Researchers with Microsoft have spotted a spike in Crowti, a ransomware similar to Cryptolocker that encrypts files on victimsâ machines and then asks for payment to unlock them.
Tag Archives: Web Security
Facebook Open Sources Host Monitoring Tool, Increases Internet Defense Prize
Facebook announced that it has released a host monitoring tool it developed to open source, and that it will increase its Internet Defense Prize payouts to $300,000 in 2015.
Dyreza Banker Trojan Attackers Exploiting CVE-2014-4114 Windows Flaw
The Dyreza Trojan is nothing if not ambitious. The malware has been spotted doing a variety of interesting things in the last year, including bypassing SSL and targeting users of specific business apps. Now the Trojan is exploiting the recently disclosed CVE-2014-4114 vulnerability in Windows that was first used by the Sandworm attackers. Researchers at […]
BlackEnergy Malware Used in Attacks Against Industrial Control Systems
Attackers are using BlackEnergy malware to attack HMI software running inside industrial control systems, according to an advisory from ICS-CERT.
Cyberespionage: ‘This Isn’t a Problem That Can Be Solved’
WASHINGTON–Gentlemen may not read each other’s mail, as Henry Stimson famously said so long ago, but in today’s world they certainly steal it and there’s precious little in the way of gentlemanly conduct happening in the realm of cyberespionage. It’s every manâor countryâfor himself in this environment, and that free-for-all is creating unforeseen consequences for […]
Russian APT28 Group Linked to NATO, Political Attacks
APT28, a Russian hacking group, has been tied to attacks against the country of Georgia, Eastern European political and military organizations, and NATO, a report from FireEye said.
Shellshock Exploits Targeting SMTP Servers at Webhosts
SANS Internet Storm Center reports attacks against SMTP servers using Shellshock exploits to create a DDoS botnet.
Researcher Finds Tor Exit Node Adding Malware to Binaries
A security researcher has identified a Tor exit node that was actively patching binaries users download, adding malware to the files dynamically. The discovery, experts say, highlights the danger of trusting files downloaded from unknown sources and the potential for attackers to abuse the trust users have in Tor and similar services. Josh Pitts of Leviathan […]
Facebook, Yahoo Curb Identity Theft with New Email Ownership Header
A new SMTP header developed by Facebook and Yahoo confirms ownership of Yahoo email accounts.
NAT-PMP Protocol Vulnerability Puts 1.2 Million SOHO Routers At Risk
More than 1 million SOHO routers and embedded devices are vulnerable to a serious vulnerability in the NAT-PMP protocol that enables traffic hijacking and denial of service attacks.