Avast

GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining

The GuptiMiner malware campaign, discovered by Avast, involved hijacking an eScan antivirus update mechanism to distribute backdoors and coinminers. The campaign was orchestrated by a threat actor with possible ties to Kimsuky.

Mario Movie Malware Might Maliciously Mess With Your Machine

Downloading pirated movies from dubious sources can expose users to malware, putting personal and financial data at risk. Even visiting piracy websites or clicking on pop-ups and redirect links can lead to malware infections.

New Instagram scam uses fake SHEIN gift cards as lure

This social media scam begins with a comment from a random account on a user’s post, which congratulates the victim saying they’re one of the 2023 lucky ones selected to receive a SHEIN gift card.

(Ab)using Adobe Acrobat Sign to distribute malware

Adobe Acrobat Sign allows registered users to send a document signature request to anyone. When doing so, an email will be generated and sent to the intended recipients from a legitimate email address.

Avast Threat Labs releases Q4 2022 Threat Report

The top countries affected by tech support scams are the United States, Brazil, Japan, Canada, and France. These scams typically start with a pop-up window claiming a malware infection and urging the person to call a helpline for resolution.

New phishing campaign posing as Spain's Tax Agency

The phishing attempt starts out via a fraudulent SMS that notifies victims of a supposed reimbursement that they qualify for. According to the SMS, all they need to do to receive the reimbursement is to fill out a form on the agency's website.

The rise of ransomware and what can be done about it

Ransomware cybercriminal gangs and markets have made adjustments to their original ransom demands and found a near limitless demand for targeted ransomware, enabling them to up their extortion demands.

The Majority of Americans Have Been Targeted by Online Scammers

The best way to avoid falling for a rental scam is to use the smell test: If it smells fishy, it’s probably fishy. Clues like weird grammar, refusing to talk on the phone, and unnecessary demand for money should be seen as suspicious attempts.

Ananlysis of TaRRaK Ransomware

First, the ransomware attempts to read a file to memory using File.ReadAllBytes(). This function has an internal limit – of a maximum of 2 GB. In case the file is larger, the function throws an exception, which is then handled by the try-catch block.

SMSFactory Android Trojan Looting Victims Using Premium SMS and Calls to Premium Phone Numbers

SMSFactory sneakily siphons money from victims around the world, including Russia, Brazil, Argentina, Turkey, Ukraine, US, France, and Spain, among others, by sending premium SMS and making calls to premium-rate phone numbers.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags