Blog Posts Tagged with "trojan"


Trojan Horses for the Mind, Part 2 of Building Impactful Security Awareness Messaging

March 27, 2019 Added by:Perry Carpenter

Let’s talk about another Trojan Horse for the Mind -- visuals.

Comments  (0)


Ztorg Trojan-SMS Infects Google Play Apps

June 24, 2017 Added by:Ionut Arghire

Newly discovered Google Play applications infected with the Ztorg Trojan family no longer request root privileges on compromised devices, Kaspersky Lab security researchers reveal.

Comments  (0)


Malware: The Gift That Keeps on Giving

June 02, 2017 Added by:Topher Tebow

Always be wary of unfamiliar USB devices, you never know what might be lurking in the darkness.

Comments  (0)


Building OS X Trojans With AppleScript, Homoglyphs and iTunes

September 21, 2013 Added by:Tripwire Inc

A year or so ago I stumbled upon a way to create Trojans for OS X by utilizing homoglyphs and a bit of social engineering, I disclosed the vulnerability to Apple and presented it at ToorCamp.

Comments  (1)


Carberp Botnet Lifecycle Infographic

July 02, 2013 Added by:Tripwire Inc

Carberp is sophisticated, modular and persistent malware utilizing advanced obfuscation techniques to evade detection, removal and the ability to disable anti-virus. It also offers malware developers the ability to customize the malicious package statically as well as dynamically via a remote command and control server.

Comments  (4)


ZeroAccess Hits Victims with High Bandwidth Consumption

July 19, 2012 Added by:Headlines

“The concern with ZeroAccess is that it is using the subscriber’s bandwidth maliciously which will cost them money as they exceed bandwidth caps. And, once the computer is compromised, it can also spread additional malware or launch new attacks... while connecting to over one million computers globally..."

Comments  (0)


DNSChanger Malware Deadline: July 9th Has Arrived

July 09, 2012 Added by:Plagiarist Paganini

Despite the calls to check for infected units provided by the press and law enforcement, too many PCs are still infected and potentially vulnerable to the planned blackout. The estimation is that 64,000 users in the United States, plus an additional 200,000 users outside the United States are still at risk...

Comments  (0)


Citadel Malware May Be Coming Off the Open Market

July 03, 2012 Added by:Headlines

"With law enforcement hot on their heels, developers of the Citadel Trojan... dropped the bomb. The team’s spokesman declared that very soon their “software” will no longer be publicly available through the underground venues where the team has traditionally marketed and sold Citadel..."

Comments  (0)


Citadel Trojan Variant Evades Virtual Machine Analysis

June 28, 2012 Added by:Headlines

"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."

Comments  (1)


Kaspersky's Problematic Flame Analysis

May 29, 2012 Added by:Jeffrey Carr

I'm beginning to wonder what's going on over at Kaspersky Labs. Kaspersky Labs has called a virus whose only purpose is to steal data a "cyber weapon". Come on, guys. Espionage is not warfare and never has been. Hence a tool created solely to conduct cyber espionage cannot also be legitimately called a cyber weapon...

Comments  (0)


Flame: Another Holiday, Another Super Virus

May 29, 2012 Added by:Kevin McAleavey

Flame is huge - 20 modules and 20 megabytes. Strange that the infector is an ActiveX control in the form of an OCX (OLE Control Extensions) file which apparently has run completely undetected for years. The worm runs as a Windows service, and most of the files are visible, making this even more of a surprise...

Comments  (1)


Flame Trojan Ignites Cyberwar Chatter

May 29, 2012 Added by:Headlines

"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."

Comments  (0)


Malware Threats: Save Your Company Now

May 21, 2012 Added by:Bill Gerneglia

As the severity of cyber-crimes continues to grow, it’s important to understand the types of malware involved and how they work. Many forms of malware might be familiar, but they evolve as counter measures force adaptation. Today, the adaptation is driven by professional criminals...

Comments  (0)


Symantec Reverse Engineers OS X Flashback Malware

May 14, 2012 Added by:Headlines

Symantec researchers reverse engineered components of the Flashback malware that recently infected more than 600,000 Mac systems and reveal that it was designed in part as a highly profitable ad-clicking operation that could be net the Trojan's creators $10,000 per day...

Comments  (0)


Multi-Platform Malware Targets Both Widows and Mac OS

April 27, 2012 Added by:Headlines

"If the threat is running on a Mac operating system, it downloads a dropper type malware written in Python. However, if the threat is running on a Windows operating system, it downloads a standard Windows executable file dropper. Both droppers drop a Trojan horse program..."

Comments  (0)


Yet Another Flashback Variant Targeting Mac OS X

April 26, 2012 Added by:Headlines

Another Flashback Trojan malware variant has been discovered, and this one is even more insidious than those already identified - it can silently infect a Mac user's device. Flashback.S can stealthily infect a system without having tipped the victim off by requesting a password...

Comments  (0)

Page « < 1 - 2 - 3 > »