Free Republic 2nd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $48,107
54%  
Woo hoo!! And we're now over 54%!! Thank you all very much!! God bless.

Keyword: malware

Brevity: Headers | « Text »
  • CIA's Windows XP to Windows 10 malware: WikiLeaks reveals Athena

    05/22/2017 1:07:19 PM PDT · by Enlightened1 · 12 replies
    ZDNET ^ | 05/22/17 | Liam Tung
    The latest file revealed in WikiLeaks' Vault 7 catalog of CIA hacking toolkit is Athena, a surveillance tool apparently designed to capture communications from Windows XP to Windows 10 machines. Details of the Athena malware are available in a document allegedly created by the CIA in November 2015. The malware is said to have been made in conjunction with US cybersecurity firm Siege Technologies, which was acquired by Nehemiah Security late last year. Athena is the ninth Vault 7 release of CIA hacking tools for mobile and desktop systems. WikiLeaks has been revealing one tool at the end of each...
  • 'Accidental hero' halts ransomware attack and warns: this is not over

    05/13/2017 9:52:01 AM PDT · by Leaning Right · 86 replies
    The Guardian ^ | May 13, 2017 | Nadia Khomami and Olivia Solon
    The “accidental hero” who halted the global spread of an unprecedented ransomware attack by registering a garbled domain name hidden in the malware has warned the attack could be rebooted. *snip* ...the spread of the attack was brought to a sudden halt when one UK cybersecurity researcher tweeting as @malwaretechblog, with the help of Darien Huss from security firm Proofpoint, found and inadvertently activated a “kill switch” in the malicious software.
  • PSA: Russian-Backed Flash Trojan Ported to macOS

    05/07/2017 9:38:28 AM PDT · by Swordmaker · 5 replies
    The Mac Observer ^ | May 7, 2017 | By Bryan Chaffin
    A Russian-backed bit of malware called Snake has been ported to macOS, according to security blog Fox-IT (via Malwarebytes Labs). Snake is a trojan disguised to look like a Flash installer, and it’s been around on Windows since 2008 and Linux since 2014.Snake Trojan on macOS Snake Trojan on macOS While malware, Snake is technically a Trojan, so it relies on tricking the user into installing it with their own password. It’s in the wild in a file named Install Adobe Flash Player.app.zip. The Snake Trojan on macOS installer is signed by a (currently) legit developer certificate issued to a...
  • Don't click that Google Doc invite, but if you did, here's what to do

    05/03/2017 3:47:57 PM PDT · by iowamark · 20 replies
    NJ.com ^ | May 03, 2017 | Spencer Kent
    You've probably heard about that treacherous phishing scheme going around the Internet masquerading as a Google Doc invitation. Worse, maybe you've fallen victim to the scam, yourself. For those still unscathed, here are a few tips to keep you nice and safe. As for all you innocent bystanders out there panicking after clicking on one of the links, don't freak out. Take a deep breath and read this carefully. We'll get through this together. First, what is it? People have been reporting getting emails from a known contact seeking to share a Google Doc with them. After clicking the invite...
  • New macOS malware OSX/Dok requires a lot of manual steps

    05/01/2017 10:29:18 AM PDT · by Swordmaker · 5 replies
    MacWorld ^ | May 1, 2017 | By Glenn Fleishman
    OSX/Dok is now blocked, but it didn’t rely on any system exploits to install. Check Point, a security analysis firm, posted an alarming blog entry on Thursday about a new malicious macOS Trojan horse that appeared able to bypass Apple’s protections and could hijack and sniff all the traffic entering and leaving a Mac without a user’s knowledge. This would include SSL/TLS encrypted connections, because the malware installs a local digital certificate that overrides normal man-in-the-middle warnings and protections. The malware, called OSX/Dok by Check Point, spreads via a phishing attack that Check Point says mostly targets European users. One...
  • This anime malware holds your files ransom until you beat a game's ludicrous score

    04/14/2017 8:17:14 PM PDT · by TigerLikesRooster · 6 replies
    PC Gamer ^ | Apr. 10, 2017 | Mat Paget
    This anime malware holds your files ransom until you beat a game's ludicrous score By Mat Paget 5 days ago If you download Rensenware, you better be ready to get really dang good at playing Touhou Seirensen There's a lot of nonsense on the internet about whether anime is "good" or "a mistake," but this story definitely makes me lean a little towards the latter. A new malware called Rensenware is somewhat of a joke on Ransomeware, a type of malware that holds your files ransom until you pay the hacker a certain amount of money. Rensenware, however, hold your...
  • Star Trek Themed Kirk Ransomware and a Spock Decryptor!

