Virus / Malware

Retour à Sécurité

Malwarebytes

    • 1 novembre 2022LinkedIn introduces new security features to combat fake accounts
      LinkedIn knows it has a problem with bots and fake accounts, and has acknowledged this on more than one occasion. For years, it has been aware of spam, fake job offers, phishing, fraudulent investments, and (at times) malware, and has been trying to combat those issues. In 2018, LinkedIn rolled out a way to automatically detect fake accounts. It also gave users an inside l …

    • 1 novembre 2022Malware on the Google Play store leads to harmful phishing sites
      A family of malicious apps from developer Mobile apps Group are listed on Google Play and infected with Android/Trojan.HiddenAds.BTGTHB. In total, four apps are listed, and together they have amassed at least one million downloads. Older versions of these apps have been detected in the past as different variants of Android/Trojan.HiddenAds. Yet, the developer is still …

    • 1 novembre 2022Police warn of fake law enforcement arrest warrant calls
      Brownsville Police Department is warning about scammers impersonating law enforcement in order to extract money from potential victims. The scam involves pressure from an immediate threat, several ways to extract yourself from this non-existent claim of wrongdoing, and multiple levels of officialdom to scare you into making a wrong move.  How the fake warrant call works Calls f …

    • 1 novembre 2022Raccoon Stealer admin will be extradited to the US, charged for computer crimes
      The US Department of Justice has indicted a Ukrainian national for his involvement in Raccoon Stealer, a noteworthy password-stealing Trojan leased in the underground for criminals to use as part of a malware-as-a-service (MaaS) business model. According to court documents, Mark Sokolovsky, 26, is currently held in the Netherlands under an extradition request from the US government. Dutc …

    • 31 octobre 2022Raspberry Robin worm used as ransomware prelude
      Raspberry Robin aka Worm.RaspberyRobin started out as an annoying, yet relatively low-profile threat that was often installed via USB drive. First spotted in September 2021, it was typically introduced into a network through infected removable drives, often USB devices. Now the worm has been found to be the foothold for more serious threats like ransomware as laid out in this Microsoft Securi …

    • 31 octobre 2022A week in security (October 24 – 30)
      Last week on Malwarebytes Labs: Lock and Code: A gym heist in London goes cyber Healthcare site leaks personal health information via Google and Meta tracking pixels An odd kind of cybercrime: Gift vouchers, medical records, and…food Cisco warns of ISE vulnerability with no fixed release or workaround A cyber threat hunter talks about what he’s learned in his 16+ year cybersecurity career …

    • 28 octobre 2022A Chrome fix for an in-the-wild exploit is out—Check your version
      Google has announced an update for Chrome that fixes an in-the-wild exploit. Chrome Stable channel has been updated to 107.0.5304.87 for Mac and Linux, and 107.0.5304.87/.88 for Windows. The vulnerability at hand is described as a type confusion issue in the V8 Javascript engine. Mitigation If you’re a Chrome user on Windows, Mac, or Linux, you should update as soon as possible. Most of the …

    • 27 octobre 2022What is ransomware-as-a-service and how is it evolving?
      Ransomware attacks are becoming more frequent and costlier—breaches caused by ransomware grew 41 percent in the last year, the average cost of a destructive attack rising to $5.12 milllion. What’s more, a good chunk of the cyber criminals doing these attacks operate on a ransomware-as-a-service (RaaS) model. RaaS is not much different, in theory, from the software-as-a-service (SaaS) b …

    • 27 octobre 2022Dormant Colors browser hijackers could be used for more nefarious tasks, report says
      Researchers from Guardio, a cybersecurity company specializing in web browser protection, recently revealed a campaign involving a trove of popular yet malicious extensions programmed to steal user searches, browsing data, and affiliation to thousands of targeted sites. Nicknamed « Dormant Colors, » this campaign involves at least 30 variants of browser extensions for Chrome and Edge, once available …

    • 27 octobre 2022Medibank customers' personal data compromised by cyber attack
      Australian health care insurance company Medibank confirmed that the threat actor behind a cyberattack on the company had access to the data of at least 4 million customers. Although Medibank at first said that there was “no evidence that customer data has been accessed,” a week later their investigation shows that the threat actor had access to all Medibank customers …

ESET

ESET Support