SafeUM
Home Blog Services Download Help About Recharge

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
Archive
#trojan
12 Oct 2016

Emboldened by $1B Bangladesh hackers, new group targets SWIFT users

A few months after hackers broke into Bangladesh's central bank and came close to getting away with $1 billion, researchers have uncovered evidence that a separate hacking group is targeting the same payment network.

The researchers, from security firm Symantec, said that they recently found new tools that target users of SWIFT, a payment network banks use to transfer payments that are sometimes in the range of hundreds of millions of dollars. The malicious tools monitor SWIFT messages sent to infected computers for International Bank Account Numbers or other keywords relating to specific transactions. 

Read more
Tags:
SWIFT trojan information leaks fraud
Source:
Ars Technica
2050
6 Oct 2016

FastPOS malware abuses Windows Mailslots to steal POS data

The group behind the FastPOS malware has updated their trojan with a new data exfiltration mechanism that abuses the Windows Mailslots mechanism to store data before exfiltration from infected systems.

This new version of POS malware came to light this past summer when researchers discovered ads for it on underground carding forums. Analysis of the malware showed a new POS malware family that focused on speed and sacrificed stealth, an opposite approach to how most POS malware operate today. Trend Micro continued its analysis of this malware after the initial detection and discovered traces of FastPOS activity dating back to March 2015.

Read more
Tags:
information leaks trojan Windows
Source:
Softpedia
1982
4 Oct 2016

MarsJoke: the cryptor and the cure

Every day, new versions and variations of ransomware pop up. Malware creators are still sure that ransomware is their ticket to easy street, despite the fact that law enforcement agencies are paying more and more attention to the problem.

In fact, so many different versions are out there, ransomware creators have started to repeat themselves or copy the work of others. For example, the recently discovered Trojan-cryptor Polyglot, aka MarsJoke, is a knockoff of the infamous (and rather nasty) CTB-Locker ransomware. You can see traces of CTB-Locker all over Polyglot. Its interface is absurdly reminiscent of the older Trojan.

Read more
Tags:
fraud information leaks trojan data protection
Source:
Kaspersky Daily
1902
15 Sep 2016

Guide for Pokémon Go Trojan catches Pokémon trainers

Less than three months after Pokémon Go launched, criminals sneaked malware into Google Play to target Pokémon trainers. Experts discovered the Trojan several days ago and immediately reported it to Google.

Unfortunately, by that time, the malicious app called Guide for Pokémon Go had already been downloaded more than 500,000 times. In the past few months almost 6 million people gave Pokémon Go a try. It’s no wonder that the massively popular game quickly caught the attention of cybercriminals: The first malware for Pokémon Go was traced in July, soon after the launch of the game. At that time, the situation was not so dangerous.

Read more
Tags:
information leaks trojan Google Play
Source:
Kaspersky Daily
Author:
Kate Kochetkova
2140
7 Sep 2016

Mirai Trojan is the next big threat to IoT devices and Linux servers

A new trojan named Mirai has surfaced, and it's targeting Linux servers and IoT devices, mainly DVRs, running Linux-based firmware, for the purpose of enslaving these systems as part of a large botnet used to launch DDoS attacks. Mirai is an evolution of an older trojan, also used for DDoS attacks.

Mirai's mode of operation is largely the same as Gafgyt, targeting IoT devices running Busybox, a slimmed-down version of select GNU tools and libraries, usually deployed on small embedded hardware. The trojan also targets only a specific set of platforms, on which IoT devices are usually built.

Read more
Tags:
Linux information leaks trojan DDoS Internet of Things Mirai
Source:
Softpedia
3462
6 Sep 2016

Betabot password stealing trojan re-emerges with ransomware infecting capabilities

Cybercrime is a constantly evolving entity as evidenced most recently in Betabot – a trojan that has been circulating in cyberspace for years in various forms. Betabot functioned in various capacities including as a banking trojan.

Now, security researchers have uncovered that in addition to functioning as a password-stealing malware, Betabot has begun infecting users with ransomware. According to Invincea security researcher Pat Belcher, Betabot developers have created the "first known weaponised document" with password-stealing capabilities, which can also install Cerber ransomware as a second-stage attack.

