CrypMIC Ransomware Wants to Follow CryptXXX’s Footsteps
By Kawabata Kohei They say imitation is the sincerest form of flattery. Take the case of CrypMIC—detected by Trend Micro as RANSOM_CRYPMIC—a new ransomware family that mimics CryptXXX in terms of entry point, ransom notes and payment site UIs. CrypMIC’s perpetrators are possibly looking for a quick buck owing to the recent success of CryptXXX. […] more…Banking Trojans as a Service—Theft Made Easy in Brazil
As a known banking Trojan center, it’s not surprising when Brazil’s cybercriminals launch what could be considered “banking Trojans as a service.” In this particular case, a skilled cybercriminal started offering a fully functional banking Trojan and its associated infrastructure for rent, to be used by less-skilled crooks. This particular threat caught our eye because of […] more…Lurk Banker Trojan: Exclusively for Russia
One piece of advice that often appears in closed message boards used by Russian cybercriminals is “Don’t work with RU”. This is a kind of instruction given by more experienced Russian criminals to the younger generation. It can be interpreted as: “don’t steal money from people in Russia, don’t infect their machines, don’t use compatriots […] more…“Operation C-Major” Actors Also Used Android, BlackBerry Mobile Spyware Against Targets
By Shawn Xing, David Sancho, and Feike Hacquebord Last March, we reported on Operation C-Major, an active information theft campaign that was able to steal sensitive information from high profile targets in India. The campaign was able to steal large amounts of data despite using relatively simple malware because it used clever social engineering tactics against […] more…Sextortionist government worker gets nearly 5 years in the slammer
Michael C. Ford was running the same scam in 2009, when he targeted minors and tried to get a schoolgirl to videotape classmates in the locker room. more…Apple appeals order to unlock iPhone, saying it would ‘violate the Constitution’
Apple filed court papers on Thursday urging a judge to overturn her order requiring it to unlock an iPhone used by one of the shooters in the San Bernardino attacks. Forcing Apple to help unlock the phone would set a dangerous precedent that undermines security for all its customers and opens the door to invasive […] more…Apple appeals order to unlock iPhone, says it would "violate the Constitution"
Apple filed court papers on Thursday urging a judge to overturn her order requiring it to unlock an iPhone used by one of the shooters in last December’s San Bernardino attacks. Forcing it to help unlock the phone would set a dangerous precedent that would undermine security for all its customers and open the door […] more…German police given go-ahead to use home-brewed spying Trojan
The infamous “federal Trojan” is back, supposedly neutered so it can’t access files, steal passwords, or set up video or audio surveillance via a target’s device. more…The Evolution of Acecard
While working on the IT Threat Evolution report for Q3 2015, we discovered that Australia had become the leading country in terms of number of users attacked by mobile banker Trojans. We decided to find out what was behind this jump in activity and managed to identify the cause: Trojan-Banker.AndroidOS.Acecard. This family accounted for almost […] more…More IoT insecurity: The surveillance camera that anyone can log into
The root password is 6 digits, it’s the same for everyone, it’s hard-wired, so you can’t change it….and it’s a video security system. more…Teacher’s sex tape stolen from hacked Dropbox, posted on school site
After being told the video was on the school site, “I went to the bathroom and threw up,” says Brian Cody Bray. more…Nursing home workers caught sharing nude patient images on Snapchat
A nursing assistant at the Parkside Manor assisted living facility in Kenosha, Wisconsin, allegedly filmed an elderly woman sitting on a bed “in a bra and no underwear and no pant[s],” and shared the video on Snapchat. more…Android-based Smart TVs Hit By Backdoor Spread Via Malicious App
With the year-end shopping season over, many consumers now have new various smart gadgets in their homes. One particularly popular usage of this so-called Internet of Things (IoT) are smart TVs. These TVs are more than just passive display devices; many of them can even run Android apps as well. Some may find these features useful, but these capabilities […] more…New Year’s resolutions from your end users…
Remember those hapless users from our “IT Heroes” video back in July? They’re back, and this time, nothing is goiniwrfe to gooworongQQQ! more…Teen cooks a turkey with flame-shooting drone
Austin Haughwout has a thing for drones and, it seems, weapons. So maybe it’s only natural that Haughwout, an 18-year-old from Connecticut, would combine his two interests to build a home-made flamethrower and shoot things with it. On Monday (7 December), Haughwout posted a video on his YouTube channel showing his invention as it shot flames […] more…‘Pedo hunter’ who posed as teen to extort others accepted payment in Amazon vouchers
He hid behind a video of young girls rigged with a RAT that infected viewers’ systems with images, then extorted £40,000 from his prey. more…More information
- Microsoft Windows JET Database Engine CVE-2019-0578 Remote Code Execution Vulnerability
- 6 steps for a solid patch management process
- Emails from Iran
- Cloud Security Company Wiz Raises $250 Million at $6 Billion Valuation
- Microsoft Details Security Responsibilities for Azure Cloud Customers
- Top dark web drug vendors nabbed by ‘Operation Darkness Falls’
- Joomla 3.8 fixes serious LDAP authentication issue, update now
- Consumers should be vigilant in wake of Zappos cyberattack
- New BBC ‘dark web’ Tor mirror site aims to beat censorship
- Google Glass: the ultimate creepy stalker toy?