QuoIntelligence cyber security experts: Russian state hackers exploit fake training docs to spread the malware. There are correlations with ReconHell/BlackWater attack.
Cyber security experts JAMESWT and MalwareHunterteam: The goal is to decept the anti virus and let victims install the malware, a powerful banking trojan with strong persistence.
Cryptolaemus cyber security experts find new links in the botnet that download the malware. The continuous evolution of the worldwide campaign confirms that it will continue.
Cyber security expert JAMESWT: The lure is a fake invoice by the courier. The XLS attachment dowloads a DLL that infects the computer with the malware.
Cyber security expert JAMESWT discovers a new campaign that exploits stolen conversations. The victim is invited to open a link to start the malware infection.
Purdue University cyber security esperts: authentication during the reconnection of devices is optional and can potentially be circumvented. But attacker has to be near the target.
Check Point cyber security experts: The Windows crypto miner and DDOS hybrid malware now is multi-platform and multi-architecture, targeting Linux and IoT devices.
Kela cyber security experts: The Criminal Hakcers launched a new data leak site. Previously they had anothe one, but it was closed when they joined the Maze Cartel.
The cyber security experts: They use publicly available information sources and common, well-known TTPs. It’s the second warning in few days ahead the presidential elections.