Wednesday, December 31, 2014

Monday, December 29, 2014

Internet Systems Consortium Site Redirects to Angler Exploit Secure Hunter

The website of the Internet Systems Consortium, the developers of the BIND DNS software deployed all over the Web, was reportedly infected with malware last week.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Internet Systems Consortium Site Redirects to Angler Exploit Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://www.securehunter.com/internet-systems-consortium-site-redirects-to-angler-exploit-secure-hunter/

Secure Hunter

Thursday, December 25, 2014

Happy Holidays to all of our users

Dear Secure Hunter Users


We want to wish you Merry Christmas and Happy New Year!


secure_hunter_greetings_page1_image1 Thank you for taking part in Secure Hunter Anti-Malware Beta testing.


We sincerely appreciate your taking time to provide your comments and feedback.


We hope you appreciate this time of the year as much as we do.We hope you will enjoy this holiday season and we take this opportunity to extend to you and every member of your family our warmest wishes for the coming.May your Christmas and Holiday season be filled with happiness and joy, followed by a most wonderful New Year 2015.


Sincerely,


Secure Hunter Team


www.securehunter.com



The post Happy Holidays to all of our users appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1xfW8eE

Secure Hunter

Tuesday, December 23, 2014

2014: A Specious Odyssey Secure Hunter

The wonderful and terrifying thing about the security world is that things never stay calm for long. As soon as you think you have a chance to catch your breath, someone breaks something and it’s time to scramble again. In 2014, those small moments of downtime were hard to come by.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post 2014: A Specious Odyssey Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1A2iNx8

Secure Hunter

Become an Author

Become an Author


The Secure Hunter Blog is interested in talented guest authors who have original ideas and a good writing style.

If you are a proactive writer and want to join our team, please download and read the following guest post guidelines carefully.


We made them to streamline our guest posting process.

Click Here


Business handshake


To discuss an idea about your guest post, please contact our blog team using this link Click Here.

If you already have an article to submit, add the link or attach files.We’ll get back to you ASAP!



The post Become an Author appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1zfCcqg

Secure Hunter

DHS Releases Destover Wiper Malware Indicators of Compromise Secure Hunter

A US-CERT advisory describes the malware used in the destructive Sony hack, including indicators of compromise and command and control server IP addresses.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post DHS Releases Destover Wiper Malware Indicators of Compromise Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1ztaz25

Secure Hunter

Monday, December 22, 2014

Staples Confirms 1.2 Million Cards Lost in Breach Secure Hunter

Staples confirmed that it lost close to 1.2 million payment cards in a data breach lasting close to six months and affecting 115 locations in 35 states.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Staples Confirms 1.2 Million Cards Lost in Breach Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1AZMEEC

Secure Hunter

Wednesday, December 17, 2014

Google Adds Content Security Policy Support to Gmail Secure Hunter

Google has added another layer of security for users of Gmail on the desktop, which now supports content security policy, a standard that’s designed to help mitigate cross-site scripting and other common Web-based attacks. CSP is a W3C standard that has been around for several years, and it’s been supported in a number of browsers […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Google Adds Content Security Policy Support to Gmail Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1ArislH

Secure Hunter

Tuesday, December 16, 2014

Researchers Go Inside Illegal Underground Hacking Markets Secure Hunter

Researchers at Dell SecureWorks have looked at services and pricing available inside illegal online marketplaces selling crimeware, stolen identities, credit cards, and hacking services.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Researchers Go Inside Illegal Underground Hacking Markets Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1BUcFpY

Secure Hunter

Saturday, December 13, 2014

Upatre Downloader Spreading Dyreza Banking Trojan Secure Hunter

Microsoft reports it has seen wire transfer spam carrying attachments containing the Upatre downloader which then infects machines with the Dyreza banking Trojan.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Upatre Downloader Spreading Dyreza Banking Trojan Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uB4zh6

Secure Hunter

Friday, December 12, 2014

Android Malware Installs Pirated Assassin’s Creed App Secure Hunter

A working, pirated version of the Assassin’s Creed application for Android is bundled with malware, targeting users trying to download a free version of that game.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Android Malware Installs Pirated Assassin’s Creed App Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uxJaEA

Secure Hunter

Thursday, December 11, 2014

Payment Gateway Provider Breached, Plain Text Data Accessed Secure Hunter

Payment gateway and mobile payment app provider CHARGE Anywhere disclosed it had been breached and hackers had access to plain text payment card transaction authorization requests.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Payment Gateway Provider Breached, Plain Text Data Accessed Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1GgKS5u

