Presented at BlackHat USA 2017 by Itzik Kotler and Amit Klein from SafeBreach Labs, the PoC tool relies on packing data inside an executable the main malware process creates on the compromised endpoint. Thus, if the AV product employs an Internet-connected sandbox as part of its cloud service, data is exfiltrated as soon as the AV agent uploads the newly created executable to the cloud...
Read More
BitMixer, the world’s most popular Bitcoin mixing service has announced last weekend it was shutting down operations effective immediately.In a statement, the BitMixer owners said they were shutting down the service after realizing that Bitcoin was a “transparent non-anonymous system by design.”
A hacker or group of hackers has breached the servers of HBO and have stolen over 1.5TB of information, some of which they leaked online over the weekend. The hackers announced the leak by sending private emails to a group of selected reporters. The emails contained links to the leaked material.
While mobile ransomware such as the recent SLocker focuses on encrypting files on the victim’s devices, a new mobile ransomware named LeakerLocker taps into its victims’ worst fears by allegedly threatening to send personal data on a remote server and expose its contents to everyone on their contact lists.
Another case of pre-installed malware make the headlines, malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones, including Leagoo M5 Plus, Leagoo M8, Nomu S10, and Nomu S20. Experts speculate that threat actors compromised the supply chain infecting a small number of smartphones of the above models.