discovered zero-day vulnerability in Adobe Flash player is being exploited by attackers in the wild. Adobe released a Security Bulletin (APSB16-36) yesterday which patches the vulnerability (CVE-2016-7855). read more Source: Symantec

Read More