Protecting Hadoop Clusters From Malware Attacks

Cloudera Engineering

Two new strains of malware– XBash and DemonBot –are targeting Apache Hadoop servers for Bitcoin mining and DDOS purposes. This blog post describes the mechanism this malware uses and offers specific actions to protect your Hadoop-based clusters. A History of Hadoop Malware.

Google Play is an ‘order of magnitude’ better at blocking malware

The Parallax

During a month that’s seen Android malware new and old plague the world’s most popular mobile operating system, Google says its Play Store is becoming more civilized and less like the Wild West. Ahn adds that Android malware is becoming more advanced.

Meet ‘misinfosec’: Fighting fake news like it’s malware

The Parallax

Researcher Sara-Jayne Terp shows in her misinformation pyramid how attackers and defenders follow similar patterns to malware campaigns. Whether attackers are trying to spread malware or disinformation, they have to study the people they’re targeting.

Dispelling Myths Around SGX Malware


SGX-based malware may not be as troublesome as believed. We'll explain why that is and how Symantec is ready to deal with such malware if they were to appear

Hacks, cracks, and malware attacks – July 2019 


Each month, we’ll take a look at what’s happening on the front lines of the battle against various types of cyber-attacks, new variants of malicious software, phishing and other scams, vulnerability exploits, and other threats to the security of your networks, systems, and data.

Crypto-Mining Malware Outsmarting Image Scanners

Aqua Security

In previous crypto-mining attacks, we observed hackers investing little to no effort in hiding their malicious activities. They just ran the malicious container with all of its scripts and configuration files in clear text. This made the analysis of their malicious intent fairly easy.

Cryptojacking Malware Gets Creative with Variable Names


This malware sample may unlock your variable naming writer’s block. The post Cryptojacking Malware Gets Creative with Variable Names appeared first on Lacework. Have you ever tried using your favorite foods? We hadn’t either until we came across this one.

5 Ways Advanced Malware Evades the Sandbox


5 Ways Advanced Malware Evades the Sandbox Five Techniques You Can Do To Prepare for Evasive Advanced Malware Learn the five ways advanced malware evades detection and recommended techniques you can do to prepare for them. Fundamentals

Corporate Installed Malware: Security Tools


First Published: April 4, 2017, By Mark McCullough?—?Technical Technical Consultant Former Mozilla developer, Robert O’Callahan recently joined the growing chorus of those openly stating that anti-virus products cause more security harm than they prevent.

Stegoloader Malware: A Wolf in Sheep's Clothing


Stegoloader Malware: A Wolf in Sheep's Clothing Its Path to Infiltrating Systems and Extracting Data Learn more about Stegoloader, a stealthy malware family that has been active since 2013 and yet is relatively unknown. Fundamentals

Outmaneuvering Advanced and Evasive Malware Threats


Outmaneuvering Advanced and Evasive Malware Threats What are Advanced and Evasive Threats? Learn how advanced malware protection is designed to continuously monitor for, offload, and detonate files safely away from the main environment. Fundamentals

SecureAge Integrates Artificial Intelligence Powered APEX Anti-Malware Engine in VirusTotal

The post SecureAge Integrates Artificial Intelligence Powered APEX Anti-Malware Engine in VirusTotal appeared first on

A peek into malware analysis tools


So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot.

9 types of malware and how to recognize them


Grimes explain 9 types of malware and how they can affect you on CSO Online : People tend to play fast and loose with security terminology. However, it’s important to get your malware classifications straight because knowing how various types of malware spread is vital to containing and removing them. This concise malware […]. Read Roger A.

Interview on Automated Malware Removal


Three Questions on Automated Malware Removal with Bob Gourley, Cognitio Corp and CTOVision. While there’s still an emphasis – and related spending – on malware detection, most incident response teams are actually overwhelmed by vast number of security alerts they receive.

Tales From the SOC: Hunting for Persistent Malware

Palo Alto Networks

Here’s an exclusive preview of how we’ve used Cortex XDR to hunt, identify, and remediate a piece of persistent malware. How to hunt for persistent malware. In the below screenshot, oMO.exe is identified as malware, which is why it shows up in red.

Microsoft says new Dexphot malware infected more than 80,000 computers


Microsoft security engineers detailed today a new malware strain that has been infecting Windows computers since October 2018 to hijack their resources to mine cryptocurrency and generate revenue for the attackers. Named Dexphot, this malware reached its peak in mid-June this year, when its botnet reached almost 80,000 infected computers.

Dell Data Protection Protected Workspace & Malware Prevention


The video below explores DDP Protected Workspace and uniquely addresses healthcare regulations related to malware prevention. Individuals take malware and obtain the characteristics pertaining to the individual and find ways to get around the malware inspections in place.

Android Agent Smith mobile malware hits millions of devices


Mobile malware dubbed Agent Smith has infected about 25 million devices, mainly in India and other Asian countries, but other countries have also been affected, including the UK and US, according to security researchers at Check Point Software Technologies. Disguised as a Google-related application, the malware exploits known Android vulnerabilities and automatically replaces installed apps […].

Smart Cloud Security: Block and Quarantine Zero-day Malware in the Cloud


The complexity of different types of malware continues to grow and zero-day malware is often missed by traditional security solutions. Here’s use case #19: Block and quarantine zero-day malware in the cloud. Support quarantine workflows that are malware-centric.

