Security Alerts & News
by Tymoteusz A. Góral

History
#1439 Picture perfect: CryLocker ransomware uploads user information as PNG files
Taking advantage of legitimate sites for command-and-control (C&C) purposes is typically done by most malware to avoid rousing suspicion from their targets. While most ransomware directly sends the gathered information to their designated C&C servers, there are some variants that slightly differ. CuteRansomware, for instance, uses Google Docs to pass information from the infected system to the attackers.

One of the latest ransomware families, CryLocker (detected as RANSOM_MILICRY.A), does the same by taking advantage of Imgur, a free online image hosting site that allows users to upload and share photos to their contacts. During our monitoring of activities related to exploit kits, we spotted both Rig and Sundown distributing this threat.
Read more
#1449 Critical MySQL vulnerability disclosed
#1448 Fire drill knocks ING bank's data centre offline
#1447 Cisco’s network bugs are front and center in bankruptcy fight
#1446 Now you can buy a USB stick that destroys anything in its path
#1445 Two critical bugs and more malicious apps make for a bad week for Android
#1444 Re-thinking security fundamentals: How to move beyond the FUD
#1443 Blue light has a dark side
#1442 Cryptocurrency mining malware discovered targeting Seagate NAS hard drives
#1441 MalwareMustDie spotted a new ELF trojan backdoor, which is now targeting IoT devices
#1440 Wordpress urges users to update now to fix critical security holes
#1439 Picture perfect: CryLocker ransomware uploads user information as PNG files
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12