Secure Hunter

Wednesday, December 10, 2014

Red October Attackers Return With CloudAtlas APT Campaign Secure Hunter

The attackers behind the Red October APT campaign that was exposed nearly two years ago have resurfaced with a new campaign that is targeting some of the same victims and using similarly constructed tools and spear phishing emails. Red October emerged in January 2013 and researchers found that the attackers were targeting diplomats in some […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Red October Attackers Return With CloudAtlas APT Campaign Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/167SeLR

Secure Hunter

Linux Modules Connected to Turla APT Discovered Secure Hunter

Researchers at Kaspersky Lab have found two Linux modules connected to the Turla APT campaigns.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Linux Modules Connected to Turla APT Discovered Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1zOD33h

Secure Hunter

Saturday, December 6, 2014

DOJ Launches New Cyber Unit, Claims Privacy is Mission Critical Secure Hunter

The United States Department of Justice yesterday announced the creation of a new cybercrime unit within its Computer Crime and Intellectual Property Section.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post DOJ Launches New Cyber Unit, Claims Privacy is Mission Critical Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1AG5YqV

Secure Hunter

EC3 Head Paints Bleak Cybercrime Picture Secure Hunter

Troels Oerting, head of Europol’s EC3, explains the extreme difficulties law enforcement faces when investigating and prosecuting cybercrime at Georgetown Law’s Cybercrime 2020.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post EC3 Head Paints Bleak Cybercrime Picture Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1yW5QDs

Secure Hunter

Friday, December 5, 2014

Banks Get Green Light in Target Breach Suits Secure Hunter

A Minnesota District Court ruling this week related to the 2013 Target data breach has opened the door for banks to pursue damages from retailers victimized by a data breach.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Banks Get Green Light in Target Breach Suits Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/15TzCze

Secure Hunter

Ransomware is the Future of Consumer Cybercrime Secure Hunter

WASHINGTON D.C. – Panelists at a Georgetown Law’s conference agreed that ransomware schemes will be the malware of choice on the Internet of things.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Ransomware is the Future of Consumer Cybercrime Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/12GDL8e

Secure Hunter

Thursday, December 4, 2014

Details Emerge on Sony Wiper Malware Destover Secure Hunter

Kaspersky Lab has published an analysis of Destover, the wiper malware used in the attacks against Sony Pictures Entertainment, and its similarities to Shamoon and DarkSeoul.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Details Emerge on Sony Wiper Malware Destover Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1yl3jok

Secure Hunter

Wednesday, December 3, 2014

Attack targets auto industry firms in Europe Secure Hunter

Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Attack targets auto industry firms in Europe Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/11TVmZs

Secure Hunter

FBI Warns US Businesses of Possible Wiper Malware Attacks Secure Hunter

The FBI sent security professionals at US businesses a five-page confidential flash warning, alerting them to destructive malware attacks that overwrite hard drives leaving them inoperable.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post FBI Warns US Businesses of Possible Wiper Malware Attacks Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1rX3fnB

Secure Hunter

Monday, December 1, 2014

Researcher Releases Database of Known-Good ICS and SCADA Files Secure Hunter

A prominent security researcher has put together a new database of hundreds of thousands of known-good files from ICS and SCADA software vendors in an effort to help users and other researchers identify legitimate files and home in on potentially malicious ones. The database, known as WhiteScope, comprises nearly 350,000 files, including executables and DLLs, […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Researcher Releases Database of Known-Good ICS and SCADA Files Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1rPrlWZ

Secure Hunter

Wednesday, November 26, 2014

Experts Question Legality of Use of Regin Malware by Intel Agencies Secure Hunter

Though security researchers involved in uncovering the attack have remained mum on the attribution of Regin, privacy experts say that if one of the intelligence agencies is involved, there’s no legal basis for the operation.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Experts Question Legality of Use of Regin Malware by Intel Agencies Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1xFa8vN

Secure Hunter

Tuesday, November 25, 2014

Sony Pictures Dealing With Apparent Network Compromise Secure Hunter

Sony Pictures Entertainment is still in the process of trying to recover from an apparent compromise of some of the company’s computer systems. The attack first came to light on Monday, and the extent of the incident is still emerging. The compromise appears to affect just the networks at SPE, a division of Sony. Reports […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Sony Pictures Dealing With Apparent Network Compromise Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1reWX8d

