<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: threatstop-research-team

Switcher Android Malware - The Road From Android App to Hijacking DNS Server

One of the most recent campaigns highlighting the importance of router security is Mirai (The botnet that had large scale attacks by infected IoT devices). Even before this, reports emphasized the importance and vulnerability of these devices. For example, Report by Malware Researcher Kafeine revealed the use of an exploit kit aimed to exploit routers. This method showed Google Chrome users were redirected to a malicious server that loaded code designed to determine router models. (While changing the DNS servers configured to the router)

Read More

Share this:

Operation Emmental\SmsSecurity

The evolving threats targeted at mobile devices and the increasing number of campaigns targeted at financial institutions have joined forces and become a double threat in what have become known as the  The Emmental campaign. 

Read More

Share this:

ThreatSTOP security team is proud to present - Banking Malware Targets

Banking Malware steals millions of dollars from both personal and business accounts in the United States every year. Personal accounts are insured by federal banking regulations, but businesses are less protected.

Read More

Share this:

Nemucod spreads through Facebook messages

Read More

Share this:

Gooligan- The recent Hooligan that is spreading

One criteria for the success of malware is its scope of distribution. Gooligan, a mobile malware, found in the app SnapPea that is described as a "one-stop shopping experience", has succeeded in this aspect. Check Point reported that this malware has breached more than 1 Million Google accounts. This malware has been distributed through apps that are available in third party Android stores. In order to increase the number of downloads for these apps, and in turn the malware, there have also been phishing campaigns which contained download links, sent through various messaging services.

Read More

Share this:

New Phishing Protection

The ThreatSTOP Security Team has introduced a new list of Phishing protection in order to help our customers to protect themselves from Phishing and at the same time to maintain a separation between targets with different false positive chance.

Phishing is a technique used to gain private information for purposes of theft.

Read More

Share this:

ANDROID MALWARE MARCHES AWAY WITH BANKING CREDENTIALS

Marcher is an evolving Android-based banking Trojan, changing in scope and capabilities since first seen in 2013. Spreading through phishing emails and websites, it prompts the victim to download “security updates” from third party app stores. It has also been found to spread through malicious apps on the Google Play Store itself.

Read More

Share this:

AVALANCHE

 

On November 30th, 2016, a worldwide cooperative takedown of the Avalanche botnet took place after more than four years of investigation.  “Avalanche” refers to a worldwide crimeware-as-a-service (CaaS) network infrastructure operated by cyber criminals conducting malicious activity. This includes: DDoS, malware distribution, phishing and money-mule operations causing hundreds of millions of damages in Euros worldwide.

Read More

Share this:

Sweeten Your Security with Honey

 

Read More

Share this:

Cerber Ransomware Gets Stronger, Adds DDoS Capabilities

Cerber ransomware debuted in late February of this year, and has already become the third most prevalent ransomware based on a recent Fortinet statistic. The ransomware is typically distributed via emails containing macro-enabled Word documents, Windows Script Files, or Rich Text Documents. Cerber uses a strong, unbreakable encryption, and has a number of features that, when combined, make it unique in today's ransomware landscape.

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter