Posts

Showing posts from December, 2019

Guide to Remove Yahoo Search Redirect-

Image
Cyber security analysts have recently discovered that Yahoo Search Engine is being utilized by the cyber-criminals to generate illicit revenue by driving searches to search.yahoo.com . While Yahoo Search is a legitimate search provider, cyber threat-actors are able to succeed in their deceitful motives with the help of nasty browser hijackers. These browser hijackers such as oursurfing, istartsurf & istart123 cause Yahoo Search Direct i.e. it diverts the web-searches to search.yahoo.com without user’s consent. Software Bundling is known to be the prime method of its distribution. Once the system is infected, the browser hijacker changes the new tab functionality, home-page & default search engine settings without user’s permission. The altered settings are assigned to Yahoo Search Engine. In addition to that, the malware installs certain applications named as “helper objects” on the infected system that prevents the user from restoring the default settings.

Hackers Used Nasty Python RAT, PyXie to deliver Ransomware

Image
The cyber security researchers at Blackberry Cylance recently discovered a highly sophisticated hacking campaign targeting educational & healthcare organizations. The operation behind this attack was previously unknown; however, it has been named as PyXie by the researchers. According to the tech reports, PyXie first surfaced to lime-light in year 2018. It remained under the radar of the cyber security industry until December 2019. Python RAT or PyXie is a Python based Trojan that is currently being employed in a hacking operation by cyber criminals. This nasty malware gives the attackers illicit access to Windows based systems, thus enabling them to monitor the activities of targeted system & steal sensitive information of the user. Detailed analysis conducted by the researchers reveals that Python RAT is working in conjunction with Cobalt Strike beacons & a downloader. It also bears behavioral similarities to a pernicious Banking Trojan named

RIPlace Evasion Technique exploits Windows 10 and antiviruses

Image
Ransomware attacks are getting common nowadays. The ability to change a few lines of code and emulate the same ransomware with different names makes it a deadly weapon for hackers. A similar process known as RIPlace Evasion technique was discovered by leading security researchers at the endpoint protection firm Nyotron. This method is effective against devices that run the latest computer security solutions and updated system patches. Read on to know more about this advanced ransomware technique . How does the RIPlace Evasion Technique Work? RIPlace Evasion technique was discovered by Cybersecurity experts in Nyotron around the spring of 2019. During that time, this new ransomware bypass method was not taken seriously since it was not being used for Ransomware attacks . However, the whole process is catastrophic for computing devices. Here is how it works: Almost all ransomwares function by opening and reading the files. Then the files are encrypted and th

Scarab Ransomware- Another Strain Strikes Cyber World

Image
Firstly discovered in June 2017, the infamous Scarab Ransomware made its major comeback on 22 nd August 2019. This new found Scarab variant encrypts the targeted file extensions by employing highly-complex Encryption Algorithms – AES-256 & RSA-2048. It then appends the file names with .dom extension. Once the files are encrypted, it drops a ransom-demanding note, “ How to decrypt files.txt ” in every folder that contains Scarab files. Numerous other versions that are spreading at an alarming rate around the world include Scarab-Recovery, Scarab-Turkish, Scarab-Barracuda & .anonimus.mr@yahoo.com. The victims are looking for ways to remove Scarab ransomware from their system & recover the encrypted files. Let us take an insight into the threat behaviour of Scarab & tips to protect your system against its attack. The Ever-Evolving Threat to Cyber World – Ransomware Ransomware has been a prominent threat to enterprises & individuals alike s

MegaCortex Ransomware | Guide to remove it from system

Image
Introduction MegaCortex Ransomware, a nasty,enterprise-focusedsystem infection has resurfaced in the United States, Canada and parts of Europe.Research reveals that this malevolent crypto viral extortion is reportedly deployed against large corporate networks & workstations.It has been retooled to become a weapon of wide scale attacks. For those who are not aware of MegaCortex, let us sneak a peek into the original version of MegaCortex  Ransomware . Original Version of MegaCortex Ransomware MegaCortex Ransomware was first spotted earlier this year targeting enterprise networks. The malicious program was distributed by gaining access to the system networks. It encrypted all the files in the system & renamed it with .megacortex  extension. Originally, this ransomware contained a payload that was protected by a password. Though this feature made reverse engineering of its payload a cumbersome task, it also made its widespread distribution a challenge. To