Security Alerts & News
by Tymoteusz A. Góral

History
#1970 Mirai gets a Windows version to boost distribution efforts
Security researchers have stumbled upon a Windows trojan that hackers are using to help with the distribution of the infamous Mirai Linux malware, used to infect IoT devices and carry out massive DDoS attacks.

The Mirai malware was initially developed in late 2015 and early 2016, and only became a massive threat in the summer and autumn of 2016, when it spread to hundreds of thousands of routers and DVRs (deployed with smart cameras and CCTV systems).

After crooks used a botnet of Mirai-infected devices to launch DDoS attacks on the KrebsOnSecurity blog, increased attention from law enforcement forced the malware's author to dump the Mirai source code online.

This move resulted in tens of Mirai variants popping up everywhere, which in turn helped hide the author's tracks, or so the author thought, until this Brian Krebs exposé.
Read more
#1978 Google Project Zero: How we cracked Samsung's DoD and NSA-certified Knox
#1977 AthenaGo RAT uses Tor2Web proxy system to hide C&C server
#1976 DynA-Crypt not only encrypts your files, but also steals your info
#1975 Newly discovered flaw undermines HTTPS connections for almost 1,000 sites
#1974 Finding Ticketbleed
#1973 Google let scammers post a perfectly spoofed Amazon ad in its search results
#1972 The startup paying people to legally hack Uber, Nintendo, and Starbucks just got another $40 million to keep growing
#1971 Fileless attacks against enterprise networks
#1970 Mirai gets a Windows version to boost distribution efforts
#1969 This modular backdoor malware is now the most common threat to Android smartphones
#1968 Mac malware, possibly made in Iran, targets US defense industry
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12