Security Alerts & News
by Tymoteusz A. Góral

History
#1288 Shade: not by encryption alone
For the initial check, the updated Trojan (verdict Trojan-Ransom.Win32.Shade.yb) searches the list of installed applications and looks for strings associated with bank software. After that the ransomware looks for “BUH”, “BUGAL”, “БУХ”, “БУГАЛ” (accounting) in the names of the computer and its user. If a match is found, the Trojan skips the standard file search and encryption procedure and instead downloads and executes a file from the URL stored in the Trojan’s configuration, and then exits.
Read more
#1291 Bluetooth hack leaves many smart locks, IoT devices vulnerable
#1290 An ATM hack and a PIN-pad hack show chip cards aren’t impervious to fraud
#1289 Copperhead OS: The startup that wants to solve Android’s woeful security
#1288 Shade: not by encryption alone
#1287 A new wireless hack can unlock 100 million volkswagens
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12