Secure Hunter

Regin Cyberespionage Platform Also Spies on GSM Networks Secure Hunter

Kaspersky Lab researchers have learned that the Regin cyberespionage platform also targets GSM telecommunications networks.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Regin Cyberespionage Platform Also Spies on GSM Networks Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/11TECBf

Secure Hunter

Monday, November 24, 2014

Costin Raiu on the Regin APT Malware Secure Hunter

Denis Fisher talks with Costin Raiu of the Kaspersky Lab GReAT Team about the discovery of the Regin APT malware, the threat’s targets and tactics, its ability to compromise GSM base stations and its other capabilities.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Costin Raiu on the Regin APT Malware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uyLFGa

Secure Hunter

Friday, November 21, 2014

Angler Exploit Kit Adds New Flash Exploit for CVE-2014-8440 Secure Hunter

Exploit kit authors are nothing if not opportunistic, and they know a prime opportunity when they see one. Adobe Flash bugs fit that description nicely, and the people behind the Angler exploit kit already are exploiting one of the Flash bugs patched last week in the kit’s arsenal. This is a common tactic for exploit […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Angler Exploit Kit Adds New Flash Exploit for CVE-2014-8440 Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uMGlCJ

Secure Hunter

Thursday, November 20, 2014

Detekt Tool Puts Surveillance Spyware on Notice Secure Hunter

Civil rights activists and hacker Claudio Guarnieri along with partners such as the EFF and Amnesty International released Detekt, open source security software targeting activists and oppressed people that scans Windows machines for dangerous spyware.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Detekt Tool Puts Surveillance Spyware on Notice Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1yZmGQy

Secure Hunter

Wednesday, November 19, 2014

Citadel Variant Targets Password Managers Secure Hunter

Some Citadel-infected computers have received a new configuration file, a keylogger triggered to go after the master passwords from three leading password management tools.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Citadel Variant Targets Password Managers Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1quTiTh

Secure Hunter

Tuesday, November 18, 2014

Matsnu Botnet DGA Discovers Power of Words Secure Hunter

The Matsnu botnet has deployed a new domain generation algorithm that builds domain names from a list of nouns and verbs. The plain English phrases help the DGA elude detection.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Matsnu Botnet DGA Discovers Power of Words Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1vnvuT8

Secure Hunter

Apple iOS 8.1.1 Fixes Several Code-Execution Flaws Secure Hunter

Apple has patched 10 vulnerabilities in iOS, including a pair of bugs that allowed arbitrary code execution and one that enables an attacker to run random binaries on a target device. The patches come in iOS 8.1.1, a small update to the company’s mobile operating system. There are several serious vulnerabilities fixed in this release, […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Apple iOS 8.1.1 Fixes Several Code-Execution Flaws Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1qRSUc9

Secure Hunter

Friday, November 14, 2014

Thursday, November 13, 2014

Windows Phone Sandbox Holds Up at Mobile Pwn2Own Secure Hunter

Researchers successfully took down Apple and Samsung mobile phones using NFC hacks during Mobile Pwn2Own, but were not able to complete compromise Windows Phone or Nexus 5 running Android.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Windows Phone Sandbox Holds Up at Mobile Pwn2Own Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1wv8SL2

Secure Hunter

Friday, November 7, 2014

Windows Version of WireLurker Out of Commission Too Secure Hunter

A Windows version of the WireLurker malware has been discovered, and like the Mac OS X version, it too is believed to have been shut down.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Windows Version of WireLurker Out of Commission Too Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1xeby2s

Secure Hunter

Chertoff Reminds Enterprises There is Hope in Security Secure Hunter

Former DHS secretary Michael Chertoff laid out a game plan for enterprise network security, one heavy on risk management and prioritization in the context of current threats and vulnerabilities, and potential consequences.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Chertoff Reminds Enterprises There is Hope in Security Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1qto7SF

Secure Hunter

Thursday, November 6, 2014

WireLurker Mac OS X Malware Shut Down Secure Hunter

Researchers at Palo Alto Networks discovered a new family of Mac OS X malware that was capable of also infecting iOS devices. The command infrastructure supporting WireLurker has been shut down.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post WireLurker Mac OS X Malware Shut Down Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1uDpncx

Secure Hunter

Wednesday, November 5, 2014

Hacking Team Defends Spyware, Attacks Researchers’ Methods Secure Hunter

Hacking Team joins the choir of critics, including GCHQ and the FBI, rallying against anti-surveillance and privacy advocates, who, they say, aid criminals and terrorists.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Hacking Team Defends Spyware, Attacks Researchers’ Methods Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1tbEz9Z

