Threat Alert: Fileless Malware Executing in Containers

Aqua Security

Our cyber research team detected a new type of attack that executes and runs malware straight from memory in containers, thus evading common defenses and static scanning. We found four container images in Docker Hub designed to execute fileless malware attacks.

Threat Alert: Kinsing Malware Attacks Targeting Container Environments

Aqua Security

Container Vulnerability Cloud Native Security Malware AttacksLately we’ve been witnessing a rise in the number of attacks that target container environments. We’ve been tracking an organized attack campaign that targets misconfigured open Docker Daemon API ports.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Uncover Malware Payload Executions Automatically with Tracee

Aqua Security

Now, Tracee is much more than just a system call tracer , it’s a powerful tool that can be used to perform forensic investigations and dynamic analysis of binaries – both are incredibly useful when looking for hidden malware.

GitHub-hosted malware calculates Cobalt Strike payload from Imgur pic


A new strand of malware uses Word files with macros to download a PowerShell script from GitHub. This PowerShell script further downloads a legitimate image file from image hosting service Imgur […]. News GitHub

Symantec Discovers Fourth Malware Strain Used in SolarWinds Attack


Cybersecurity firm Symantec has uncovered an additional piece of malware used in the SolarWinds attacks, becoming the fourth piece of malware associated with the wide-ranging compromise of the popular IT […]. News SolarWinds Symantec Symantec Endpoint Protection

Google Play is an ‘order of magnitude’ better at blocking malware

The Parallax

During a month that’s seen Android malware new and old plague the world’s most popular mobile operating system, Google says its Play Store is becoming more civilized and less like the Wild West. You have a lower probability of being infected by malware from Play than being hit by lightning,” Ahn says. A Google representative says the company detects “most” malware successfully uploaded to Google Play “within a day.” Ahn adds that Android malware is becoming more advanced.

AI Use Cases for Cyber and Malware Analysts


Cyber and malware analysts have a critical role in detecting and mitigating cyberattacks. In this post, we show you how to build a malware detection model using the largest known dataset, SOREL-20M (Sophos/ReversingLabs-20 Million). Malware Use Case. SoReL-20M Malware Data.

9 types of malware and how to recognize them


Grimes explain 9 types of malware and how they can affect you on CSO Online : People tend to play fast and loose with security terminology. However, it’s important to get your malware classifications straight because knowing how various types of malware spread is vital to containing and removing them. This concise malware […]. Read Roger A.

Dispelling Myths Around SGX Malware


SGX-based malware may not be as troublesome as believed. We'll explain why that is and how Symantec is ready to deal with such malware if they were to appear

Interview on Automated Malware Removal


Three Questions on Automated Malware Removal with Bob Gourley, Cognitio Corp and CTOVision. While there’s still an emphasis – and related spending – on malware detection, most incident response teams are actually overwhelmed by vast number of security alerts they receive. Effective malware detection is important, but only paired with response and removal can companies effectively prevent the malware that will enter the system from doing damage. By Bob Gourley.

Are you ready for state-sponsored zombie malware attacks?


In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]. Artificial Intelligence CTO Cyber Security Cyber Threats Internet of Things News Robots Cybersecurity Malware

Dell Data Protection Protected Workspace & Malware Prevention


The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. The evolution of malware has gone from low sophistication, such as script kiddies, to nation states (tier 1), who are more skilled and who specifically target individuals, or industries with data they intend to infiltrate. The malware is from external agents. Malware is all new, and we need to focus on containment and isolation.

Preinstalled mobile malware steals money in emerging markets


Phones branded “ Tecno ” —made by Shenzhen Transsion Holdings—appear to be preinstalled with malware. Smartphone users in emerging markets are being ripped off by suspiciously cheap handsets. Security, Information Security, Security Blogwatch, Privacy

Over Two-Thirds of Q1 Malware Hidden by HTTPS


Over two-thirds of malware detected in the first three months of the year was hidden in HTTPS encrypted tunnels in a bid to evade traditional AV, according to Watchguard. The security […].