Are you ready for state-sponsored zombie malware attacks?


In hindsight, the blog post should have been titled “Are you ready for state-sponsored zombie malware attacks?” Zombie malware combines the most deadly aspects of malware and zombie computers into one horrible mess. Typically malware gets […]. Artificial Intelligence CTO Cyber Security Cyber Threats Internet of Things News Robots Cybersecurity Malware

Catch Them If You Can: E-banking Malware Fraud


Catch Them If You Can: E-banking Malware Fraud Frank Abagnale shot to notoriety in the 1960s for defrauding banks of millions of dollars with meticulously forged cheques

A peek into malware analysis tools


So, what is malware analysis and why should I care? With the commercialization of cybercrime, malware variations continue to increase at an alarming rate, and this is putting many a defender on their back foot. Malware analysis — the basis for understanding the inner workings and intentions of malicious programs — has grown into a complex mix of technologies in data science and human interpretation.

Malware Analysis using Osquery | Part 3


In part 1 of this blog series, we analyzed malware behaviour, and, in part 2 , we learned how to detect persistence tricks used in malware attacks. Imagine your company is being targeted by one of the latest threats and you want to detect the activity the malware is performing.

Malware Analysis using Osquery Part 2


In the first part of this series, we saw how you can use Osquery to analyze and extract valuable information about malware’s behavior. In this post, we are going to see another common technique that malware uses persistence. Here is an example of OilRig malware.

New Video: Automating Your Cyber Defenses Including Malware Removal


The video at this link and embedded below provides an overview of conclusions from CTOvision research into ways to automate the removal of cyber threats (including malware) from your enterprise. By Bob Gourley.

Cloud Workload Protection Products at Risk with New Cyber Attack


What happens, then, when a cyber attack, namely malware, is used to uninstall security software designed specifically to prevent public cloud infrastructure compromise? This is precisely what happened with a new malware variant discovered by Palo Alto Networks’ Unit 42.

Linux 83

Malware Analysis using Osquery Part 1


In this blog series, we’ll analyze different malware families, looking at the types of events generated on the endpoint and how we can use Osquery to detect them. The dropper spreads through email phishing and downloads the malware using a malicious Office macro.

Aspen Security Forum: Malware Gets Smarter, Faster and More Destructive


As attackers try out new technologies and stratagems to catch their victims off guard, many companies still haven’t got the memo

HP aims to secure its PC portfolio with Sure Sense malware blocker


HP on Tuesday announced a bevy of PC updates and new features, as well as the formal release of HP Sure Sense, the company’s new software that uses AI to prevent and block malware in near-real-time, including ransomware and previously unknown malware.

Are You Ready for Malware-as-a-Service?


New types of attacks provide multi-layered risk that require a multi-layered response

Phishing Campaign Uses Fake Google reCAPTCHA to Distribute Malware


Sucuri researchers discovered that the campaign sent out malicious emails masquerading as a confirmation for a recent transaction. Digital attackers deployed this disguise in the hopes that employees at the targeted bank would click on a link to a malicious PHP file out of alarm. That file was responsible for loading a fake 404 error […]. Cyber Security News

Trojan malware is back and it’s the biggest hacking threat to your business


Trojan malware attacks against business targets have rocketed in the last year, as cybercriminals alter their tactics away from short-term gain and in-your-face ransomware attacks towards more subtle, long-term campaigns with the aim of stealing information including banking information, personal data, and even intellectual property.

Malware Uses Your PC to send 30K Sextortion Emails Per Hour


First developed to distribute various malware like Gandcrab, Pony, and Pushdo to email users for the purpose of turning victim accounts into hosts for fraudulent cryptomining operations, Phorpiex now has a new trick up its sleeve. The Phorpiex (aka Trik) botnet has existed for almost 10 years.

Shining a light on Shamoon 3: What cyber AI revealed about the data-wiping malware


During an extended trial in the network of a global company, Darktrace observed a Shamoon-powered cyber-attack

What Can You Do About Malware In The Cloud?


Malware exists even there - and it spreads fast. And like any system with a physical backend, the cloud can easily be subject to a wide range of vulnerabilities - including malware. But malware on the cloud is a very real, and very present threat. The problem is that the malware components aren’t identifiable through traditional scanning simply because they aren’t assembled as malware until the moment of attack.Some exploits appear to be benign.”.

FBI’s router reboot call reminds us why to check for updates

The Parallax

On May 25, the FBI issued a clarion call to a broad swath of Wi-Fi router owners: To clear out a potential botnet malware infection, reboot your router. The actors used VPNFilter malware to target small office and home office routers.

Gallmaker: New Attack Group Eschews Malware to Live off the Land


A new attack group is targeting government, military, and defense sectors in what appears to be a classic espionage campaign

IT firms, telcos among dozens hacked in new info-stealing malware attack


A cyber espionage group is deploying a new type of trojan malware against telecommunications, information technology, and government organisations. Dubbed Seedworm, the group has been operating since at least 2017, and although it predominantly looks to infiltrate organisations in the Middle East, organisations based in Europe and North America have also been targets. The hacking operation — […].

Hidden inside Dark Caracal’s espionage apps: Old tech

The Parallax

Its success was predicated not on “zero-day” vulnerabilities or new forms of malicious software, but rather on older, known malware delivered via an all-too-familiar method: phishing. The malware included hacked versions of end-to-end encrypted communication apps Signal and WhatsApp.