Secure Hunter

Tuesday, November 4, 2014

Monday, November 3, 2014

BlackEnergy Malware Plug-Ins Leave Trail of Destruction Secure Hunter

Researchers at Kaspersky Lab discovered a cache of Windows and Linux plug-ins for the BlackEnergy malware that, in addition to data theft, allow it to target Cisco routers and even destroy hard drives it infects.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post BlackEnergy Malware Plug-Ins Leave Trail of Destruction Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1DWddec

Secure Hunter

Friday, October 31, 2014

Russian APT28 Group Linked to NATO, Political Attacks Secure Hunter

APT28, a Russian hacking group, has been tied to attacks against the country of Georgia, Eastern European political and military organizations, and NATO, a report from FireEye said.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Russian APT28 Group Linked to NATO, Political Attacks Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1u3ERpO

Secure Hunter

BlackEnergy Malware Used in Attacks Against Industrial Control Systems Secure Hunter

Attackers are using BlackEnergy malware to attack HMI software running inside industrial control systems, according to an advisory from ICS-CERT.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post BlackEnergy Malware Used in Attacks Against Industrial Control Systems Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1ucwAAC

Secure Hunter

Wednesday, October 29, 2014

Microsoft Warns of Crowti Ransomware Secure Hunter

Researchers with Microsoft have spotted a spike in Crowti, a ransomware similar to Cryptolocker that encrypts files on victims’ machines and then asks for payment to unlock them.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Microsoft Warns of Crowti Ransomware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1sHsuZW

Secure Hunter

US-CERT Warns of Dyre Banking Trojan Secure Hunter

DHS sounded the alarm Monday on Dyre, the banking Trojan that’s been siphoning bank credentials from large enterprises and major financial institutions.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post US-CERT Warns of Dyre Banking Trojan Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1p0Sg0I

Secure Hunter

Tuesday, October 28, 2014

Four Distinct Watering Hole Attacks Dropping ScanBox Keylogger Secure Hunter

PwC has published research on four watering hole attacks likely carried out by different attackers, all connected by the ScanBox JavaScript-based reconnaissance tool.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Four Distinct Watering Hole Attacks Dropping ScanBox Keylogger Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1tIcIo0

Secure Hunter

Monday, October 27, 2014

Friday, October 24, 2014

Thursday, October 23, 2014

NAT-PMP Protocol Vulnerability Puts 1.2 Million SOHO Routers At Risk Secure Hunter

More than 1 million SOHO routers and embedded devices are vulnerable to a serious vulnerability in the NAT-PMP protocol that enables traffic hijacking and denial of service attacks.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post NAT-PMP Protocol Vulnerability Puts 1.2 Million SOHO Routers At Risk Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1seVKHm

Secure Hunter

Wednesday, October 22, 2014

Saturday, October 18, 2014

APTs Target Victims with Precision, Ephemeral Malvertising Secure Hunter

A new precisely targeted and fleeting form of malvertising is being deployed by APT groups to target organizations in the U.S. defense industrial base.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post APTs Target Victims with Precision, Ephemeral Malvertising Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1y2zohB

Secure Hunter

Friday, October 17, 2014

Microsoft Changing Detection of Adware and Browser Modifiers Secure Hunter

One of the not-so-great side effects of the transition to virtually everything being done in the Web browser now is that advertisers, attackers and scammers constantly are trying to get their code to run in users’ browsers, any way they can. A lot of this is done through extensions and browser objects, some of which […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Microsoft Changing Detection of Adware and Browser Modifiers Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1y0HabK

Secure Hunter

Secure Hunter Private Beta

Secure Hunter Private Beta Register Today On Our website
Click Here

Tuesday, October 14, 2014

BlackBerry 10 Devices Open to Bug That Allows Malicious App Installation Secure Hunter

BlackBerry has patched a vulnerability in its BlackBerry 10 devices that could allow an attacker to intercept users’ traffic to and from the BlackBerry World app store and potentially install malware on a targeted device. The vulnerability is a weakness in the integrity checking system that BlackBerry uses to verify the apps that users download. […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post BlackBerry 10 Devices Open to Bug That Allows Malicious App Installation Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1xQuG6n

