Ransomware that’s 100% pure JavaScript, no download required

Monday, June 20th, 2016

SophosLabs just alerted us to an intriguing new ransomware sample dubbed RAA. This one is blocked by Sophos as JS/Ransom-DDL, and even though it’s not widespread, it’s an interesting development in the ransomware scene. Here’s why. Ransomware, like any sort of malware, can get into your organisation in many different ways: buried inside ...

Trend Micro password manager had remote command execution holes and dumped data to anyone

Tuesday, January 12th, 2016

A password management tool installed by default alongside Trend Micro AntiVirus was found vulnerable to remote code execution thanks to the work of Google's Project Zero security team. Discovered by Project Zero's Tavis Ormandy, the password tool was built using JavaScript and node.js, and started a local web server that would ...

Hackers use anti-adblocking service to deliver nasty malware attack

Monday, November 2nd, 2015

More than 500 websites that used a free analytics service inadvertently exposed their visitors to a nasty malware attack made possible by a hack of PageFair, the anti-adblocking company that provided the analytics. The compromise started in the last few minutes of Halloween with a spearphishing e-mail that ultimately gave the ...

New Stegosploit Tool Hides Malware Inside Internet Images For Instant Drive-by Pwning

Monday, June 1st, 2015

Go online for five minutes. Visit a few webpages. How many pictures do you see? With the media rich nature of the web, chances are your answer is in the hundreds. It is in this space the future of malicious cyber attacks could be embedded. In a presentation at Hack In ...

New crypto-ransomware “quarantines” files, downloads info-stealer

Tuesday, April 7th, 2015

Trend Micro researchers have found and analyzed a new piece of crypto-ransomware: CryptVault encrypts files, makes them look like files quarantined by an AV solution, asks for ransom and, finally, downloads info-stealer malware. It arrives on target computers after the user has been tricked into downloading and running a malicious attachment ...