Share Blog post
This exploit kit was first discovered in the August 2017, but it has now resurfaced again through malvertising chains. It is reported that Disdain EK downloads Neutrino Bot payload which is an information-stealing malware. Users are advised to apply security patches regularly.
In a recent discovery, a new ransomware strain called Ordinypt is currently targeting victims in Germany, but instead of encrypting users' documents, the ransomware rewrites files with random data. It has turned out to be a data wiper of sorts as it creates random files and deletes the original files.
Recently a new malware named ANDROID_OS TOASTAMIGO was discovered. It is secretly known to install other malware on the affected device via the Toast Overlay attack. To achieve this, the malware poses as a legitimate app locker that’s supposed to secure the device’s applications with a PIN code.
A new vulnerability that is dubbed AVGater works by relocating malware already placed into an AV quarantine folder at a location of attacker choice. Attackers can exploit it by first getting a vulnerable AV program to quarantine a piece of malicious code and then moving it into a sensitive directory.
In a recent discovery, tens of developers have left API credentials in hundreds of applications built around the Twilio service. About a third of all affected apps are enterprise related, potentially granting attackers access to highly precious financial and business phone calls and SMS alerts.
In a recent discovery, the University of East Anglia (UEA) has suffered another data breach this year after an email containing health information about a staff member got accidentally emailed to 300 students. This happened as the sender accidentally used an email distribution list.
Recently, the Boston Globe reported that it endured two consecutive days of cyberattacks by an unknown group or individual. The first attack began some time back followed by another one on the next day that shut down the site.
In another startling discovery, WikiLeaks published the first-ever batch of source code for CIA cyber-weapons. The source code released is a toolkit named Hive, a so-called implant framework. It is a system that allows CIA operatives to control the malware it deploys on infected computers.
Posted on: November 10, 2017
Get the Daily Threat Briefing delivered to your email!
More from Cyware
Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.
Explore Industry Briefs
Cyware for Enterprise
Adopt next-gen security with threat intelligence analysis, security automation...
Cyware for ISACs/ISAOs
Anticipate, prevent, and respond to threats through bi-directional threat in...