Users of Old Android Devices Could Face a Serious Root Certificate Problem in 2021

Users of Old Android Devices Could Face a Serious Root Certificate Problem in 2021

by Silviu STAHIE, from IoT Security Insights , on 10.11.2020

The Android fragmentation problem is about to create a significant problem in 2021 as some older devices will have trouble displaying websites using Let's Encrypt certificates. While Android occupies around 70% of the market, it does so with an important caveat. It's not a single version of the operating system that’s responsible for the spread, ... The post Users of Old Android Devices Could Face a Serious Root Certificate Problem in 2021 appeared first on Bitdefender. read more

New IoT Malware Spreads Through GitHub and Pastebin

New IoT Malware Spreads Through GitHub and Pastebin

by Silviu STAHIE, from IoT Security Insights , on 09.11.2020

Security researchers have discovered a new malware designed to affect Linux-based x86 servers, along with Linux ARM and MIPS-based IoT devices, that’s been using many infections vectors, including GitHub and Pastebin. Malware using GitHub and Pastebin as points of infection is not something new. Attackers draw some advantages from using known, stable and large platforms, ... The post New IoT Malware Spreads Through GitHub and Pastebin appeared first on Bitdefender. read more

AI-Controlled Camera Follows Bald Referee’s Head Instead of the Ball

AI-Controlled Camera Follows Bald Referee’s Head Instead of the Ball

by Silviu STAHIE, from IoT Security Insights , on 04.11.2020

Inverness Caledonian Thistle FC (ICTFC) used AI cameras to cover a soccer match with their rivals from Ayr United. Unfortunately, the AI mistook the bald head of the linesman for the ball and kept tracking him for the entire match. We all hear about robots taking human jobs, and camera operator seems to be an ... The post AI-Controlled Camera Follows Bald Referee’s Head Instead of the Ball appeared first on Bitdefender. read more

An Overview of WMI Hijacking Techniques in Modern Malware

An Overview of WMI Hijacking Techniques in Modern Malware

by Ruben Andrei CONDOR, from Bitdefender Labs , on 28.10.2020

The discovery of Stuxnet in 2010, followed by its in-depth analysis, uncovered several “industry firsts”, including hijacking of Windows Management Instrumentation (WMI) to enumerate users and spread to available network shares. In the past decade, most of the malware features at least one technique to hijack WMI for persistence, discovery, lateral movement or defense evasion. […] read more

MaMoCrypt Ransomware Decryption Tool

MaMoCrypt Ransomware Decryption Tool

by Bitdefender Team, from Bitdefender Labs , on 16.10.2020

We’re happy to announce the availability of a new decryptor for MaMoCrypt, a strain of ransomware that appeared in December last year. MaMoCrypt is an unusual piece of ransomware, a variant of MZRevenge written in Delphi and packed using mpress. If you don’t want to go through the technical analysis, you can jump straight to decryption […] read more

Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure

Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure

by Silvia Pripoae, from Bitdefender Labs , on 15.10.2020

While botnets have been used for anything from performing Distributed Denial-of-Service (DDoS) attacks to stealing data and even sending spam, Bitdefender researchers have found signs that the Interplanetary Storm botnet could be used for something else entirely. This particular Golang-written botnet could be used as an anonymization proxy-network-as-a-service and potentially rented using a subscription-based model. […] read more

There’s a New a Golang-written RAT in Town

There’s a New a Golang-written RAT in Town

by Silvia Pripoae, from Bitdefender Labs , on 09.10.2020

Security researchers at Bitdefender have discovered a new Golang-written RAT that targets devices by using the CVE-2019-2725 (Oracle WebLogic RCE) vulnerability identified last year. Unlike other bots that have exploited this vulnerability, it doesn’t try to install a cryptominer or deploy other malware — at least not yet. Oracle published the details on the CVE-2019-2725 […] read more

Fake Users Rave but Real Users Rant as Apps on Google Play Deal Aggressive Adware

Fake Users Rave but Real Users Rant as Apps on Google Play Deal Aggressive Adware

by Oana ASOLTANEI, from Bitdefender Labs , on 08.10.2020

Bitdefender researchers recently stumbled across 13 Google Play applications packing aggressive ads and potentially using over 1,000 fake reviews to gain a cumulative download count of over half of million. While fake online reviews may be punishable by the FTC with millions of dollars, it’s interesting that, while some of the analyzed apps only got […] read more

LemonDuck Crypto-Miner – a KingMiner Successor

LemonDuck Crypto-Miner – a KingMiner Successor

by Janos Gergo SZELES, from Bitdefender Labs , on 08.10.2020

Crypto-miners have been around for several years, in all forms and shapes, and distributed via various attack avenues. Increased competition from other cyber-criminal groups and various defenses set in place at the browser or security solution level have prompted crypto-mining operators to up their game and look for victims in enterprise environments rather than home […] read more

Apps on Google Play Tainted with Cerberus Banker Malware

Apps on Google Play Tainted with Cerberus Banker Malware

by Alexandra Bocereg, from Bitdefender Labs , on 24.09.2020

The official Android app market has traditionally been regarded as a safe place to install applications from. Every once in a while, remarkably malicious apps slip right through and start wreaking havoc before they’re spotted and retired. Today’s blog post focuses on several utility apps that look innocent at a glance, but whose real purpose […] read more

<< Prev Next >>