Read more
Tags:
trojan information leaks Betabot fraud
Source:
IBTimes
2023
5 Aug 2016

New Trojan SpyNote installs backdoor on Android devices

A new Android Trojan called SpyNote has been identified by researchers who warn that attacks are forthcoming. The Trojan has not been spotted in any active campaigns. But expert believes because the software is now widely available on the Dark Web, that it will soon be used in a wave of upcoming attacks.

Researchers say that’s where they found a malware builder tool specifically designed to be used to create multiple versions of SpyNote Trojan. SpyNote has a wide range of backdoor features that include the ability to view all messages on a device, eavesdrop on phone calls, activate the phone’s camera or microphone remotely or track the phone’s GPS location.

Read more
Tags:
Android information leaks SpyNote trojan
Source:
Threatpost
3076
21 Jul 2016

Lurk banking trojan delivered via Ammyy website

Hackers breached the official website of the popular remote administration tool Ammyy Admin and leveraged it to deliver Lurk and other pieces of malware. Lurk is a banking Trojan that has been used to target Russian financial institutions and other types of organizations.

The threat has been around for five years and experts estimate that it has helped cybercrime gangs steal roughly $45 million. Russian authorities recently arrested 50 individuals suspected of using the malware and the arrests are believed to have led to the disappearance of the notorious Angler exploit kit. The Lurk Trojan has often been delivered via watering hole attacks.

Read more
Tags:
Lurk trojan information leaks fraud
Source:
SecurityWeek
2093
20 Jul 2016

New Delilah trojan used to blackmail employees

Threat intelligence experts from Diskin Advanced Technologies have discovered a new trojan that is exchanged in closed criminal groups and is currently being used to infect workers at different companies and blackmail them to provide information on their employer.

Named Delilah, this custom piece of malware is a backdoor trojan that infects workers who visit online adult and gaming sites. Once on the user's device, the trojan starts collecting information on its target. The crooks will amass vast amounts of data in an effort to gather as much information on the victim's family and workplace environment as possible.

Read more
Tags:
trojan surveillance information leaks
Source:
Softpedia
1829
7 Jun 2016

CryptXXX ransomware will now steal your passwords as well

The most recent version of the CryptXXX ransomware came with lots of changes, among which the most important is an infostealer module that can dump and steal passwords from various applications on the infected machine.

Called StillerX, this module was seen part of CryptXXX, detected by Proofpoint for the first time on May 26. The US security firm says that this CryptXXX version comes with lots of new features, but StillerX makes it more dangerous than before. StillerX works just like classic password dumpers, also known as infostealers. CryptXXX's StillerX module is capable of targeting all sorts of software.

Read more
Tags:
password CryptXXX information leaks trojan
Source:
Softpedia
2059
SafeUM NEWS
27 Apr 2017 safeum news imgage Encrypted Group Chat
4 Apr 2017 safeum news imgage Each SafeUM user gets free anonymous phone number
10 Mar 2017 safeum news imgage SafeUM useful features to help you feel safe
28 Sep 2016 safeum news imgage Secure Messenger SafeUM
21 Jul 2015 safeum news imgage New secured zone of Google Play: secure messenger SafeUM for Android. Download, Install, Communicate
3 Apr 2015 safeum news imgage We are beginning to test SafeUM for Windows Phone
25 Feb 2015 safeum news imgage SafeUM messenger is available for public testing
20 Feb 2015 safeum news imgage Algorithms and encryption schemes used for secure messenger SafeUM
30 Jan 2015 safeum news imgage New "TOP Security!" app is on the App Store
22 Jan 2015 safeum news imgage Free "TOP Security!" app is available on Google Play
28 Oct 2014 safeum news imgage How are security keys generated in SafeUM?
19 Jun 2014 safeum news imgage SafeUM is the best messenger for data protection and information security
16 Jun 2014 safeum news imgage Become a SafeUM tester and get free PREMIUM subscription for a year
12 May 2014 safeum news imgage Why Premium secure messenger SafeUM cannot be free
25 Apr 2014 safeum news imgage Encrypted secure messaging for every mobile device
All news
First page Previous
1 2 3 4 5 6 7 8
Next Last page
SafeUM
Confidential Terms of Use Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015