Secure Hunter

Sandworm APT Team Found Using Windows Zero Day Vulnerability Secure Hunter

A cyberespionage team believed to be based in Russia has been using a Windows zero day vulnerability to target a variety of organizations in several countries, including the United States, Poland, Ukraine and western Europe. The vulnerability, which will be patched today by Microsoft, is trivially exploitable and researchers say that the team behind the […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Sandworm APT Team Found Using Windows Zero Day Vulnerability Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1xOfOp8

Secure Hunter

Friday, October 10, 2014

Backoff Malware Identified as Culprit in Dairy Queen Breach Secure Hunter

Close to 400 Dairy Queen locations were breached this summer and the company has pinned the blame on hackers using the Backoff point-of-sale malware.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Backoff Malware Identified as Culprit in Dairy Queen Breach Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1C3n5lv

Secure Hunter

Shellshock Exploits Spreading Mayhem Botnet Malware Secure Hunter

Researchers at Malware Must Die published a report that hackers are spreading Mayhem botnet malware in exploits targeting the Shellshock vulnerability in Bash.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Shellshock Exploits Spreading Mayhem Botnet Malware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1rkYAdh

Secure Hunter

Tuesday, October 7, 2014

Tyupkin Malware Infects ATMs Worldwide Secure Hunter

The Tyupkin malware, spotted on ATMs in Eastern Europe, allows criminals to make withdrawals of 40 banknotes at a time, researchers at Kaspersky Lab said.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Tyupkin Malware Infects ATMs Worldwide Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1vR8zva

Secure Hunter

Thursday, October 2, 2014

Release of Attack Code Raises Stakes for USB Security Secure Hunter

Two researchers published attack code exploiting weaknesses in USB similar to the BadUSB research presented at this year’s Black Hat conference.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Release of Attack Code Raises Stakes for USB Security Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1vCq6bC

Secure Hunter

Wednesday, October 1, 2014

Xsser Trojan Spies on Jailbroken iOS Devices Secure Hunter

An iOS espionage Trojan has been discovered spying on jailbroken Apple devices, primarily used against pro-democracy protestors in Hong Kong.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Xsser Trojan Spies on Jailbroken iOS Devices Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1qY3s83

Secure Hunter

Tuesday, September 30, 2014

New Signed Version of CryptoWall Ransomware On the Loose Secure Hunter

Researchers have discovered a variant of the CryptoWall ransomware that has a valid digital signature and is being distributed through malicious ads on several top-ranked Alexa Web sites. CryptoWall is one of the more successful ransomware strains in recent memory, with researchers estimating last month that the malware had grossed more than $ 1 million for […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post New Signed Version of CryptoWall Ransomware On the Loose Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1owTCdK

Secure Hunter

Monday, September 29, 2014

FBI to Open Up Malware Investigator Portal to External Researchers Secure Hunter

SEATTLE–The FBI has developed an internal malware-analysis tool, somewhat akin to the systems used by antimalware companies, and plans to open the system up to external security researchers, academics and others. The system is known as Malware Investigator and is designed to allow FBI agents and other authorized law enforcement users to upload suspicious files. […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post FBI to Open Up Malware Investigator Portal to External Researchers Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1mIDzOp

Secure Hunter

Friday, September 26, 2014

Bash Exploit Reported, First Round of Patches Incomplete Secure Hunter

Reports of the first in-the-wild exploits targeting the Bash vulnerability have surfaced, as have complaints the first patches for the bug are incomplete.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Bash Exploit Reported, First Round of Patches Incomplete Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1neC0bA

Secure Hunter

Patching Bash Vulnerability a Challenge for ICS, SCADA Secure Hunter

Experts are concerned that many Linux-based industrial control systems and embedded systems could be too steep a patching challenge and remain in the crosshairs of the Bash vulnerability.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Patching Bash Vulnerability a Challenge for ICS, SCADA Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1pg6V25

Secure Hunter

Thursday, September 25, 2014

Wednesday, September 24, 2014

Researchers Work to Predict Malicious Domains Secure Hunter

SEATTLE–A typical phishing or Web-based malware attack usually isn’t terribly complex. But they need a few things in order to work, and one of the key components often is a malicious domain. Researchers spend a lot of time identifying and taking these domains down, but some researchers now are trying to stay a step ahead […]

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Researchers Work to Predict Malicious Domains Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1v1fJyD

Secure Hunter

Tuesday, September 23, 2014

JQuery Website Redirecting to RIG Exploit Kit Secure Hunter

jQuery.com, website for the popular jQuery JavaScript library, is redirecting visitors to a site hosting the RIG exploit kit, security company RiskIQ said.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post JQuery Website Redirecting to RIG Exploit Kit Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XYdMWx

Secure Hunter

Monday, September 22, 2014

Microsoft cloud protection


​Microsoft is using cloud protection to help keep our customers safe. In fact, nearly any detection made by Microsoft security products could be the result of cloud protection. Software developers often ask us how this cloud protection works and how they can improve our cloud’s impression of their software.


