Posts

Showing posts with the label malware campaign

FakeSpy Malware: Android Open Source compromised!

Image
FakeSpy Malware was first discovered by Trend Micro researchers in June 2018. FakeSpy aimed of compromising Android devices to purloin text messages, contacts, call records & bank account information of the users. Cyber criminals used SMS as a doorway to plunge Trojan in potential android devices. To your surprise, FakeSpy Malware also serves as a course for Banking Trojan. Based on the implications, researchers found that this Malware Campaign targeted South Korean users & has been in active mode since October 2017. The widespread Malware Campaign is now heavily vicious towards Japan & Korean Android Users and the bad guys smartly tuned the fake spy to modify its configuration as it conquers several countries. In the event, the targeted victims receive a mobile text message disguising as a legit message from Japan based Logistics Company. A mere click on the link in the SMS would redirect the innocent users to malignant web-page. The infected page contains a ...

GhostDNS Malware Compromised over 100,000 Routers in Brazil

Image
IT Security researchers have unmasked a new malware, GhostDNS, which has hacked over 100,000 residence routers & changed their DNS settings. This widespread DNS Trojan campaign aims at hacking the web-pages & stealing login credentials of the users. The newly discovered GhostDNS malware seems to be related to its scandalous predecessor, DNS Changer Malware that could turn the inconspicuous network router into a vital tool for hackers. The malware would tamper the router & its DNS settings. Following this successful vandalizing, malware would redirect the users to the malicious versions of the legitimate banking websites or other legit pages. This paves a way for the bad guys to steal user’s account credentials, PIN numbers & passwords! According to the report by CyberSecurity firm, Qihoo Netlab 360, GhostDNS is starting to grade up its efforts to gather sensitive information with a whole new bunch of scanners. In this event, the attackers try to curb the p...

Macro-based Attack Deploys Malware by Hijacking Desktop and Quick Launch Shortcuts

Image
Macro is a useful tool in the hands of Excel, Word and Power point users. A macro is a series of stored commands and functions that can be recalled to perform repetitive tasks. This enables user to carry out their routine tasks faster and reduce their time and efforts to a great extent. Not only this, Macros also facilitate users in creating graphs and charts, retrieving or transferring the data, sorting and clearing cell contents and much more.  As macro has become a valuable tool for users to carry out their routine tasks conveniently, cyber Miscreants have evolved innovative ways to deliver malware using macros. A recent case reveals that a new attack makes use of macros in a more roundabout way. Macros by default are disabled in recent versions of Microsoft office. However, the malicious documents delivered to users often contain text asking users to enable macro execution. Since this functionality is sometimes used legitimately in enterprise environments, some users mi...