Recorded Future: Cobalt Strike and Metasploit accounted for a quarter of all malware C2 servers in 2020


Cobalt Strike and Metasploit, two penetration testing toolkits usually employed by security researchers, have been used to host more than a quarter of all the malware command and control (C&C) […].

Android Agent Smith mobile malware hits millions of devices


Mobile malware dubbed Agent Smith has infected about 25 million devices, mainly in India and other Asian countries, but other countries have also been affected, including the UK and US, according to security researchers at Check Point Software Technologies. Disguised as a Google-related application, the malware exploits known Android vulnerabilities and automatically replaces installed apps […].

Covid-19 panic brings misinfo, malware, unintended consequences


From misinformation spread by your Facebook friends, through malware distribution, to the DDoS’ing of health agencies. The novel coronavirus is affecting the world of infosec. Security, Information Security, Security Blogwatch

Crypto-mining malware: Uncovering a cryptocurrency farm in a warehouse


Cyber AI discovered an extensive crypto-mining campaign in cardboard boxes in a disused warehouse. This blog discusses the rise in cryptocurrency farms and what this signals for the international cyber-threat landscape

Mirai malware infects CCTV camera


With cyber-attacks on the IoT devices becoming increasingly prevalent, this blog post details how Darktrace’s AI identified the Mirai malware in an Internet-connected CCTV camera, breaking down each stage of the attack life cycle

Scan Container Images for Vulnerabilities & Hidden Malware with Aqua Wave

Aqua Security

With an ever-evolving threat landscape, bad actors increasingly target container infrastructure, installing sophisticated malware into images that changes its behavior to evade detection.

Microsoft says new Dexphot malware infected more than 80,000 computers


Microsoft security engineers detailed today a new malware strain that has been infecting Windows computers since October 2018 to hijack their resources to mine cryptocurrency and generate revenue for the attackers. Named Dexphot, this malware reached its peak in mid-June this year, when its botnet reached almost 80,000 infected computers.

Botnet malware: Remote Desktop Protocol (RDP) attack


Internet-facing RDP servers are an increasingly common vector of compromise. This blog explains how one RDP infection nearly led to the creation of a botnet, had Darktrace AI not alerted the security team as soon as the attack began

Cybercriminals using Google Search as the latest trick to snare unsuspecting victims for malware attacks


It was only a matter of time before cybercriminals turned their attention to one of the most common activities on the internet— a Google search. The latest trick is using […]. News Balbix Balbix Inc

New Video: Automating Your Cyber Defenses Including Malware Removal


The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. Analysis Big Data Cloud Computing CTO Cyber Security DoD and IC Strategy The Future Trends Video Automation Chief information security officer CISO Computer security Malware By Bob Gourley.

Unit 42 Discovers First Known Malware Targeting Windows Containers

Palo Alto Networks

The Unit 42 cybersecurity consulting group published research on the first known malware targeting Windows containers, which was discovered by Unit 42 researcher Daniel Prizmant and named Siloscape.

Phishing Campaign Uses Fake Google reCAPTCHA to Distribute Malware


Sucuri researchers discovered that the campaign sent out malicious emails masquerading as a confirmation for a recent transaction. Digital attackers deployed this disguise in the hopes that employees at the targeted bank would click on a link to a malicious PHP file out of alarm. That file was responsible for loading a fake 404 error […]. Cyber Security News

HP aims to secure its PC portfolio with Sure Sense malware blocker


HP on Tuesday announced a bevy of PC updates and new features, as well as the formal release of HP Sure Sense, the company’s new software that uses AI to prevent and block malware in near-real-time, including ransomware and previously unknown malware.

