Posts

Showing posts from February, 2020

The novel DNS protocol helps Mozart Malware evade detection

Image
The nasty Mozart Malware has made a major comeback in the cyber-world. Yes, the devious malware known for infecting the Home Depot Inc, United States & breaching data is now using a novel DNS protocol to communicate with the remote hackers. This new DNS Protocol is also being used by Mozart Malware to remain under the radar of security solutions & other intrusion detection systems. Read on to know more about this backdoor malware. The First Attack of Mozart Malware Mozart malware made its first appearance in September 2014 after it hacked the Home Depot Inc., United States. According to the sources, this earlier unknown & unseen malware was specifically crafted to attack the Home Depot, the largest home development vendor in the United States. The word “Mozart” was observed in the software’s malicious code& it is suspected to have connections with the hacker’s system, the sources state. Read Full Article

Coronavirus Phishing Attacks –WHO Impersonators scamming public to steal data

Image
Coronavirus or COVID-19 outbreak has terrified people all over the world. Global Tourist movement saw a decline due to new coronavirus cases popping up in different countries. Scammers saw this as an opportunity & initiated coronavirus phishing attacks to steal personal data. Security researchers from a leading cyber security firm discovered the cyber attack which is a variant of email phishing scams. Criminals impersonate WHO officials & issue fraud and false statements in the email stating a COVID-19 alert or safety precautions. Accessing such emails laden with malicious links & attachments will result in exposing your precious information like usernames & passwords to hackers. WHO has already declared COVID-19 as a Global Public Health Emergency & issued safety precautions on their official website. However, scammers are utilizing the scepticism surrounding coronavirus. Thus, they are running a phishing campaign which lures people into exposing

How to remove Noos Ransomware from your system?

Image
.Noos Ransomware is the 169 th Variant of the infamous STOP/Djvu Ransomware. This brand-new DJVU strain is currently posing a great threat to the computer users around the world. Just like its variants, Noos Virus uses multiple channels to propagate its infection such as Spam E-mail Campaigns, malvertising & fake software updaters. The novel Noos File Virus has been designed with strong financial motives. The evident sign of .Noos Ransomware infection is           The encryption of files &           Appearance of .Noos Extension at the end of the encrypted file names. Once the targeted file extensions are encrypted, they are instantly made unusable. Users are prevented from accessing/opening the files. Read full article

How to remove ZUpdater.exe Trojan from your system?

Image
Guide to Remove ZUpdater.exe Trojan - ZUpdater.exe Trojan is a nasty threat to the Windows OS based devices. It uses the infected system’s resources to generate illicit crypto currency without the user’s permission or knowledge. Software Bundling & Free Programs are the prime methods used by ZUpdater.exe Trojan to proliferate its infection. Some of the free downloads offered on the internet do not reveal if other software is being installed in the background. Thus, they easily make their way into the system without user’s consent. Once ZUpdater.exe virus is installed, it consumes over 90% of the CPU’s power & graphics card power of the targeted system. This way, it makes the system extremely sluggish & deteriorates the performance of the PC. According to cyber-security analysts, while the system is running slow, hackers use computer’s resources to generate illicit revenue for themselves. Victims from around the world are looking for ways to remove

Shlayer Malware | The devastating threat to Mac OS

Image
Traditionally, Mac machines are considered more secured than PCs. However, the attack of the devious Shlayer malware proves that even Mac OS are vulnerable to malware attacks. Shlayer Malware first surfaced to lime-light as a nasty menace to Apple Macs in the February 2018. The cyber-security analysts were able to collect over 32,000 distinct samples of Shlayer Mac Trojan from around 143 malicious Command & Control server domains. Since then it has become one of the most common & wide-spread threats on the MacOS platform. In 2019, Shlayer is known to have infected one out of every 10 Mac Devices.   The residents of countries such as France, Germany, the United States & the United Kingdom are known to be prime target of Shlayer Malware. Read on to know more about this nasty threat. What is Shlayer?