New Updates To This Malware Made It More Dangerous

If you haven’t yet heard of a malware strain called ‘Predator the Thief’, it’s something that belongs on your radar. It first emerged as a threat in July of 2018, when it was used in conjunction with an extensive phishing campaign. In its original incarnation, it proved more than capable of stealing passwords, browser data, user names and the contents …

ISO Files Are Being Used To Deliver Malware

Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their targets. It makes sense in a Windows environment because it allows attackers to disguise their payloads as an innocent, standard file type. In terms of scope and scale, …

Windows 7 End of Life

Windows 7 Support Officially Ends Today

Windows 7 End of Life has arrived. Microsoft is ending support for this aging operating system on January 14, 2020. This means a decade after introducing Windows 7, Microsoft will no longer provide security updates or patches unless you purchase Extended Security Updates from Microsoft. Tech support from Microsoft for any Windows 7 issues also ends today. We strongly recommend …

New Trojan Malware Steals Passwords From Chrome

If you use Google’s Chrome web browser, there’s a new threat you should be aware of.  A new trojan targeting Windows-based machines will attempt to steal passwords stored in the Chrome browser. Dubbed CStealer, it was discovered by the Malware Hunter Team. They found some points of interest that make this threat more notable than others in its class. If …

New Malware Can Spy On You In Scary Ways

There’s a new strain of malware in the wild. It is targeting Android devices and disguised as an innocuous chat app. Researchers at Trend Micro have discovered it in two different apps so far:  Chatrious and the Apex App.  Chatrious has since vanished from Google’s Play Store, but at the time this piece was written, the Apex App is still …

New Cryptomining Malware Targets Windows Computers

Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn’t particularly dangerous. It’s not designed to mass delete files, lock your system down or flood you with pop-up ads. Rather, its purpose is to install itself stealthily and live in the background where it will …

Hackers Are Imitating Government Agencies To Spread Malware

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service. This is all part of a malicious campaign designed to infect targeted recipients with …

Fake Voicemail Messages Tricking People Into Opening Malicious Content

Office 365 has been the target of an increasing number of ongoing phishing scams. The latest scam involves using fake voicemail messages to convince targets that they need to log in to hear the full recording. Researchers at McAfee Labs had this to say about the matter: “Over the past few weeks McAfee Labs has been observing a new phishing …

Some iOS Apps Found To Have Clicker Trojan Malware

Recently, a survey of Apple’s App Store by Wandera Threat Lab discovered more than a dozen iOS apps that have been infected with the ‘Clicker’ Trojan malware.  As malware goes, this variant isn’t especially dangerous to those who wind up infected with it, but it’s still problematic. A spokesman for Wandera had this to say about the recent discovery: “The …

Backdoor Could Be Used On Microsoft SQL Without Detection

If you haven’t heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously compromised system. Worse, this is not theory or conjecture.  Researchers have found malware strains in the wild that take advantage …