    03/17/2017 5:13:53 PM PDT · by LouieFisk · 9 replies
    Bleeping Computer ^ | March 16, 2017 | Lawrence Abrams
    Boldly going where no man has gone before, the Kirk Ransomware brings so much nerdy goodness to the table that it could make anyone in IT interested. We have Star Trek, Low Orbital Ion Cannons, a cryptocurrency payment other than Bitcoin, and a decryptor named Spock! Need I say more? Discovered today by Avast malware researcher Jakub Kroustek, the Kirk Ransomware is written in Python and may be the first ransomware to utilize Monero as the ransom payment of choice.
  • Preinstalled Malware Targeting Mobile Users (Android)

    03/14/2017 9:59:05 AM PDT · by Swordmaker · 7 replies
    CheckPoint ^ | March 14, 2017 | by Oren Koriat, Check Point Mobile Research Team
    The Check Point Mobile Threat Prevention has recently detected a severe infection in 36 Android devices, belonging to a large telecommunications company and a multinational technology company. While this is not unusual, one detail of the attacks stands out. In all instances, the malware was not downloaded to the device as a result of the users’ use, it arrived with it.According to the findings, the malware were already present on the devices even before the users received them. The malicious apps were not part of the official ROM supplied by the vendor, and were added somewhere along the supply...
  • Coincidence or were the Clintons in on Communications Monitoring of Trump & His Advisers

    03/07/2017 5:41:07 AM PST · by ReformedMedia · 6 replies
    The Washington Standard ^ | 03-07-2017 | Tim Brown
    Either this is an incredible coincidence or, more likely, Bill and Hillary Clinton were in on monitoring President Donald Trump and some of his advisers. Bill Clinton met secretly with then Attorney General Loretta Lynch at the Phoenix Sky Harbor International Airport on June 27, 2016.  This occurred around the same time the Obama administration filed a request with the Foreign Intelligence Surveillance Court (FISA) to monitor communications involving Donald Trump and several advisers. DC Whispers reported on Sunday: Today (Sunday) Obama operatives were out in full force, as predicted, spinning deflection to a compliant Mainstream Media. The gist of this deflection...
  • Vault 7: CIA Hacking Tools Revealed

    03/07/2017 5:39:22 AM PST · by MNDude · 51 replies
    Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency. The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election. Recently, the CIA lost control of the majority of its hacking...
  • New macOS ransomware spotted in the wild

    02/22/2017 5:15:34 PM PST · by Swordmaker · 10 replies
    Macworld ^ | February 22, 2017 | By Lucian Constantin
    The program’s creator asks for payments but doesn’t have the encryption key to unlock victims’ files A new file-encrypting ransomware program for macOS is being distributed through BitTorrent websites, and users who fall victim to it won’t be able to recover their files, even if they pay. Crypto ransomware programs for macOS are rare. This is the second such threat found in the wild so far, and it’s a poorly designed one. The program was named OSX/Filecoder.E by the malware researchers from antivirus vendor ESET who found it. OSX/Filecoder.E masquerades as a cracking tool for commercial software like Adobe Premiere...
  • Adobe Issues Critical Security Update for Flash Player on Mac

    02/17/2017 11:48:41 AM PST · by Swordmaker · 12 replies
    MacRumors ^ | Friday February 17, 2017 5:51 AM PST | by Joe Rossignol
    Adobe this week released Flash Player version 24.0.0.221 to "address critical vulnerabilities that could potentially allow an attacker to take control of the affected system," including Mac, Windows, Linux, and Chrome OS. Mac users with Flash Player version 24.0.0.194 or earlier installed should immediately update to the latest version using the built-in update mechanism. The update is also available from the Adobe Flash Player Download Center. Flash Player users who had enabled the option to "allow Adobe to install updates" will receive the update automatically. Likewise, Google Chrome will automatically update Flash Player to version 24.0.0.221. Select "About Google Chrome"...
  • Russian cyberspies blamed for U.S. election hacks are now targeting Macs

    02/14/2017 6:28:55 PM PST · by Swordmaker · 13 replies
    Macworld ^ | FEB 14, 2017 10:45 AM PT | By Lucian Constantin
    Security researchers found a macOS version of the X-Agent malware used by the APT28 cyberespionage Security researchers have discovered a macOS malware program that’s likely part of the arsenal used by the Russian cyberespionage group blamed for hacking into the U.S. Democratic National Committee last year. The group, which is known in the security industry under different names, including Fancy Bear, Pawn Storm, and APT28, has been operating for almost a decade. It is believed to be the sole user and likely developer of a Trojan program called Sofacy or X-Agent. X-Agent variants for Windows, Linux, Android, and iOS have...
  • Mac malware, possibly made in Iran, targets US defense industry (Doesn't work)

