Security Alerts & News
by Tymoteusz A. Góral

#1338 Hancitor downloader shifts attack strategy
Researchers said a new variant of the Hancitor downloader has shifted tactics and adopted new dropper strategies and obfuscation techniques on infected PCs. Researchers at Palo Alto Networks are currently tracking the biggest push of the Hancitor family of malware since June that it says has shifted away from H1N1 downloader and now distributes the Pony and Vawtrak executables.

The variant uses native API calls within Visual Basic code to carve out and decrypt embedded malware from malicious Word documents.

“Lures were expected, until we started digging into the actual documents attached and saw an interesting method within the Visual Basic macros in the attached documents used for dropping the malware,” wrote Jeff White, senior threat researcher at Palo Alto Networks, in a report.
Read more
#1344 Juniper acknowledges equation group targeted ScreenOS
#1343 Northsec 2016 Conference - (VIDEO)
#1342 Test: parental control apps for Android
#1341 Threat intelligence report for the telecommunications industry
#1340 Embedded hardware hacking 101 – the Belkin WeMo link
#1339 A 'Tor General Strike' wants to shut down the Tor network for a aay
#1338 Hancitor downloader shifts attack strategy
#1337 Obihai patches memory corruption, DoS, CSRF vulnerabilities in IP phones
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12