Security Alerts & News
by Tymoteusz A. Góral

History
#1186 CrypMIC ransomware wants to follow CryptXXX’s footsteps
They say imitation is the sincerest form of flattery. Take the case of CrypMIC—detected by Trend Micro as RANSOM_CRYPMIC—a new ransomware family that mimics CryptXXX in terms of entry point, ransom notes and payment site UIs. CrypMIC’s perpetrators are possibly looking for a quick buck owing to the recent success of CryptXXX.

CrypMIC and CryptXXX share many similarities; both are spread by the Neutrino Exploit Kit and use the same format for sub-versionID/botID (U[6digits] / UXXXXXX]) and export function name (MS1, MS2). Both threats also employed a custom protocol via TCP Port 443 to communicate with their command-and-control (C&C) servers.
Read more
#1191 IoT insecurity: Pinpointing the problems
#1190 Nearly six million fraud and cyber crimes last year, ONS says
#1189 Tinder safe dating spam uses safety to scam users out of money
#1188 Jackware: When connected cars meet ransomware
#1187 Hidden 'backdoor' in Dell security software gives hackers full access
#1186 CrypMIC ransomware wants to follow CryptXXX’s footsteps
#1185 Update now: Macs and iPhones have a Stagefright-style bug!
#1184 Facebook malware – the missing piece
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12