    02/07/2017 10:57:59 PM PST · by Swordmaker · 16 replies
    MacDailyNews ^ | Tuesday, February 7, 2017 · 4:50 pm
    “Just because you’re using a Mac doesn’t mean you’re safe from hackers,” Michael Kan reports for IDG News Service. “That’s what two security researchers are warning, after finding a Mac-based malware that may be an attempt by Iranian hackers to target the U.S. defense industry.” “The malware, called MacDownloader, was found on a website impersonating the U.S. aerospace firm United Technologies, according to a report from Claudio Guarnieri and Collin Anderson, who are researching Iranian cyberespionage threats,” Kan reports. “The fake site was previously used in a spear phishing email attack to spread Windows malware and is believed to be...
  • Hamas sets 'honey traps' to hack Israeli soldiers' phones: army

    01/12/2017 7:05:56 PM PST · by markomalley · 6 replies
    Reuters ^ | 1/11/16 | Maayan Lubell
    Using photos of young women and Hebrew slang, the Palestinian militant group Hamas chatted up dozens of Israeli soldiers online, gaining control of their phone cameras and microphones, the military said on Wednesday. An officer, who briefed reporters on the alleged scam, said the Islamist group that runs the Gaza Strip uncovered no major military secrets in the intelligence-gathering operation. Hamas spokesman Fawzi Barhoum declined to comment. Mainly using Facebook, Hamas used fake online identities and photos of young women, apparently found on the Internet, to lure soldiers in, the officer said. "Just a second, I'll send you a photo,...
  • Ransomware spiked 6,000% in 2016 and most victims paid the hackers, IBM finds

    12/19/2016 5:28:33 AM PST · by TigerLikesRooster · 11 replies
    CNBC ^ | 14 Dec 2016 | Harriet Taylor
    Ransomware spiked 6,000% in 2016 and most victims paid the hackers, IBM finds Harriet Taylor 14 Dec 2016 Spam emails loaded with ransomware — malware that scrambles data and demands a ransom to decode it — increased 6,000 percent this year compared with 2015, a new study from IBM Security found. Ransomware was in almost 40 percent of all spam messages in 2016. The problem is, the business model works: 70 percent of business victims paid the hackers to get their data back, the study found. Of those who paid, 50 percent paid more than $10,000 and 20 percent paid...
  • Android Malware Used to Hack and Steal a Tesla Car

    12/01/2016 10:12:18 PM PST · by Swordmaker · 15 replies
    BleepingComputer.com ^ | November 25, 2016 | By Catalin Cimpanu
    By infecting a Tesla owner's phone with Android malware, a car thief can hack and then steal a Tesla car, security researchers have revealed this week. Previous attempts to hack Tesla cars attacked the vehicle's on-board software itself. This is how Chinese security researchers from Keen Lab have managed to hack a Tesla Model S last month, allowing an attacker to control a car from 12 miles away. Security experts from Norwegian security firm Promon have taken a different approach, and instead of trying complicated attacks on the car's firmware, they have chosen to go after Tesla's Android app...
  • Android 'Gooligan' Hackers Just Scored The Biggest Ever Theft Of Google Accounts

    11/30/2016 10:03:24 AM PST · by Swordmaker · 16 replies
    Forbes ^ | November 30, 2016 | By Thomas Fox-Brewster
    More than a million Android phones are infected with Gooligan, a strain of malware Google is fighting in earnest. Cybercriminals used the spyware to steal 1.3 million Google accounts in the last four months, researchers warned. (AP Photo/Paul Sakuma) A new variant of Android malware is responsible for what’s believed to be the biggest single theft of Google accounts on record. The so-called Gooligan strain has infected as many as 1.3 million Android phones since August, completely prizing the devices open and stealing the tokens users are given to verify they are authorized to access their accounts. It’s main aim,...
  • Office Depot halts PC Health Checks amid bogus infection claims

    11/22/2016 7:40:46 AM PST · by snarkpup · 13 replies
    The Register ^ | 22 Nov 2016 at 01:46 | Iain Thomson
    Office Depot has suspended PC Health Check – its malware-scanning service – after it was accused of lying about infections to push antivirus software. Former Office Depot technician Shane Barnett told Seattle TV station KIRO 7 that the PC Health Check service would lie to customers that their otherwise-clean PCs were infected with malware, and that this was used to flog expensive disinfection tools. He claimed he was let go from his job because he refused to run the allegedly dodgy scanner on people's machines. ... The station decided to investigate his claims and took six virgin PCs along to...
  • Important Note – Clear Your Cookies and Browser Cache Frequently…

    11/03/2016 7:38:24 AM PDT · by Bratch · 40 replies
    The Last Refuge ^ | November 3, 2016 | sundance
        A rather long and complex issue has surfaced that CTH has specific knowledge of. It’s a bigger issue than appears on the surface.  However, to avoid a lengthy distraction -which will consume unnecessary energy- the short version is: Until the election is over, if you travel the internet into news sites, political sites, and content containing political discussion therein, clear your browser and cache frequently throughout the day. SHORT SUMMARY:  We have become aware there is a specific, intentional and ongoing “malvertising” effort.  That is, hidden and targeted malware embedded within political advertising (by Team Clinton) that is...