Threat Alert: Fileless Malware Executing in Containers

Aqua Security

Our cyber research team detected a new type of attack that executes and runs malware straight from memory in containers, thus evading common defenses and static scanning. We found four container images in Docker Hub designed to execute fileless malware attacks.

“Spytech Necro” – Keksec’s Latest Python Malware

Lacework

The post “Spytech Necro” – Keksec’s Latest Python Malware appeared first on Lacework.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Mirai goes Stealth – TLS & IoT Malware

Lacework

The post Mirai goes Stealth – TLS & IoT Malware appeared first on Lacework.

The Ransomware and Malware Conundrum

Dots and Bridges

The Ransomware and Malware Conundrum. This high-level session provides real answers for protection and prevention from Ransomware and Malware for an ever- expanding federal network enterprise. The post The Ransomware and Malware Conundrum appeared first on Dots and Bridges.

Threat Alert: Kinsing Malware Attacks Targeting Container Environments

Aqua Security

Container Vulnerability Cloud Native Security Malware AttacksLately we’ve been witnessing a rise in the number of attacks that target container environments. We’ve been tracking an organized attack campaign that targets misconfigured open Docker Daemon API ports.

Uncover Malware Payload Executions Automatically with Tracee

Aqua Security

Now, Tracee is much more than just a system call tracer , it’s a powerful tool that can be used to perform forensic investigations and dynamic analysis of binaries – both are incredibly useful when looking for hidden malware.

GitHub-hosted malware calculates Cobalt Strike payload from Imgur pic

CTOvision

A new strand of malware uses Word files with macros to download a PowerShell script from GitHub. This PowerShell script further downloads a legitimate image file from image hosting service Imgur […]. News GitHub

Symantec Discovers Fourth Malware Strain Used in SolarWinds Attack

CTOvision

Cybersecurity firm Symantec has uncovered an additional piece of malware used in the SolarWinds attacks, becoming the fourth piece of malware associated with the wide-ranging compromise of the popular IT […]. News SolarWinds Symantec Symantec Endpoint Protection

Dispelling Myths Around SGX Malware

Symantec

SGX-based malware may not be as troublesome as believed. We'll explain why that is and how Symantec is ready to deal with such malware if they were to appear

AI Use Cases for Cyber and Malware Analysts

DataRobot

Cyber and malware analysts have a critical role in detecting and mitigating cyberattacks. In this post, we show you how to build a malware detection model using the largest known dataset, SOREL-20M (Sophos/ReversingLabs-20 Million). Malware Use Case. SoReL-20M Malware Data.

Interview on Automated Malware Removal

CTOvision

Three Questions on Automated Malware Removal with Bob Gourley, Cognitio Corp and CTOVision. While there’s still an emphasis – and related spending – on malware detection, most incident response teams are actually overwhelmed by vast number of security alerts they receive. Effective malware detection is important, but only paired with response and removal can companies effectively prevent the malware that will enter the system from doing damage. By Bob Gourley.

Preinstalled mobile malware steals money in emerging markets

TechBeacon

Phones branded “ Tecno ” —made by Shenzhen Transsion Holdings—appear to be preinstalled with malware. Smartphone users in emerging markets are being ripped off by suspiciously cheap handsets. Security, Information Security, Security Blogwatch, Privacy

9 types of malware and how to recognize them

CTOvision

Grimes explain 9 types of malware and how they can affect you on CSO Online : People tend to play fast and loose with security terminology. However, it’s important to get your malware classifications straight because knowing how various types of malware spread is vital to containing and removing them. This concise malware […]. Read Roger A.

Dell Data Protection Protected Workspace & Malware Prevention

CTOvision

The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. The evolution of malware has gone from low sophistication, such as script kiddies, to nation states (tier 1), who are more skilled and who specifically target individuals, or industries with data they intend to infiltrate. The malware is from external agents. Malware is all new, and we need to focus on containment and isolation.

Are you ready for state-sponsored zombie malware attacks?

CTOvision

In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]. Artificial Intelligence CTO Cyber Security Cyber Threats Internet of Things News Robots Cybersecurity Malware

Grayfly: Chinese Threat Actor Uses Newly-discovered Sidewalk Malware

Symantec

Recent campaigns involved exploits against Exchange and MySQL servers. Group has heavy focus on telecoms sector

Unit 42 Discovers First Known Malware Targeting Windows Containers

Palo Alto Networks

The Unit 42 cybersecurity consulting group published research on the first known malware targeting Windows containers, which was discovered by Unit 42 researcher Daniel Prizmant and named Siloscape.

Over Two-Thirds of Q1 Malware Hidden by HTTPS

CTOvision

Over two-thirds of malware detected in the first three months of the year was hidden in HTTPS encrypted tunnels in a bid to evade traditional AV, according to Watchguard. The security […].

Mirai malware infects CCTV camera

Darktrace

With cyber-attacks on the IoT devices becoming increasingly prevalent, this blog post details how Darktrace’s AI identified the Mirai malware in an Internet-connected CCTV camera, breaking down each stage of the attack life cycle

Malware: Bad for business and the environment

Capgemini

The risks of malware. The harsh reality is that malware doesn’t only threaten data security – it can also have a direct impact on sustainability initiatives and impede enterprise climate targets. Malware can damage these checkpoints, making them unreliable and ineffective.

Crypto-mining malware: Uncovering a cryptocurrency farm in a warehouse

Darktrace

Cyber AI discovered an extensive crypto-mining campaign in cardboard boxes in a disused warehouse. This blog discusses the rise in cryptocurrency farms and what this signals for the international cyber-threat landscape

Recorded Future: Cobalt Strike and Metasploit accounted for a quarter of all malware C2 servers in 2020

CTOvision

Cobalt Strike and Metasploit, two penetration testing toolkits usually employed by security researchers, have been used to host more than a quarter of all the malware command and control (C&C) […].

