Security Alerts & News
by Tymoteusz A. Góral

#743 Backdoor as a software suite: How TinyLoader distributes and upgrades PoS threats (PDF)
The tandem of TinyLoader backdoor and a point-of-sale (PoS) threat, AbaddonPOS was first reportedly seen in November 2015. When we noticed a sudden spike in AbaddonPOS detections just this January, TinyPOS, another PoS malware strain, has also reared its ugly head that time. This prompted us to probe further on these threats and check if they are in any way related to one another.

Our analysis reveals that TinyLoader, a backdoor used for secondary malware infection, is distributing and managing the upgrades of AbaddonPOS. Likewise, TinyLoader is also spreading TinyPOS variants. This leads us to conclude that the operators behind TinyPOS and AbaddonPOS are one and the same.

In this technical brief, we’ll discuss the ties that bind TinyLoader with two notorious PoS threats—AbaddonPOS and TinyPOS, including how the perpetrators behind this operation deployed their arsenals
Read more
#749 Attackers targeting critical SAP flaw since 2013
#748 Viking horde malware co-ops Android devices for ad fraud
#747 Microsoft zero-day exposes 100 companies to PoS attack
#746 Malware parasites feed on gossip fans
#745 Wendy’s: Credit cards breach affected 5% of restaurants
#744 Mozilla launches Test Pilot, a Firefox add-on for trying experimental new features
#743 Backdoor as a software suite: How TinyLoader distributes and upgrades PoS threats (PDF)
#742 Microsoft Patch Tuesday 2016-05-10
#741 Software security suffers as startups lose access to Google’s virus data
#740 Adobe warns of Flash zero-day, patches Acrobat
#739 Microsoft patches JScript, VBScript flaw under attack
#738 Internet Explorer zero-day exploit used in targeted attacks in South Korea
#737 Checking in with spear phishing, criminals check out with hotel credit card data
#736 IBM’s Watson supercomputer takes on security
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12