Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

Six Years and Counting: Inside the Complex Zacinlo Ad Fraud Operation

by Bogdan BOTEZATU, from Bitdefender Labs , on 18.06.2018

For more than a decade, adware has helped software creators earn money while bringing free applications to the masses. Headliner games and applications have become widely available to computer and mobile users the world over, with no financial strings attached. While generating untold revenue for the companies that run these programs, adware has witnessed constant […] read more

Hide and Seek IoT Botnet resurfaces with new tricks, persistence

Hide and Seek IoT Botnet resurfaces with new tricks, persistence

by Bogdan BOTEZATU, from Bitdefender Labs , on 07.05.2018

On April 30, Bitdefender researchers became aware of a new version of the Hide and Seek bot we documented earlier this year. The botnet, the world’s first to communicate via a custom-built peer to peer protocol, has now also become the first to gain persistence (the ability to survive a reboot) with the new version. […] read more

RadRAT: An all-in-one toolkit for complex espionage ops

RadRAT: An all-in-one toolkit for complex espionage ops

by Bogdan BOTEZATU, from Bitdefender Labs , on 13.04.2018

Around February this year, we came across a piece of malware that had previously gone unnoticed. Buried in the malware zoo, the threat seems to have been operational since at least 2015, undocumented by the research community. Our interest was stirred by its remote access capabilities, which include unfettered control of the compromised computer, lateral movement across […] read more

Bitdefender’s Business Insights Nominated at the 2018 Security Blogger Awards – Cast Your Vote!

Bitdefender’s Business Insights Nominated at the 2018 Security Blogger Awards – Cast Your Vote!

by Bogdan BOTEZATU, from Bitdefender Labs , on 30.03.2018

Dear reader: if we had the chance, we would definitely name you the Best Corporate Security Blog Reader out there. Now, would you vote for us as the Best Corporate Security Blog? For the past year, we have been working hard to give you the inside scoop in cyber-security, devops and policies. Now, we give you another […] read more

Annabelle Ransomware decryption tool

Annabelle Ransomware decryption tool

by Bogdan BOTEZATU, from Bitdefender Labs , on 05.03.2018

Annabelle Ransomware is a family of file encrypting malware inspired from the horror movie franchise Annabelle. In addition to its file encryption capabilities, the Annabelle ransomware goes the extra mile and attempts to disable the firewall, deny the execution of an array of utilities, spread via connected USB drives and ultimately, overwrite the MBR with […] read more

Bitdefender, Europol, Romanian Police, DIICOT team up for GandCrab decryption tool

Bitdefender, Europol, Romanian Police, DIICOT team up for GandCrab decryption tool

by Bogdan BOTEZATU, from Bitdefender Labs , on 28.02.2018

Ransomware has become one of the most profitable cybercrime verticals in recent years. Complex infection mechanisms and highly profitable affiliation schemes brought operators more than $1 billion in 2016. GandCrab, the latest family of ransomware, started to claim victims in late January, demanding exorbitant prices (ranging from $400 to $700,000) in exchange for the decryptor. Fortunately, the 50,000 users […] read more

GandCrab Ransomware decryption tool

GandCrab Ransomware decryption tool

by Bogdan BOTEZATU, from Bitdefender Labs , on 28.02.2018

BEFORE YOU READ THE REST OF THE ARTICLE: Please note that there is a second version of GandCrab in the wild now. If your encrypted files have the .CRAB extension, this tool will not bring your files back. A new family of ransomware dubbed GandCrab has been making its rounds since January this year. Spreading […] read more

Operation PZChao: a possible return of the Iron Tiger APT

Operation PZChao: a possible return of the Iron Tiger APT

by Ivona Alexandra CHILI, from Bitdefender Labs , on 01.02.2018

More than 30 years after the end of the Cold War, digital infrastructures worldwide have become strategic national fronts with the same importance as the geographical frontiers of air, land, sea and space. To ensure viability in this fifth domain, cyber-attacks are growing in complexity as threat actors divide payloads in multiple modules with highly […] read more

New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild

New Hide ‘N Seek IoT Botnet using custom-built Peer-to-Peer communication spotted in the wild

by Bogdan BOTEZATU, from Bitdefender Labs , on 24.01.2018

Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure. The bot, dubbed HNS, was intercepted by our IoT honeypot system following a credentials dictionary attack on the Telnet service. The bot was first spotted on Jan. 10 then faded away in the following days, only […] read more

Terdot: Zeus-based malware strikes back with a blast from the past

Terdot: Zeus-based malware strikes back with a blast from the past

by Bogdan BOTEZATU, from Bitdefender Labs , on 16.11.2017

Malware authors are surely known for their ability to fly under the radar. But every once in a while, details about their operations surface on the web. This is the case of a handful of malware operations that managed to gain unwanted attention by having their source code leaked. Mirai, KINS, Carberp and Zeus are […] read more

<< Prev Next >>