The “Threat Landscape 2020” has just been released. Malware is in first place, followed by web-based attack and phishing. COVID-19 fuelled cyber aggressions.
The bait is always real stolen email conversations. The doc attachment contacts the first available url from a list within it to start the malware infection.
Bleeping Computer: The aim is to lure victims into enabling Excel macros. Threat actors also continue using signed campaigns for distributing the malware.
Cryptolaemus cyber security experts find new links in the botnet that download the malware. The continuous evolution of the worldwide campaign confirms that it will continue.
The cyber security experts: Someone hacked into the malware's distribution sites and replaced payloads with memes and images. Criminals paused the spamming, but the war is not over.
The CSIRT-Italy cyber security experts: A new variant of ransomware is conveyed by the botnet phorpiex (trik). The email text only contains emoticons and a fake zip format photo.
Yoroi ZLab cyber security experts believe is the work of the “Outlaw Hacking Group”. The malware is a variant of “Shellbot”, with new IRC server and Monero pools.
Palo Alto Networks cyber security experts: Latest Mirai variant contains a total of 71 unique exploits, 13 of these vulnerabilities haven’t been previously seen exploited.
CybergON's cyber security experts: malware, a botnet that attacked 1.5 million RDP servers worldwide in June, has new protocols that allow it to attack multiple machines.
ESET cyber security experts: Before that, it performed click fraud, ad injection, social network fraud and password stealing attacks. It targets Russia, Ukraine, Belarus and Kazakhstan.