Virus / Malware

Retour à Sécurité

Malwarebytes

    • The forgotten domain: Exploring a link between Magecart Group 5 and the Carbanak APT 22 octobre 2019
      This blog post was authored by Jérôme Segura, William Tsing, and Adam Thomas. In a previous post, we described the possible overlap between certain domains registered by Magecart Group 4 and the Cobalt gang. While attribution is always a difficult endeavor, sharing TTPs can help others to connect the dots between campaigns observed in the wild and threat groups. This time, we looked at Magecart Gr …

    • A week in security (October 14 – 20) 21 octobre 2019
      Last week on Malwarebytes Labs, we tried to unlock the future of the password (its vulnerabilities, current alternatives, and possible future disappearance), analyzed the lagging response by many businesses in adopting a patch for Pulse VPN vulnerability, looked at Instagram’s bulked-up security against phishing emails scams, and were reminded that ransomware remains a dominant threat facing busin …

    • Pulse VPN patched their vulnerability, but businesses are trailing behind 18 octobre 2019
      In April 2019, Pulse Secure published an advisory about a vulnerability in their software. In August, cybercriminals were massively scanning for systems that were running a vulnerable version. Now it’s October, and still many organizations have not applied the patches that are available for this vulnerability. This is a trend we’ve seen repeated with dozens of other publicly-known vulnerabil …

    • Why all organizations must better protect sensitive data 17 octobre 2019
      About two weeks ago, National Cybersecurity Awareness Month (NCSAM) kicked off with a new message stressing personal responsibility for users keeping themselves safe online: “Own IT. Secure IT. Protect IT.” NCSAM asked users to consider best practices for both securing their own devices and protecting sensitive data. But personal responsibility in cybersecurity extends beyond individuals—it reache …

    • When can we get rid of passwords for good? 16 octobre 2019
      Or perhaps I should have asked, “Can we ever get rid of passwords for good?” The security world knows passwords are a problem. Products ship with default passwords that are never changed. People reuse old passwords or adopt easy-to-guess passwords that hackers easily defeat via brute force. Or users simply can’t keep up with having to remember 27 different passwords for various o …

    • Instagram clamps down on fake messages with anti-phishing tool 15 octobre 2019
      Instagram accounts will always be a popular target for scammers. You might not think it’s a big deal if someone has their account swiped, but it’s often the vanguard of many online businesses. A takeover, or a deletion, can be absolutely devastating. Smart hacking crews are always in the background, waiting to see what they can get away with—and it’s not just the public-facing account at risk, but …

    • Europol: Ransomware remains top threat in IOCTA report 14 octobre 2019
      The European Union Agency for Law Enforcement Cooperation, or Europol, just released its annual Internet Organized Crime Threat Assessment (IOCTA) report for the year. And we weren’t surprised to find that ransomware, despite its palpable decline in volume these past few months—a trend we’ve also seen and documented—remains the most prominent threat in terms of prevalence and financial damage. It …

    • A week in security (October 7 – 13) 14 octobre 2019
      Last week on Malwarebytes Labs, we peered into the possible future of cybersecurity insurance, described the process for securing today’s managed service provider, and provided an in-depth explainer on the business espionage tactic known as “war shipping.” Further, in considering the intersection of National Cybersecurity Awareness Month and National Domestic Violence Awareness Month, we gave a ru …

    • Securing the managed service provider (MSP) 11 octobre 2019
      Managed service providers (MSPs) have been a boon to midsize enterprise. They allow for offloading technical debt to an agent with the skills and resources to manage it, thereby giving an organization room to focus on growing a business, rather than the particulars of infrastructure. For a long while, third-party service providers were not targeted directly for their security failures, as lucrativ …

    • Cyber insurance: here to stay, whether we like it or not 10 octobre 2019
      Cyber insurance has been a big talking point in infosec circles for many months now. We’ve mentioned it in passing ourselves a few times, usually in relation to ransomware attacks. This isn’t surprising; ransomware may not be the threat that brought cyber insurance to life, but it absolutely helped to supercharge it. Depending on where in the world you reside, the actual act of wrapping insurance …

    • How to protect against stalkerware, a murky but dangerous mobile threat 9 octobre 2019
      Last week, we pledged that—in honor of National Cybersecurity Awareness and Domestic Violence Awareness months—we would continue the fight against the online scourge known as stalkerware, or applications used to track and spy on victims without their knowing consent. We told readers that, despite working to protect against stalkerware programs for more than five years, it was time to take our effo …

    • Explained: war shipping 8 octobre 2019
      Yesterday, Mike from the mailroom came up and asked whether I knew anyone called “Simon Smith.” He received an envelope addressed to our company and to the attention of Mr. Smith, but there was no one by that name on his list of employees. It wasn’t on mine either and HR was unaware of a person by that name ever employed here. Nor did we expect anyone by that name to start working here. So, the pa …

    • A week in security (September 30 – October 6) 7 octobre 2019
      Last week on Malwarebytes Labs, Malwarebytes renewed its pledge to fight stalkerware for National Cybersecurity Awareness (NCSA) and Domestic Violence Awareness Month. We also looked into what security orchestration is and reported about partnering with security firm, HYAS, to determine the relationship between Magecart Group 4 and Cobalt, the infamous APT group behind sophisticated financially mo …

    • Magecart Group 4: A link with Cobalt Group? 3 octobre 2019
      Note: This blog post is a collaboration between the Malwarebytes and HYAS Threat Intelligence teams. Magecart is a term that has become a household name, and it refers to the theft of credit card data via online stores. The most common scenario is for criminals to compromise e-commerce sites by injecting rogue JavaScript code designed to steal any information entered by victims on the checkout pag …