New Grelos skimmer variant reveals overlap in Magecart group activities, malware infrastructure

CTOvision

A new variant of a skimmer has revealed the increasingly muddy waters associated with tracking groups involved in Magecart-style attacks. On Wednesday, researchers from RiskIQ described how a new Grelos […]. News RiskIQ

Botnet malware: Remote Desktop Protocol (RDP) attack

Darktrace

Internet-facing RDP servers are an increasingly common vector of compromise. This blog explains how one RDP infection nearly led to the creation of a botnet, had Darktrace AI not alerted the security team as soon as the attack began

Android Agent Smith mobile malware hits millions of devices

CTOvision

Mobile malware dubbed Agent Smith has infected about 25 million devices, mainly in India and other Asian countries, but other countries have also been affected, including the UK and US, according to security researchers at Check Point Software Technologies. Disguised as a Google-related application, the malware exploits known Android vulnerabilities and automatically replaces installed apps […].

Covid-19 panic brings misinfo, malware, unintended consequences

TechBeacon

From misinformation spread by your Facebook friends, through malware distribution, to the DDoS’ing of health agencies. The novel coronavirus is affecting the world of infosec. Security, Information Security, Security Blogwatch

Microsoft says new Dexphot malware infected more than 80,000 computers

CTOvision

Microsoft security engineers detailed today a new malware strain that has been infecting Windows computers since October 2018 to hijack their resources to mine cryptocurrency and generate revenue for the attackers. Named Dexphot, this malware reached its peak in mid-June this year, when its botnet reached almost 80,000 infected computers.

Scan Container Images for Vulnerabilities & Hidden Malware with Aqua Wave

Aqua Security

With an ever-evolving threat landscape, bad actors increasingly target container infrastructure, installing sophisticated malware into images that changes its behavior to evade detection.

New Video: Automating Your Cyber Defenses Including Malware Removal

CTOvision

The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. Analysis Big Data Cloud Computing CTO Cyber Security DoD and IC Strategy The Future Trends Video Automation Chief information security officer CISO Computer security Malware By Bob Gourley.

Cybercriminals using Google Search as the latest trick to snare unsuspecting victims for malware attacks

CTOvision

It was only a matter of time before cybercriminals turned their attention to one of the most common activities on the internet— a Google search. The latest trick is using […]. News Balbix Balbix Inc

Article: Q&A on the Book Cybersecurity Threats, Malware Trends and Strategies

InfoQ Articles

The book Cybersecurity Threats, Malware Trends and Strategies by Tim Rains provides a overview of the threat landscape over a twenty year period. It provides insights and solutions that can be used to develop an effective cybersecurity strategy and improve vulnerability management.

Fast and stealthy malware attempts to steal public data from government organization

Darktrace

Darktrace’s Immune System recently detected Glupteba malware attempting to steal sensitive information from a government organization. This blog post details how targeted and autonomous actions from Darktrace Antigena would have contained the attack

Old macOS component defeats malware researchers for 5 years

TechBeacon

An AppleScript feature designed to compress scripts into pre-compiled form has allowed bad actors to evade security researchers for years. This cryptominer Trojan spread unchecked for some five years. Security, Information Security, Security Blogwatch

Smart Cloud Security: Block and Quarantine Zero-day Malware in the Cloud

Netskope

The complexity of different types of malware continues to grow and zero-day malware is often missed by traditional security solutions. Netskope customers have deployed our unified, cloud-native platform to enforce policies across SaaS, IaaS, and the web to block and quarantine zero-day malware in the cloud as well as other critical use cases. Here’s use case #19: Block and quarantine zero-day malware in the cloud. Support quarantine workflows that are malware-centric.

Phishing Campaign Uses Fake Google reCAPTCHA to Distribute Malware

CTOvision

Sucuri researchers discovered that the campaign sent out malicious emails masquerading as a confirmation for a recent transaction. Digital attackers deployed this disguise in the hopes that employees at the targeted bank would click on a link to a malicious PHP file out of alarm. That file was responsible for loading a fake 404 error […]. Cyber Security News

HP aims to secure its PC portfolio with Sure Sense malware blocker

CTOvision

HP on Tuesday announced a bevy of PC updates and new features, as well as the formal release of HP Sure Sense, the company’s new software that uses AI to prevent and block malware in near-real-time, including ransomware and previously unknown malware.

Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly

Lacework

The post Cryptomining Malware Using NSA Hacking Code is Spreading Rapidly appeared first on Lacework. Blog bitcoin cloud threats malwareThe combination of an anonymous currency and leaked government security exploits have led to a rising new threat for system administrators. While cybercriminals have long featured an assortment of ideologically driven activists or rising stars hoping to make a name for themselves with their peers, the vast majority of them are motivated by money.

A peek into malware analysis tools

AlienVault

So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of malicious programs — has grown into a complex mix of technologies in data science and human interpretation.

A peek into malware analysis tools

AlienVault

So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of malicious programs — has grown into a complex mix of technologies in data science and human interpretation.

Corporate Installed Malware: Security Tools

taos

First Published: April 4, 2017, By Mark McCullough?—?Technical Technical Consultant Former Mozilla developer, Robert O’Callahan recently joined the growing chorus of those openly stating that anti-virus products cause more security harm than they prevent. He’s right, but that’s not the only security product that should have the harsh glare of security shined on it. It’s time for information security to eat its own dog food.