Posts

Showing posts with the label Banking Trojan

Malvertising Scheme targets baleful ads on Yandex.Direct

Image
Yandex.Direct Compromised with Malvertising Attack   Cyber Crooks have recently been reported to exploit Yandex.Direct, a Russian Online Marketing Service via a malign advertising campaign. This  Malvertising scheme  is supplying malevolent ads & targeting a large number of Russian accountants with the sole motive of transmitting Ransomware &  Banking Trojans  to them. This colossal  Malvertising Attack  is propagating a plethora of malware that has specifically been designed to encipher user’s data & whip  Cryptocurrency . Cyber Security analysts from ESET, an IT Security Company headquartered in Slovakia, have found around 6 malware agendas associated with this ongoing  Malvertising scheme.  From the past few months the hacking group is targeting Russian organizations & using two renowned backdoors namely- Buhtrap & RTM along with Cryptocurrency Stealers &  Ransomware . The  Malvert...

How to Remove Panda Banker Trojan?

Image
Zeus Panda, Panda or Panda Banker  is a spin-off of the  Zeus Banking Trojan.  First seen in 2016 as one of the many variants that cropped up in the wake of the Zeus source code, Panda has fulfilled its function as a banking Trojan since then. Looking to harvest credentials of online banking, payments & other financial portals, the majority of its code is derived from the original Zeus Trojan. The Trojan is designed to target Windows Operating system & leverages man-in the browser/ web injects attack techniques to fulfill the purpose of stealing.  Zeus Panda follows its predecessor & hence primarily targets financial sector & crypto currency sites. In addition it expands its attack in different organization sectors like social networking sites, search, Email & adult sites. The attack strategy of this malware is more or less same with some minor modifications in dynamic configurations. The full arsenal of attack techniques adopted by  Pand...

How to Get Rid of Rotexy Mobile Trojan?

Image
Security researchers recently discovered a new member of Rotexy family that has casted attacks on over 70,000 Android devices in Russia, Germany, Ukraine & nearby countries. The Rotexy Banking Trojan uses three distinct communication channels to receive commands & is spreading through phishing links & enthralling texts sent via SMSs.  A recent security report revealed a Banking Trojan from the Rotexy Malware family that casted over 70,000 attacks in a period of three months. The attack of Rotexy Mobile Trojan primarily targeted the users in Russia & is continuously spreading its tentacles to carry out its pernicious motives. This new Rotexy Mobile Trojan is a blend of a Banking Mobile Trojan & a Ransomware Blocker that makes Rotexy a daunting threat. The security experts registered over 40,000 devious attempts of this Banking Trojan throughout the months of August & September. The baleful Trojan aimed at implanting a malicious app on Android smart ph...

FakeSpy Malware: Android Open Source compromised!

Image
FakeSpy Malware was first discovered by Trend Micro researchers in June 2018. FakeSpy aimed of compromising Android devices to purloin text messages, contacts, call records & bank account information of the users. Cyber criminals used SMS as a doorway to plunge Trojan in potential android devices. To your surprise, FakeSpy Malware also serves as a course for Banking Trojan. Based on the implications, researchers found that this Malware Campaign targeted South Korean users & has been in active mode since October 2017. The widespread Malware Campaign is now heavily vicious towards Japan & Korean Android Users and the bad guys smartly tuned the fake spy to modify its configuration as it conquers several countries. In the event, the targeted victims receive a mobile text message disguising as a legit message from Japan based Logistics Company. A mere click on the link in the SMS would redirect the innocent users to malignant web-page. The infected page contains a ...

Kronos Trojan hits the Banking Sector back with a new version

Kronos banking  Trojan  was first discovered in 2014. The malware capable of stealing banking credentials had its heydays back then. However, in 2016, suddenly the once daunting banking Trojan laid dormant and dropped off researchers’ hit list. Recent research reveals that the malware is back again with its revamped version. The Trojan did made to the headlines in 2017 but the attack samples appeared to be mild with limited activity. On 27 th  June 2018, the new variant got off the ground and is known to have launched four distinct campaigns since then targeting Germany, Japan and Poland and also one test campaign. The new Version of the Kronos Banking Trojan has been retooled with a few new incorporated features like a new command-and-control feature that is designed to work with an anonymizing network –  Tor . Tor is free software that enables anonymous communication. The software is intended to conceal Internet activity of the user to protect their privacy, gi...