How our cloud protection works


When our antimalware products encounter anything unusual, they can send a small packet of information about the event or file to our server. The server then sends back a reply telling the antimalware software whether to block it or not. It can also request a sample for further analysis.


There are three situations that highlight the benefits of cloud protection:



  • If a file is known to be malware by our servers but not by the local antimalware product, the cloud protection module can tell the local product to block or remove it.

  • If a file is known to be clean by our servers, but the local antimalware product detects the file as malware (an incorrect detection situation), the cloud protection module can tell the local antimalware to not detect it, and the incorrect detection does not affect the user.

  • If a local antimalware product encounters a file that we don’t know about, our server can make a determination based on probabilities, and tell the local antimalware software to block it, even without having seen a copy of the file.


It’s this third point that I would like to discuss further.


Improving your software’s cloud impression


We are often asked by software vendors if we have a way for them to pre-whitelist their software. However, our backend processing actually works better if we see your software as it’s naturally distributed. I will outline a few methods to improve our cloud’s impression of your software below:



  • Digitally sign your software using a method accepted by Microsoft. This is the fastest way to get a good cloud reputation because the reputation of a good file can be distributed to all files signed by the same key.

  • Once you have digitally signed your software, be careful that malware isn’t also signed by your key. This will negate any good reputation. You can help avoid this situation by:






    • Making sure you protect your key from being stolen by malware authors.

    • Ensuring your development process prevents a parasitic file-infecting virus from being inadvertently signed by your key.

    • Reading more about the best practices for signing software.






  • If you can’t digitally sign your software, be aware that every minor version of your product will have to build reputation from scratch. This affects vendors who provide a different file on every single download. It doesn’t mean you can’t make bug-fix versions, different languages, etc.

  • Make sure your software doesn’t install malware:





    • Take care to avoid security vulnerabilities. Even if you don’t intend to install malware, a security vulnerability could be detected as your product installing malware.

    • If you download executables off the internet, have your software check a digital signature or cryptographic hash, to ensure it has the correct file you intended it to download. We have seen one case where a popular installer had some URLs distributing malware and we had to detect every one of their installers in case it was downloading one of the malware URLs.





  • Make sure your software isn’t installed by malware:





    • Proactively check your affiliates and companies who bundle your software.

    • Fill out the metadata information such as the information about the author and company in the file resources. If this and the digital signature isn’t enough, consider adding contact information, or a pointer to find contact information on the web. This contact information should direct to the right contact to report a security vulnerability, or work with to fix or prevent a incorrect detection.





  • If you use a runtime packer or obfuscator, you need to be aware that the majority of malware is packed or obfuscated, and this does affect how your software is seen at the back end.

  • Consider how your software is seen and whether it’s installed on the machines of users who really want it. We have honeypots, web crawlers, and automatic software testing. We can look at whether users chose to continue the download after the warning that a program isn’t commonly downloaded. We can also see whether users chose to ignore or remove software if our antimalware detects it. Bad behavior can quickly ruin a good software reputation.

  • There are some behaviors that, while not enough to warrant a detection on their own, do attract the suspicion of human and automated systems. They could be used for legitimate reasons, but are often closely associated with malware behavior. This includes:





    • Installing outside the commonly accepted folders for the type of software.

    • Modifying or adding a sensitive registry key.

    • Process or thread injection.

    • Autonomous internet activity.




If you believe we have made an incorrect detection for your product you can submit a developer contact form. Making a slight change and pushing it out to your software won’t necessarily address any incorrect bad reputation applied to the code signing key you used for the file that was incorrectly detected. Our cloud protection might also note the similarity between the file that it still believes was correctly detected as malware, and the new version.


