Recent Comments

    Blogroll

    Search

    Archive for Malware

    Security Mailer (2019 # 31)

    August 4th, 2019 by

    Security Mailer Volume 2019 Number 31

    • Cisco security advisorie
    • Linux update
    • Microsoft advisory update
    • General Security review of last week
      • iOS 0-day exploits released

    Posted in Malware, Newsletters, Updates | No Comments »

    New Malware sets up proxy for more malware

    August 4th, 2019 by

    New Windows malware sets up proxies on your PC to relay malicious traffic

    A new malware strain targeting Windows systems is rearing its ugly head. Named SystemBC, this malware installs a proxy on infected computers.

    The bad news is that SystemBC never comes alone, and usually, the presence of this malware indicates that a computer was also infected by a second threat.

    Posted in Malware | No Comments »

    Russian meddling in social media and email accounts used by election officials

    July 26th, 2019 by

    The Unsexy Threat to Election Security

    “Much has been written about the need to further secure our elections, from ensuring the integrity of voting machines to combating fake news. But according to a report quietly issued by a California grand jury this week, more attention needs to be paid to securing social media and email accounts used by election officials at the state and local level.”

    Posted in Malware, Newsletters, Security Breeches | No Comments »

    Some HP machines may have a keylogger installed

    July 22nd, 2019 by

    Some HP machines have a keylogger installed with the Audio Driver, here’s how to disable it

    The keylogger, packaged with the Conexant HD Audio Driver Package in version 1.0.0.46 and earlier, has been discovered by researchers. With this audio driver comes a file, MicTray64.exe (or MicTray.exe for non-64-bit users), which has a Scheduled Task to run each time the user logs-on to their machine. Essentially, each time a key on the keyboard is pressed, it records it. The keystrokes are then stored in a plaintext file – definitely not a secure way of storing every key pressed on a machine.

    The keystroke log is stored at C:\users\public\MicTray.log.

    Posted in Malware, Security Breeches | No Comments »

    Have QuickBooks in the cloud? Not a good situation!!

    July 20th, 2019 by

    QuickBooks Cloud Hosting Firm iNSYNQ Hit in Ransomware Attack

    “Cloud hosting provider iNSYNQ says it is trying to recover from a ransomware attack that shut down its network and has left customers unable to access their accounting data for the past three days. Unfortunately for iNSYNQ, the company appears to be turning a deaf ear to the increasingly anxious cries from its users for more information about the incident.”

    Posted in Malware, Security Breeches | No Comments »

    Dell’s SupportAssist utility has a significant security flaw

    June 22nd, 2019 by

    Security Flaw in Pre-Installed Dell Support Software Affects Million of Computers

    ” Dell’s SupportAssist utility that comes pre-installed on millions of Dell laptops and PCs contains a security vulnerability that could allow malicious software or rogue logged-in users to escalate their privileges to administrator-level and access sensitive information.”

    Posted in Malware | No Comments »

    Tech Support Scams in Google Search Ads

    June 8th, 2019 by

    Google Search Ads Infiltrated Again by Tech Support Scam

    Yet another reason why I never, ever, click on an “Ad” from a Google search…

    f you are planning on doing any shopping over the weekend, you may want to be careful when doing searches in Google. This is because scammers have infiltrated Google’s ad network to redirect users to tech support scams when they click on popular search terms such as Lowes and PayPal.

    A security research recently told BleepingComputer about a new malvertising campaign that is causing searches for the keyword “Lowes” to redirect a user to a tech support scam.

    Posted in Identity Theft, Malware | No Comments »

    Windows 10 May 2019 Zero Day Vulnerabilities

    May 27th, 2019 by

    May 2019 0-day disclosures

    Executive summary

    Over the past week, starting on Tuesday, May 21, a security researcher publicly disclosed multiple elevation-of-privilege vulnerabilities by posting proof-of-concept code on GitHub. Successful exploitation of these vulnerabilities requires an attacker to already have code execution.

    At the time of publication, the researcher has released five sets of proof-of-concept code, including exploits for four zero-day vulnerabilities, all affecting different Windows components. The fifth proof-of-concept code targeted a vulnerability (CVE-2019-0863) that was addressed in May 2019.

    Microsoft is actively preparing a host of protections to detect and stop known exploitation methods. Customers are advised to review the listed mitigations. Ensure your antimalware products are up-to-date and turn on automatic updates so that security updates are promptly deployed as soon as they become available.

    At the time of publication, there are no active attacks in the wild exploiting the disclosed vulnerabilities.

    Posted in Malware | No Comments »

    If you use WhasApp, be sure to read this!

    May 15th, 2019 by

    WhatsApp vulnerability exploited to infect phones with Israeli spyware

    “Attackers have been exploiting a vulnerability in WhatsApp that allowed them to infect phones with advanced spyware made by Israeli developer NSO Group, the Financial Times reported on Monday, citing the company and a spyware technology dealer.”

    “WhatsApp said the fix on Friday was made to the company’s servers and was aimed at preventing attacks from working. The company released a patch for end users on Monday. “

    Posted in Identity Theft, Malware | No Comments »

    Keylogger from AWS? You bet!

    May 6th, 2019 by

    Hawkeye keylogger using fileless delivery system via Amazon AWS

    Don’t try to respond by phone or email, all you will do is end up with an innocent person or company who have had their details spoofed and picked at random from a long list that the bad guys have previously found. The bad guys choose companies, Government departments and organisations  with subjects that are designed to entice you or alarm you into blindly opening the attachment or clicking the link in the email to see what is happening.  “

    Posted in Identity Theft, Malware, Scams | No Comments »

    « Previous Entries