A new campaign via the RIG exploit kit is pushing the Princess ransomware.
Quelle: RIG exploit kit distributes Princess ransomware – Malwarebytes Labs
Botnets distributing FlokiBot point-of-sale malware are back in business spewing a new malware dubbed LockPoS.
Quelle: New Point-of-Sale Malware LockPoS Hitches Ride with FlokiBot
A piece of malware is currently installing the Signal messenger app on macOS users‘ mobile devices as part of a scheme to steal their banking credentials.
Quelle: Malware installs Signal as part of scheme to steal macOS users‘ banking credentials
Security experts in the U.S and Europe are debating whether the Petya cyber-attack that mainly affected computers in Ukraine, was nation-state inspired and originated in the Russian Federation.
Quelle: Cyber-Security Experts View Petya Malware as Nation-State Attack
Check Point’s latest Global Threat Impact Index revealed more than one in four organizations globally was affected by the Fireball or Wannacry attacks during May– in the company’s latest Global Threat Impact Index. The top three malware families that impacted networks globally were zero-day, previously unseen attacks. Fireball impacted one in five organizations worldwide, […]
Quelle: May’s Most Wanted Malware: Fireball and Wannacry Impact More Than 1 in 4 Organizations Globally | Check Point Blog
Two malware-infected apps found on Google Play were collectively downloaded over 60,000 times.
Quelle: Ztorg malware: Infected apps on Google Play Store send premium SMS texts, delete incoming messages
An international operation conducted by the European police targeted customers of counter antivirus and crypter services: 6 arrested and tens of interviewed
Quelle: European police target anti-malware detection services and their customers
Meet Crash Override, aka Industroyer, malware designed to attack power grids and responsible for the partial power outage in Kiev.
Quelle: Crash Override: Malware that took down a power grid may have been a test run
Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, Fireball, takes over target browsers and turns them into zombies. Fireball has two main functionalities: the ability of running any code on victim computers–downloading any file or malware, and […]
Quelle: FIREBALL – The Chinese Malware of 250 Million Computers Infected | Check Point Blog
Although there’s been a drop in the activity of exploit kits, threat actors have adapted by redirecting unwitting victims to exploit kit servers.
Quelle: Malvertising redirecting victims to exploit kits