Chameleon WiFi Virus Spreads Like a Cold
A team of researchers at the University of Liverpool developed a virus dubbed Chameleon that travels over WiFi networks and spreads “as efficiently as the common cold spreads between humans.” Unlike...
View ArticleMalware with Packer Deception Techniques
As we’ve discussed on our blog several times, malware will make use of commercially available or “homebrewed” packers or cryptors to conceal its malicious code. While there are many programs available...
View ArticleCyber-criminals Use Cancer to Deliver Malware
Well, not literally, although that would make a frightening read. Nonetheless, the folks at Softpedia reported on a spam campaign instilling fears of cancer to users via email. The email features the...
View ArticleBitcoin Malware Found in Leaked Mt.Gox Files
At one time, the Japan-based Bitcoin exchange Mt. Gox handled 70 percent of all Bitcoin transactions. However, you’ve now likely heard the company has fallen into bankruptcy since losing over $400...
View ArticleResearch Paper Shows Upgrading Android Could Upgrade Malware
Researchers at Indiana University Bloomington and Microsoft released a paper detailing a new set of vulnerabilities in the Android Operating System dubbed Pileup flaws; where Pileup means “privilege...
View Article“No War on Syria” Spam Used To Harvest Emails
It appears that spammers never waste an opportunity, not even with the Syrian Civil War. During its course, there have been many legitimate petitions against any US involvement in the war. Recently,...
View ArticleSality Malware Now Features DNS Changer
The Sality Malware family has been around since 2003 and has undergone many changes since that time. However, the malware’s latest component might be one of the most interesting to date. Discovered by...
View ArticleBeware of Fake UPS Exception E-mails
A spam email claiming to be from UPS is making the rounds. As seen in the image above, the e-mail states that a delivery attempt was made and provides a tracking number. The tracking number is real,...
View ArticleAutomating Malware Analysis with Cuckoo Sandbox
Analyzing malware can be a lengthy process. Malware today can be simple, like something that downloads another program from a rogue server, or complicated, perhaps utilizing advanced encryption or...
View ArticleFive PE Analysis Tools Worth Looking At
In the world of malware analysis, having the right tools can make all the difference. When looking at malicious binaries, they are often in the Windows Portable Executable (PE) format. For this reason,...
View ArticleMisleading eBook Advertisements Install PUPs
Regardless of what it is, the Internet is filled with misleading advertisements. Most of you reading this can relate to being in a frustrating situation where you’re looking for the “real” download...
View ArticleFake Evernote Extension Serves Advertisements
Recently a Malwarebytes researcher informed me of a Multiplug PUP that installs a fake Evernote browser extension. Fellow researchers can find the link to this sample on VirusTotal here. A quick look...
View ArticleFive Anti-Analysis Tricks That Sometimes Fool Analysts
No malware author wants an analyst snooping around their code, so they employ tricks to inhibit analysis. Along with visualization technology like VMware, debuggers are also targeted by malware. This...
View ArticleThe Password and You
Everyone who uses a computer knows the importance of passwords. In several ways, these small textual nuggets have become the keys to much of our lives, if not all our digital lives. But even if you...
View ArticleXtube Exploit led to Cryptowall Malware
We wrote about the adult site xtube.com being compromised, redirecting visitors to a landing page for the Neutrino Exploit kit last week on the Malwarebytes Unpacked blog, The malware that dropped from...
View ArticleWhat’s important about Rombertik?
A few days ago the Talos Research Group, which supports Cisco by creating threat intelligence, released a blog about a piece of malware known as Rombertik, which has gained a lot of attention mainly...
View Article“WinYahoo” PUP Modifies Chrome Secure Preferences
Potentially Unwanted Programs (PUPs) continue to plague consumers with annoying software that interferes with everyday computer use. This kind of software bloats a filesystem, fills up memory with...
View ArticleBeware of GTA 5 Mods Containing Malware
Yesterday, a reddit user posted about mods for GTA 5 containing malware. The affected mods were identified as No-Clip and Angry Planes. This conversation was started as a result of a thread on the...
View ArticleThe Logjam Attack: What You Need to Know
A group of security researchers and computer scientists have recently uncovered a vulnerability in how a Diffie-Hellman key exchange is deployed on the web. Dubbed as Logjam, the vulnerability affects...
View ArticleAutomatic Analysis Using Malheur And Cuckoo
Oftentimes when performing automated analysis of malware we seek to answer one basic question: what kind of malware is it? Automated analysis has become very popular with malware analysts since the...
View Article
More Pages to Explore .....