212-242-2949

malware

All the posts published

A new form of ransomware that targets Android phones has been discovered in the wild.  Named DoubleLocker by researchers at ESET, this new variant of ransomware has the ability to encrypt a user’s data and change their PIN, making the phone nearly unrecoverable. Like many forms of malware on PC, DoubleLocker relies on phishing scams and popup messages to trick users into its installation.  Currently, DoubleLocker is propagating through fake …

Read More →

If you’ve recently purchased a HP laptop you may want to rethink your security.  A recent update to the audio driver installed on many HP laptops has been identified to include functionality similar to a keylogger.  The program, which is designed to check for system hotkeys, is recording every keypress that users make. The HP audio driver was originally given the functionality to detect special key presses in an effort …

Read More →

Last week, IBM issued a security alert over malware that was accidently shipped to customers.  Infected USB devices were distributed with IBMs Storwize data center products.  IBM warns that the infected USB drives should be reformatted or destroyed to prevent infection. IBM has not specified exactly how many devices contain the malware but has disclosed that the infected USB drives are all from a single batch with the part number …

Read More →

Online advertising is a necessary evil when it comes to funding online media, unfortunately, this practice has resulted in Malvertising; the act of embedding malware within legitimate websites.  According to research from RiskIQ, a leader in digital threat management, malvertising saw a rise of 132% in 2016 over the previous year. “Malvertising is so nefarious because it’s a direct attack on the lifeblood of the internet as we know it. …

Read More →

The dreaded “Blue Screen of Death” has been an unfortunate part of the Windows experience since the early days of desktop computing, but now it is being used to the advantage of scam artist.  Microsoft has put out a warning over a recent batch of malware that mimics a “Blue Screen” crash and encourages users to call a fraudulent hotline. Microsoft has called this malware Hicurdismos, and warns that it …

Read More →

A new strain of malware has been discovered that changes the rules of how most people think about botnets.  The apply named Twittoor, is a Trojan that that infects Android phones and uses the Twitter social network to coordinate the botnet.  Twitoor is believed to be the first instance of a botnet controlled through a social media service instead of traditional command-and control servers. The Twitoor malware is spread primarily …

Read More →

Cisco researchers have discovered vulnerability in the way that Mac devices process image formats.  TIFF image files are data rich and typically used by publishers or designers, unfortunately, these images can contain more than just image data.  Because of how Apple processes image data, TIFF files can be used to run malware automatically, without being detected. While TIFF images impose the greatest risk from this vulnerability, the Cisco researcher stress …

Read More →

Never before have computer users been subjected to a threat as disruptive and dangerous as modern ransomware.  Where older viruses and malware disrupted data, ransomware holds it prisoner.  Extortion is the new agenda and it’s carried out on a massive scale.  Ransomware has emerged as the most destructive and difficult category of malware to deal with, of our time. There are two common types of ransomware in circulation today; crypto …

Read More →

The New York Times, the BBC and MSN are the latest victims of high profile websites that have been hit by advertisement driven malware.  The malware campaign spread through a shared advertising program and propagates an increasingly popular type of Ransomware.  Ransomware is a type of malware that encrypts a user’s computer data and makes it nearly impossible to recover without paying a hefty fee. The malicious advertisements were served …

Read More →

A Los Angeles hospital paid a ransom of nearly $17,000 to recover its computer network from a malware attack earlier this month.  Hospital administrators gave into the ransom demands after the malware had crippled their network infrastructure, blocked access to medical records and left hundreds of patients without access to treatment. The Hollywood Presbyterian Medical Center started to notice problems with its computer network on February 5th.  The malware disrupted …

Read More →

The CoreBot Malware caught the eyes of researchers late last month, when they discovered that it came equipped with a modular design.  At the time, CoreBot was a relatively minor threat on the Malware scale, a basic data stealer.  However, what made CoreBot special was that it could be modified to include additional mechanisms.   IBM researchers predicted this mutability would allow the malware to become a greater threat in the …

Read More →

Operation Pawn Storm is the name given to a malware campaign that was first reported by Trend Micro back in 2014.  Despite the long running nature of the campaign, it appears that Pawn Storm is still active and targeting new websites.  The latest ploy comes in the form of the website for the Electronic Frontier Foundation. The latest phase in the Operation Pawn Storm malware campaign started about a month …

Read More →

As yet another reminder that even small businesses can be the target of cybercrime is the latest attack discovered by researchers at Kaspersky.  The business-orientated spyware campaign, called Grabit, was discovered Thursday and has already stolen over 10,000 files from SMBs located in the United States, India and Thailand. The Grabit spyware campaign has been active since February and remains in operation with new victims added every day.  Grabit works …

Read More →

Computer manufacturer Lenovo has been caught purposefully selling new computers to consumers with preinstalled adware.  The hidden adware, dubbed Superfish by researchers, embeds itself in internet browsers to deliver popup advertisements based on search terms. Users have complained about Superfish on new laptops since last fall, but the adware has only come under fire recently with the discovery of a potentially serious security threat.  In addition to serving up targeted …

Read More →

Despite constant reminders to the contrary, most mobile device users still have a difficult time accepting that their mobile phone is at risk for malware.  Hopefully, the recent study from Alcatel-Lucent will shake users into the realization that mobile device security is important.  The report compiled from their Motive Security Labs division, found that malware infections in mobile devices increased by 25 percent in 2014, compared to a 20 percent …

Read More →

Adobe Flash Player has become synonymous with constant security faults but this month the threat level has reached a sad new low.  Adobe Systems issued a warning on Monday that hackers are exploiting a new vulnerability in Flash Player, the third such vulnerability in roughly a months’ time.  The vulnerability allows for drive-by download attacks and targets users of Internet Explorer and Firefox. The Flash Player exploit makes use of …

Read More →

Website malware is something that we have covered quite frequently on this blog, but generally, it can be avoided with careful browsing habits and awareness of the types of websites you visit.  Unfortunately, that can’t be said any longer.  On December 31st, Cyphort Labs, a cybersecurity firm, detected a malware infection on the Canadian website for the Huffington Post.  The security firm later confirmed that the malware was also present …

Read More →

A new threat for Linux-based machines jumped into public attention earlier this week with a threat that could end up being worse than the Heartbleed scare.  The security vulnerability, which has gained the moniker “Bash Bug”, or “Shellshock” affects the shell commands of Linux-based computers, servers and even Macs. Systems use Bash to execute “shell” commands; basically, this means that it translates user commands into something an operating system can …

Read More →

The same type of Ransomware that first appeared on Windows based systems has now made its way to Apple devices.  The ransom based cyber-attack first began in Australia but has now been spotted in other parts of the world, including California.  The Apple Ransomware creates an impassible splash screen on a user’s device and demands a $100 ransom before the user is able to regain access. Devices affected by the …

Read More →

Within the last month, the number of Facebook, email and phone scams have risen significantly.  Since ignorance is the biggest factor in falling prey to a scammer, this article will shed some light on a few of scams currently in circulation.   “Click Bait” Social Media Scams “Click Bait” scams have become a popular method of distributing spam and malware on social media platforms such as Facebook and Twitter.  The …

Read More →

Most users are aware of the dangers that can plague a desktop or laptop computer but very few are concerned when it comes to their phones or tablets.  Recent research conducted by RiskIQ shows just how dangerous the mobile marketplace can be, as well as the importance of downloading apps with caution.  The Internet security company claims that malicious apps have grown by 388 percent from 2011 to 2013. The types …

Read More →
malware | IT Computer Support of New York