Malware Post

Oct 23,2019 09:17:49
Security researchers have identified a new malspam campaign targeting German organizations, delivering the Buran Ransomware. The email is crafted to appear to be coming from online fax service eFax.  ...[ read more ]

Oct 21,2019 13:24:47
Researchers have observed cybercrime group ‘TA505’, using a new RAT dubbed SDBbot, being delivered via GET2 downloader in recent attacks. The G2 downloader has been previously used in various campaigns...[ read more ]

Oct 09,2019 05:33:48
Security Researchers have discovered a new malware dubbed Reductor, capable of decoding encrypted TLS communication without the need to manipulate/intercept it. The malware makes it way to systems via:- Software’s...[ read more ]

Oct 03,2019 11:32:55
APT hackers from China are utilizing FakeNarrator malware to attack tech companies based in Southeast Asia, in order to implant a modified version of PcShare backdoor, which is designed to...[ read more ]

Sep 19,2019 08:00:23
TFlower, a new crypto-ransomware has been spotted targeting corporate network via exposed Remote Desktop Services (RDS). Attackers hack into systems with exposed RDP services, infecting them with TFlower and then...[ read more ]

Sep 17,2019 08:24:21
Researchers have identified a new piece of malware dubbed InnfiRAT, written in .NET and is designed with the purpose of accessing & stealing personal information from victim’s computer. However, the...[ read more ]

Sep 11,2019 11:40:29
Active since 2016, orcus is a remote access trojan (RAT) developed by ‘Sorzus‘.  The RAT has the ability to build custom plugins and is primarily distributed via drive-by-downloads & spear...[ read more ]

Sep 06,2019 12:41:39
A new malvertising campaign has been spotted, that redirects users to an exploit kit that, when successful, deploys Nemty ransomware on victim device.   Technical Details The threat actors behind...[ read more ]

Sep 02,2019 06:16:02
A new Remcos RAT campaign has been identified that is making use of AutoIt wrapper, incorporating various anti-debugging & obfuscation techniques to evade detection.   Technical Details The attackers are...[ read more ]

Aug 27,2019 07:49:51
A new phishing campaign has been identified that makes use of multiple anti-analysis methods to drop Quasar RAT. Quasar is an open-source RAT, which targets the windows OS & is...[ read more ]

LTS Secure Locations
  • Florida: 407-965-5509
    Los Angeles: 323-544-5013
    Mid West: 800 689 4506

  • Chicago/Midwest– 2406 Schumacher Drive, Mishawaka, IN, 46545

    201, Tower S4, Phase II, Cybercity, Magarpatta Township, Hadapsar, Pune-411013