Virus News

July 27th, 2009

Welcome to our RSS – Virus and Spyware Related News Feed section. This page might take some time loading up as it has to extract and load data from other sources.

Microsoft – Security at Home

PCAdvisor – Security News

Computerworld – Viruses News

Kaspersky – Virus News

Norton Security Articles

Trend Micro malware Blog

  • New GnatSpy Mobile Malware Family Discovered -

    Earlier this year researchers first disclosed a targeted attack campaign targeting various sectors in the Middle East. This threat actor was called Two-tailed Scorpion/APT-C-23. Later on, a mobile component called VAMP was found, with a new variant (dubbed FrozenCell) discovered in October.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    New GnatSpy Mobile Malware Family Discovered

  • Dissecting PRILEX and CUTLET MAKER ATM Malware Families -

    For a while now, Trend Micro has focused its efforts on covering ATM malware, especially new families that come up with features that stealthily target banking customers. In this blog post, we're going to cover two that have recently come to our attention: Prilex and Cutlet Maker. Each of them is interesting in their own right, but for different reasons.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    Dissecting PRILEX and CUTLET MAKER ATM Malware Families

  • December Patch Tuesday: Yearender Includes Updates for MMPE Vulnerabilities -

    It was a relatively low-key year-ender for Microsoft’s Patch Tuesday, as the company’s monthly release of updates was relatively light in terms of noteworthy vulnerabilities. With that said, there were still a few notable vulnerabilities that were addressed.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    December Patch Tuesday: Yearender Includes Updates for MMPE Vulnerabilities

  • Untangling the Patchwork Cyberespionage Group -

    Patchwork (also known as Dropping Elephant) is a cyberespionage group known for targeting diplomatic and government agencies that has since added businesses to their list of targets. Patchwork’s moniker is from its notoriety for rehashing off-the-rack tools and malware for its own campaigns. The attack vectors they use may not be groundbreaking—what with other groups exploiting zero-days or adjusting their tactics—but the group's repertoire of infection vectors and payloads makes them a credible threat.

    We trailed Patchwork’s activities over the course of its campaigns in 2017. The diversity of their methods is notable—from the social engineering hooks, attack chains, and backdoors they deployed. They’ve also joined the Dynamic Data Exchange (DDE) and Windows Script Component (SCT) abuse bandwagons and started exploiting recently reported vulnerabilities. These imply they’re at least keeping an eye on other threats and security flaws that they can repurpose for their own ends. Also of note are its attempts to be more cautious and efficient in their operations.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    Untangling the Patchwork Cyberespionage Group

  • CONFICKER/ DOWNAD 9 Years After: Examining its Impact on Legacy Systems -

    Despite being nearly a decade old, and years past its peak, DOWNAD, also known as CONFICKER, has not gone away. 9 years to the month after its first discovery, we take a look at the numbers to see where DOWNAD is today, and why it is still one of the world’s most prevalent malware.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    CONFICKER/ DOWNAD 9 Years After: Examining its Impact on Legacy Systems

  • New Mirai Attack Attempts Detected in South America and North African Countries -

    A few days after a campaign in Argentina, there was a spike of activity from Mirai in a series of attack attempts in South American and North African countries.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    New Mirai Attack Attempts Detected in South America and North African Countries

  • systemd Vulnerability Leads to Denial of Service on Linux -

    Many Linux distributions are at risk due to a recently disclosed flaw in systemd: a flaw in its DNS resolver could cause a denial-of-service attack on vulnerable systems. The vulnerability is exploited by having the vulnerable system send a DNS query to a DNS server controlled by the attackers. The DNS server would then return a specially crafted query, causing systemd to enter an infinite loop that pins the system’s CPU usage to 100%. This vulnerability was assigned CVE-2017-15908.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    systemd Vulnerability Leads to Denial of Service on Linux

  • Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability -

    Intel recently released a security advisory detailing several security flaws in its Management Engine (ME). The advisory provides critical ME, Trusted Execution Technology (TXT), and Server Platform Services (SPS) firmware updates for versions 8.X-11.X covering multiple CVE IDs, with CVSS scores between 6.7 and 8.2.

    But there is also another notable vulnerability that can pose a bigger risk especially to corporate computers and networks: CVE-2017-5689, a privilege escalation flaw. While there are certain factors and/or triggers for this vulnerability, it can provide attackers administration access and enable them to remotely reset or power off the vulnerable system if exploited successfully. This security issue was divulged in the research, "Silent Bob is Silent." Compared to the recently identified ME vulnerabilities, CVE-2017-5689 was assigned a CVSSv3 score of 9.8.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability

  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware -

    We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG (detected by Trend Micro as RANSOM_CRYPTOQKG.A). It’s a classic macro malware infecting Microsoft Word’s Normal template (normal.dot template) upon which all new, blank Word documents are based.

    Further scrutiny into qkG also shows it to be more of an experimental project or a proof of concept (PoC) rather than a malware actively used in the wild. This, however, doesn’t make qkG less of a threat.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware

  • October macOS Patch Fixes FAT/USB Vulnerability -

    October’s macOS security update contained a fix for a vulnerability that Trend Micro privately disclosed to Apple earlier this year. The vulnerability (designated as CVE-2017-13811), was in the fsck_msdos system tool. This tool checks for and fixes errors in devices formatted with the FAT filesystem, and is automatically invoked by macOS when a device using FAT (such as a USB disk or an SD card) is inserted.

    Post from: Trendlabs Security Intelligence Blog - by Trend Micro

    October macOS Patch Fixes FAT/USB Vulnerability

  • Washington Post Security Fix

    Comments are closed.
    Wordpress SEO Plugin by Wordpress SEO Plugin