article thumbnail

Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware

Ooda Loop

The Chinese cyberespionage group, Blackwood, has been caught delivering malware to entities in China and Japan.

Malware 45
article thumbnail

Solar Spider Spins Up New Malware to Entrap Saudi Arabian Financial Firms

Ooda Loop

The threat group behind a complex JavaScript remote access Trojan (RAT) known as JSOutProx has released a new version of the malware to target organizations in the Middle East. Resecurity, a cybersecurity services firm, is analyzing technical details of multiple instances of the malware targeting financial customers.

Malware 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guarantee that Your Enterprise Will Recover from a Ransomware or Malware Cyberattack

CIO

The “sting” of a ransomware or malware attack is removed quickly, efficiently, and comprehensively. Who would have thought that the latest answer to cyberattacks was actually found in guaranteed cyber recovery on primary storage?

Malware 246
article thumbnail

Drokbk Malware Uses GitHub as Dead Drop Resolver

SecureWorks

Type: Blogs Drokbk Malware Uses GitHub as Dead Drop Resolver A subgroup of the Iranian COBALT MIRAGE threat group leverages Drokbk for persistence. A subgroup of the Iranian COBALT MIRAGE threat group leverages Drokbk for persistence.

Malware 98
article thumbnail

New Grelos skimmer variant reveals overlap in Magecart group activities, malware infrastructure

CTOvision

A new variant of a skimmer has revealed the increasingly muddy waters associated with tracking groups involved in Magecart-style attacks. On Wednesday, researchers from RiskIQ described how a new Grelos […].

Groups 159
article thumbnail

How Watchdog smuggles malware into your network as uninteresting photos

Lacework

This ancient technique has found its place in the world of malware, namely hiding malicious code within other files including image formatted files ( T1027.003 ). This blog takes a look at the latter technique in recent cryptojacking activity from a group known as WatchDog. Steg malware is uncommon relative to other malware.

Malware 96
article thumbnail

Excel Add-ins Deliver JSSLoader Malware

SecureWorks

Type: Blogs Excel Add-ins Deliver JSSLoader Malware The GOLD NIAGARA threat group has expanded its tactics for delivering the JSSLoader RAT, spoofing legitimate Microsoft Excel add-ins to infect systems. Learn how CTU researchers observed multiple malicious Microsoft Excel add-ins delivering JSSLoader malware.

Malware 90