Share Blog Post
Cybercriminals have loaded the backdoor in a USB stick to steal money from ATM machines. All it takes is a simple code written in Visual C to steal money from an ATM. The malware is consists of two modules, an injector and a deployable malware. ATM service providers should set default-deny policies that will prevent external parties from running their code.
Crypto-Loot Monero miner
Brazilian banking Trojan
A Brazilian banking Trojan campaign is abusing a legitimate VMware binary to trick security products into allowing malicious binaries to load. The campaign is also using multiple methods of re-direction when infecting the victims’ machines. Users are advised to cautiously open links and attachments, and not download files from unfamiliar websites.
The public had been invited by the Federal Communications Commission chairman to submit comments for or against net neutrality over summer 2017. More than 80% of the comments submitted to a US regulator on the future of net neutrality were posted by bots. Only 17.4% of the comments were unique.
A fake browser and Flash update alert are being used by a malvertising group nicknamed KovCoreG to trick users into installing the Kovter malware. Hackers used malvertising on adult video website Pornhub and abused the Traffic Junky advertising network. Safe browsing and sticking to reputable sites remains a good idea for all surfers.
US-South Korea war plans stolen
A treasure of classified military documents, including the joint South Korea-US wartime operational plans for conflict with Pyongyang, have reportedly been stolen by North Korean hackers. The stolen documents also include Operational Plan 5015 and 3100.
Posted on: October 10, 2017
More from Cyware
Stay updated on the security threat landscape and technology innovations at Cyware with our threat intelligence briefings and blogs.
Explore Industry Briefs
Cyware for Enterprise
Adopt next-gen security with threat intelligence analysis, security automation...
Cyware for ISACs/ISAOs
Anticipate, prevent, and respond to threats through bi-directional threat in...