Instead of targeting wide audiences, some malware campaigns prefer to fly under the radar. And sometimes they fly straight into the hands of our BadCyberLab analysts, where they are dissected and analysed. Read more »
IT Security Weekend Catch Up – December 16, 2016
Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy! Continue reading “IT Security Weekend Catch Up – December 16, 2016”
IT Security Weekend Catch Up – December 9, 2016
Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security news in one place, for your reading pleasure. Enjoy! Continue reading “IT Security Weekend Catch Up – December 9, 2016”
Banking trojan, Gmail webinject, SMS message and malicious APK – all in one attack scenario
As many banks use SMS 2FA for transfer authorization, malware authors are constantly looking for new opportunities to take over control of PC infection victims’ smartphones. We have identified a new attack scenario that involves both PC and mobile devices infection by leveraging trust people have in Google services. Continue reading “Banking trojan, Gmail webinject, SMS message and malicious APK – all in one attack scenario”
IT Security Weekend Catch Up – December 2, 2016
Afraid of missing important security news during the week? We’re here to help! Every week we put together a curated list of all important security related news in one place, for your reading pleasure. Enjoy! Continue reading “IT Security Weekend Catch Up – December 2, 2016”
Bypassing Apple’s Activation Lock with typing and magnets – for a fraction of a second
One of the strongest security mechanisms implemented by Apple is called Activation Lock. It prohibits anyone without access to owner’s Apple ID password from accessing a stolen or lost iDevice. Unless they have a lot of patience and some magnets. Read more »
New Mirai attack vector – bot exploits a recently discovered router vulnerability
Nowadays the market for IoT botnets must be really saturated. Botmasters are looking for new infection vectors to gain an advantage over competitors and a few extra Gbps of power. Yesterday one of our readers’ routers became a victim of this race. Lets look at the bot and the infection vector, which involves two vulnerabilities. Read more »
IT Security Weekend Catch Up – November 26, 2016
Afraid of missing important security news during the week? We’re here to help! Every week we put all important security related news in one place, for your reading pleasure. Enjoy! Continue reading “IT Security Weekend Catch Up – November 26, 2016”
Errors, threats and extortion – history of a bank hack part three
This is the epilogue in the Polish bank heist story, where one of the hackers gets caught by the police.
The Polish police never ceases to surprise. Another administrator of ToRepublic forum was detained by the police. This time it was Polsilver, who six months ago stole money from Plus Bank. Continue reading “Errors, threats and extortion – history of a bank hack part three”
Errors, threats and extortion – history of a bank hack part two
In this episode of the Polish bank heist we describe the actions taken by criminals after the bank they hacked refused to pay the ransom they requested.
The ultimatum presented to Plus Bank, robbed by criminals, has elapsed. The burglar, who apparently has not received the ransom, has published data of hundreds of business accounts of Plus Bank customers. Continue reading “Errors, threats and extortion – history of a bank hack part two”