    • How security orchestration improves detection and response 2 octobre 2019
      Working together in perfect harmony like the wind and percussion sections of a symphony orchestra requires both rigorous practice and a skilled conductor. Wouldn’t it be great if our cybersecurity solutions did the same to better protect organizations? The methods and tools used to accomplish this are often referred to as security orchestration. Even though security orchestration may sound like ju …

    • For Cybersecurity and Domestic Violence Awareness months, we pledge to fight stalkerware 1 octobre 2019
      Starting today, two hallmark holidays are upon us. No, it’s not Halloween and Thanksgiving. It’s both Cybersecurity Awareness Month and Domestic Violence Awareness Month. It’s no coincidence these two awareness campaigns overlap. What were once seen as separate realities—the physical and the digital—are increasingly blurred as our offices, schools, and hospitals move from paper to screen. Our home …

    • A week in security (September 23 – 29) 30 septembre 2019
      Last week on Labs, we highlighted an Emotet campaign using Snowden’s new book as a lure, discussed how 15,000 webcams are vulnerable to attack, how insurance data security laws skirt political turmoil, and how the new iOS exploit checkm8 allows permanent compromise of iPhones. Other cybersecurity news Google said its quantum computer outperformed conventional models, but it will still be years bef …

    • New iOS exploit checkm8 allows permanent compromise of iPhones 27 septembre 2019
      UPDATE 9/27, 11:00am: Updated for the misconception that the bootrom was actually being modified. Apparently, the “permanent” only refers to the fact that the bug is in the bootrom, where it cannot be patched. UPDATE 9/27, 12:15am: After speaking with @axi0m8, clarified a few other points, including the fact that this cannot be exploited remotely. This morning, an iOS researcher with t …

    • Insurance data security laws skirt political turmoil 25 septembre 2019
      Across the United States, a unique approach to lawmaking has proved radically successful in making data security stronger for one industry—insurance providers. The singular approach has entirely sidestepped the prolonged, political arguments that have become commonplace when trying to pass federal and state data privacy laws today. In California, for example, Big Tech lobbying groups have repeated …

    • 15,000 webcams vulnerable to attack: how to protect against webcam hacking 24 septembre 2019
      Webcams may have been around for a long time, but that doesn’t mean we know what we’re doing with them. Webcam hacking has been around for equally as long, yet new research from Wizcase indicates that more than 15,000 private, web-connected cameras are exposed and readily accessible to the general public. So forget hacking, cybercriminals can just take a stroll through the Internet and grab whatev …

ESET

    • NordVPN reveals breach at datacenter provider 22 octobre 2019
      The company says that the incident, going back to March 2018, affected only 1 out of its 3,000 servers The post NordVPN reveals breach at datacenter provider appeared first on WeLiveSecurity …

    • Week in security with Tony Anscombe 18 octobre 2019
      This week, ESET experts described recent shenanigans of The Dukes and the Winnti Group, vulnerabilities in Amazon Echo and Kindle, and a fake Tor Browser stealing cryptocurrency The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • Operation Ghost: The Dukes aren’t back – they never left 17 octobre 2019
      ESET researchers describe recent activity of the infamous espionage group, the Dukes, including three new malware families The post Operation Ghost: The Dukes aren’t back – they never left appeared first on WeLiveSecurity …

    • Streaming devices track viewing habits, study finds 15 octobre 2019
      Do you know what kind of data your streaming device may be collecting while you binge watch? The post Streaming devices track viewing habits, study finds appeared first on WeLiveSecurity …

    • Week in security with Tony Anscombe 11 octobre 2019
      This week, ESET researchers published an analysis of a previously unknown cyber-espionage platform and described a system enabling them to explore the UEFI landscape in an efficient way The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • EU warns of cyber‑risks as 5G looms 11 octobre 2019
      What are the scenarios that may prove to be challenging to manage in the 5G world? The post EU warns of cyber‑risks as 5G looms appeared first on WeLiveSecurity …

    • ESET discovers Attor, a spy platform with curious GSM fingerprinting 10 octobre 2019
      ESET researchers discover a previously unreported cyberespionage platform used in targeted attacks against diplomatic missions and governmental institutions, and privacy-concerned users The post ESET discovers Attor, a spy platform with curious GSM fingerprinting appeared first on WeLiveSecurity …

    • How concerned are you about the privacy challenges of your IoT devices? 9 octobre 2019
      An ESET survey of thousands of people in North America provides a peek into how they perceive the privacy and security of their smart home connected devices The post How concerned are you about the privacy challenges of your IoT devices? appeared first on WeLiveSecurity …

    • Internet pioneer Dr. Paul Vixie on global internet security 9 octobre 2019
      We sat down with internet pioneer and Farsight Security CEO Dr. Paul Vixie, who co-invented some of the services that are central to the ‘Net’s fabric, to discuss a range of issues affecting security and privacy The post Internet pioneer Dr. Paul Vixie on global internet security appeared first on WeLiveSecurity …

    • Week in security with Tony Anscombe 4 octobre 2019
      ESET researchers publish an in-depth analysis of the Casbaneiro banking trojan that targets banks and cryptocurrency services in Brazil and Mexico The post Week in security with Tony Anscombe appeared first on WeLiveSecurity …

    • Do apps need all the permissions? 2 octobre 2019
      Why you should ensure that all those apps on your smartphone only run with the permissions they reasonably need to do their job The post Do apps need all the permissions? appeared first on WeLiveSecurity …

    • Cyber Security Awareness Month starts today! 1 octobre 2019
      October is upon us, reminding us to make choices every day that will scare cybersecurity threats away The post Cyber Security Awareness Month starts today! appeared first on WeLiveSecurity …

ESET Support