2016 was the year that reminded us how important prevention is, no matter what type of user you may be. Indeed…
Tag: malware
A look back at the Zyns iframer campaign
We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to…
Zbot with legitimate applications on board
Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with…
VirLocker’s comeback; including recovery instructions
VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now….
From a fake wallet to a Java RAT
This malware came in a phishing e-mail – disguised as a Bitcoin wallet. After clicking the link, user receives a JAR…
New Mac backdoor using antiquated code
The first Mac malware of 2017 was brought to my attention by an IT admin, who spotted some strange outgoing network traffic from…
Clickjacking campaign abuses Google Adsense, avoids ad fraud bots
Ad fraud is one of many issues that contribute to the ad industry’s negative image these days. Unlike malvertising which affects…
Tech support scam page triggers denial-of-service attack on Macs
Tech support scammers have been using various themes to push fake alerts to scare users into calling for assistance. These fall into…
Goldeneye Ransomware – the Petya/Mischa combo rebranded
From March 2016 we’ve observed the evolution of an interesting low-level ransomware, Petya – you can read about it here. The second…
A closer look at a tech support screen locker
In this blog post, we are going to take a closer look at some of the code that the most predominant…