MMPC






Microsoft Malware Protection Center

Secure Hunter Anti -Malware



The post Microsoft cloud protection appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1DuWz8e

Secure Hunter

Kyle and Stan Malvertising Network Nine Times Bigger Than First Reported Secure Hunter

The Kyle and Stan malvertising network has compromised more than nine times as many domains as originally reported two weeks ago.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Kyle and Stan Malvertising Network Nine Times Bigger Than First Reported Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XYUPDm

Secure Hunter

Thursday, September 18, 2014

Dyre Trojan Caught In The Cookie Jar Secure Hunter

Researchers at Adallom analyzed a sample of the Dyre banking Trojan that was found to be targeting Salesforce.com credentials.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Dyre Trojan Caught In The Cookie Jar Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XOZAzl

Secure Hunter

Thursday, September 11, 2014

Key Flaw Enables Recovery of Files Encrypted by TorrentLocker Secure Hunter

Crypto ransomware, a relatively unknown phenomenon a couple of years ago, has exploded into one of the nastier malware problems for Internet users. Variants such as CryptoLocker and CryptoWall have been siphoning money from victims for some time, and now researchers have dissected a newer variant known as TorrentLocker and found that the creators made […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Key Flaw Enables Recovery of Files Encrypted by TorrentLocker Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1lYYixe

Secure Hunter

Tuesday, September 9, 2014

‘Kyle and Stan’ Malvertising Network Targets Windows and Mac Users Secure Hunter

A malvertising network that has been operating since at least May has been able to place malicious ads on a number of high-profile sites, including Amazon and YouTube and serves a unique piece of malware to each victim. The network, dubbed Kyle and Stan by the Cisco researchers who analyzed its activities and reach, comprises […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post ‘Kyle and Stan’ Malvertising Network Targets Windows and Mac Users Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1rDxbEk

Secure Hunter

Israeli Think-Tank Site Serves Sweet Orange Exploit Secure Hunter

Drive-by malware downloads have been spotted on the website of a prominent Israel think-tank, the Jerusalem Center for Public Affairs. The attacks seems to target bank credentials.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Israeli Think-Tank Site Serves Sweet Orange Exploit Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1tqQbYT

Secure Hunter

Monday, September 8, 2014

Salesforce Warns Customers of Dyreza Banker Trojan Attacks Secure Hunter

Salesforce.com is warning its customers that the Dyreza banker Trojan is now believed to be targeting some of the company’s users. The Trojan, which has the ability to bypass SSL, typically goes after customers of major banks, but seems to be expanding its reach. Dyreza is relatively new among the banker Trojan crowd and it […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Salesforce Warns Customers of Dyreza Banker Trojan Attacks Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1lRYkqD

Secure Hunter

Thursday, September 4, 2014

Saturday, August 30, 2014

CryptoWall’s Haul: $1M in Six Months Secure Hunter

The CryptoWall ransomware has proven to be a profitable criminal enterprise, netting more than $ 1.1 million in six months. More than 1,600 victims have surfaced and more than 5 billion files have been encrypted.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post CryptoWall’s Haul: $1M in Six Months Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1wS8xbj

Secure Hunter

Thursday, August 28, 2014

Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections Secure Hunter

GameOver Zeus and Sality banking malware infections are rampant in emerging countries such as Turkey where older, unpatched computers are prevalent, and security awareness is low.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Windows XP-Heavy Turkey Overrun with GameOver Zeus Infections Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1wHQ5BZ

Secure Hunter

Tuesday, August 26, 2014

Monday, August 25, 2014

Secret Service Warns 1,000 Businesses Hit by Backoff PoS Malware Secure Hunter

DHS and the Secret Service warned businesses to be proactive about scanning for point-of-sale malware, especially Backoff, which has hit more than 1,000 businesses already.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Secret Service Warns 1,000 Businesses Hit by Backoff PoS Malware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1vHXCMV

Secure Hunter

Attack targets auto industry firms in Europe Secure Hunter

Cybercriminals are using a new information-stealing malware program to target companies from the automobile industry in Europe, security researchers warned.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Attack targets auto industry firms in Europe Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1tNux1m

Secure Hunter

How to protect yourself online with privacy settings

Shadow cloud services pose a growing risk to enterprises Secure Hunter

A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Shadow cloud services pose a growing risk to enterprises Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1mI9dX1

Secure Hunter

Friday, August 22, 2014

US warns 'significant number' of major businesses hit by Backoff malware Secure Hunter

More than 1,000 major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post US warns 'significant number' of major businesses hit by Backoff malware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1v6QrAo

Secure Hunter

Microsoft engineer: ‘Definitely problems’ with test process after crippling Windows patch Secure Hunter

A week after Microsoft pulled a Patch Tuesday update that crippled some Windows 7 PCs, the company has yet to provide a working fix for either the original flaw or the resulting problem.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Microsoft engineer: ‘Definitely problems’ with test process after crippling Windows patch Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1niHj3E