Crypto-Mining Malware Outsmarting Image Scanners

Aqua Security

In previous crypto-mining attacks, we observed hackers investing little to no effort in hiding their malicious activities. They just ran the malicious container with all of its scripts and configuration files in clear text. This made the analysis of their malicious intent fairly easy. Container Security Image Vulnerability Scanning

What Can You Do About Malware In The Cloud?


Malware exists even there - and it spreads fast. And like any system with a physical backend, the cloud can easily be subject to a wide range of vulnerabilities - including malware. But malware on the cloud is a very real, and very present threat. The problem is that the malware components aren’t identifiable through traditional scanning simply because they aren’t assembled as malware until the moment of attack.Some exploits appear to be benign.”.

Old macOS component defeats malware researchers for 5 years


An AppleScript feature designed to compress scripts into pre-compiled form has allowed bad actors to evade security researchers for years. This cryptominer Trojan spread unchecked for some five years. Security, Information Security, Security Blogwatch

5 Ways Advanced Malware Evades the Sandbox


5 Ways Advanced Malware Evades the Sandbox Five Techniques You Can Do To Prepare for Evasive Advanced Malware Learn the five ways advanced malware evades detection and recommended techniques you can do to prepare for them. Fundamentals

New Grelos skimmer variant reveals overlap in Magecart group activities, malware infrastructure


A new variant of a skimmer has revealed the increasingly muddy waters associated with tracking groups involved in Magecart-style attacks. On Wednesday, researchers from RiskIQ described how a new Grelos […]. News RiskIQ

Trojan malware is back and it’s the biggest hacking threat to your business


Trojan malware attacks against business targets have rocketed in the last year, as cybercriminals alter their tactics away from short-term gain and in-your-face ransomware attacks towards more subtle, long-term campaigns with the aim of stealing information including banking information, personal data, and even intellectual property.

Smart Cloud Security: Block and Quarantine Zero-day Malware in the Cloud


The complexity of different types of malware continues to grow and zero-day malware is often missed by traditional security solutions. Netskope customers have deployed our unified, cloud-native platform to enforce policies across SaaS, IaaS, and the web to block and quarantine zero-day malware in the cloud as well as other critical use cases. Here’s use case #19: Block and quarantine zero-day malware in the cloud. Support quarantine workflows that are malware-centric.

A peek into malware analysis tools


So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of malicious programs — has grown into a complex mix of technologies in data science and human interpretation.

A peek into malware analysis tools


So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of malicious programs — has grown into a complex mix of technologies in data science and human interpretation.

Article: Q&A on the Book Cybersecurity Threats, Malware Trends and Strategies

InfoQ Articles

The book Cybersecurity Threats, Malware Trends and Strategies by Tim Rains provides a overview of the threat landscape over a twenty year period. It provides insights and solutions that can be used to develop an effective cybersecurity strategy and improve vulnerability management.

Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly


The post Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly appeared first on Lacework. Blog bitcoin cloud threats malwareThe combination of an anonymous currency and leaked government security exploits have led to a rising new threat for system administrators. While cybercriminals have long featured an assortment of ideologically driven activists or rising stars hoping to make a name for themselves with their peers, the vast majority of them are motivated by money.

Corporate Installed Malware: Security Tools


First Published: April 4, 2017, By Mark McCullough?—?Technical Technical Consultant Former Mozilla developer, Robert O’Callahan recently joined the growing chorus of those openly stating that anti-virus products cause more security harm than they prevent. He’s right, but that’s not the only security product that should have the harsh glare of security shined on it. It’s time for information security to eat its own dog food.

Cryptojacking Malware Gets Creative with Variable Names


This malware sample may unlock your variable naming writer’s block. The post Cryptojacking Malware Gets Creative with Variable Names appeared first on Lacework. Have you ever tried using your favorite foods? We hadn’t either until we came across this one. This Bash script was seen following the Confluence exploits we recently blogged about. The unique variable naming isn’t the only thing that caught our eye. The script uses [.]. Read More.