Category Archives: Cybersecurity
Mass Email Campaign Spreading The Emotet Banking Trojan
There is another large-scale spam campaign going to spread the Emotet banking trojan. The Emotet banking trojan is mostly used as the dropper for other payloads like ICedID, Trickbot, Zeus Panda Banker and a few others. These infections can scan and harvest different types of sensitive information, scan email 180 days back, have the ability to…
Growing Botnet Uses 5 Year Old Router Flaw
A brand new botnet which is a variant of the BCMUPnP_Hunter is taking advantage of this 5 year router flaw and 360 Netlab research shows that hundreds and thousands of of bots have already seeded themselves into routers. This same bot takes advantage of the same vulnerability that was discovered in 2013 ( BroadCom UPnp…
A New Intel CPU Exploit which uses Hyper-threading to steal encrypted data
A New Intel CPU Exploit : As if the Intel CPU couldn’t catch a break. A team of researches discovered a serious side-channel vulnerability in the CPU which could allow the attacker to find protected data like OPENSSL keys, Cypto Keys, Passwords and other processes that are running but only if the CPU has multi-threading…
Kraken Ransomware Adopts RaaS Model
The author of Kraken Ransomware has adopted the ransomware-as-a-service (RaaS) Model. In the Dark Web you can find more details about joining the affiliate program which requires a small fee to be considered a trusted partner. The interesting part about this affiliate program is that you get about 70% to 80% of the earnings and requires…
PoC exploit to deploy Malware using Youtube and Microsoft Office.
Cleaver hackers always finding a loop hole. There is a new PoC exploit utilizing Microsoft Words embedded video feature and YouTube thumbnail videos. The hackers go about placing a HTML script behind the image of the video. When the user clicks the video the HTML code is executed by Internet Explorer. Presto you have been…