Secure Hunter

Wednesday, August 20, 2014

UPS now the third company in a week to disclose data breach Secure Hunter

Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 U.S. states this year may have been compromised.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post UPS now the third company in a week to disclose data breach Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1pMMldA

Secure Hunter

A New Spin on Rogue Antivirus Secure Hunter

Rogue antivirus malware is on the decline, but a new, simpler version of that threat that simply redirects users to the site of a fake malware protection service has been infecting users around the world.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post A New Spin on Rogue Antivirus Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/XBxQPj

Secure Hunter

‘Reveton’ransomware adds powerful password stealer Secure Hunter

A type of malware called Reveton, which falsely warns users they’ve broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post ‘Reveton’ransomware adds powerful password stealer Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1oR9FYr

Secure Hunter

Tuesday, August 19, 2014

APT Gang Branches Out to Medical Espionage in Community Health Breach Secure Hunter

The Community Health Systems data breach has been tied to a Chinese APT gang that has branched out to medical espionage, stealing patient data in an effort to target intelligence on medical device development.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post APT Gang Branches Out to Medical Espionage in Community Health Breach Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1sTcauO

Secure Hunter

Kicking the stool out from under the cybercrime economy Secure Hunter

Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats — and the losses –aren't quite so serious.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Kicking the stool out from under the cybercrime economy Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1veuD30

Secure Hunter

New Attack Binds Malware in Parallel to Software Downloads Secure Hunter

Open source software distribution systems that lack security processes and integrity checks are prone to a new attack that binds malware to a download without modifying the original application.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post New Attack Binds Malware in Parallel to Software Downloads Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1pHEaPH

Secure Hunter

Monday, August 18, 2014

Pro-Syrian Malware Increasing in Number, Complexity Secure Hunter

Malware deployed against activists in Syria is increasing as the groups deploying these remote access tools become more sophisticated and utilize more complex tactics.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Pro-Syrian Malware Increasing in Number, Complexity Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1valRD4

Secure Hunter

Update: Microsoft pulls crippling patch from Windows Update Secure Hunter

Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Update: Microsoft pulls crippling patch from Windows Update Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1o5yEkG

Secure Hunter

Sunday, August 17, 2014

Microsoft urges customers to uninstall ‘Blue Screen of Death’ update Secure Hunter

Microsoft is quietly recommending that customers uninstall one of last week’s security updates after users reported that it crippled their computers with the infamous “Blue Screen of Death.”

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Microsoft urges customers to uninstall ‘Blue Screen of Death’ update Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/VwNE4f

Secure Hunter

Friday, August 15, 2014

Heartbleed software flaw exposes weaknesses in hardware design Secure Hunter

Heartbleed may have been a software bug, but it highlighted glaring weaknesses in existing hardware architectures, which remain vulnerable to memory-bound attacks, a university researcher said this week.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Heartbleed software flaw exposes weaknesses in hardware design Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1m48dMv

Secure Hunter

Cridex Malware Takes Lesson From GameOver Zeus Secure Hunter

Researchers have now identified a new variant of the Cridex malware that has adopted some of the techniques that made GOZ so successful in its day.

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Cridex Malware Takes Lesson From GameOver Zeus Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1l9mNHz

Secure Hunter

Grocery stores in multiple states hit by data breach Secure Hunter

A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company’s stores in June and July.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Grocery stores in multiple states hit by data breach Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1AkDlzy

Secure Hunter

Malware no longer avoids virtual machines Secure Hunter

Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn’t the case anymore, according Symantec research.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Malware no longer avoids virtual machines Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1t32TwY

Secure Hunter

Google Adds Warnings About Deceptive Software to Safe Browsing Service Secure Hunter

The Google Safe Browsing service has become an integral part of most of the major browsers, integrating malware alerts, warnings about malicious Web sites and suspicious content. The company has been expanding the capabilities of the service steadily over the last few years, and now Google is adding warnings about deceptive software to the service. […]

Threatpost – English – Global – threatpost.com » Malware

Secure Hunter Anti -Malware



The post Google Adds Warnings About Deceptive Software to Safe Browsing Service Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1pggrW1

Secure Hunter

Thursday, August 14, 2014

Users told to patch critical flaw in Adobe Reader and Acrobat Secure Hunter

Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.

Computerworld Malware and Vulnerabilities News

Secure Hunter Anti -Malware



The post Users told to patch critical flaw in Adobe Reader and Acrobat Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1oU4x4P

Secure Hunter