Articles about Trojan

Another banking trojan is trying to loot your cryptocurrency wallets

Researchers have discovered a new variant of banking trojan that targets cryptocurrency wallets instead of traditional accounts. Coinbase, the cryptocurrency exchange site targeted in part by the latest Trickbot variant, manages multiple currencies thus offering crooks a wider platform for abuse once they succeed in harvesting …
John Leyden, 30 Aug 2017
malware

For all the chaos it sows, fewer than 1% of threats are actually ransomware

Ransomware dominated the threat landscape last year even though file-encrypting nasties made up less than one in a hundred examples of different Windows malware during 2016. The mode of action and damage created by file-encrypting trojans makes them a much greater threat than implied by a consideration of the numbers, …
John Leyden, 4 Jul 2017

Say hello to Dvmap: The first Android malware with code injection

A powerful Android trojan with novel code injection features that posed as a game was distributed through the Google Play Store before its recent removal. The Dvmap trojan installs its malicious modules while also injecting hostile code into the system runtime libraries. But Dvmap has other tricks up its sleeve. Once …
John Leyden, 9 Jun 2017
malware

64-bit malware threat may be itty-bitty now, but it's only set to grow

The volume of 64-bit malware in the wild remains low even though computers running 64-bit operating systems became ubiquitous years ago. The vast majority (93 per cent) of new computers sold worldwide operate on 64-bit Windows but most nasties were written to infect 32-bit systems, according to a new study by security firm …
John Leyden, 24 May 2017

Media players wide open to malware fired from booby-trapped subtitles

Hackers have gone back to the future by attempting to infect targets with booby-trapped subtitle files. By crafting malicious subtitle files for films and TV programmes, which are then downloaded by viewers, attackers can hope to take complete control of any device running the vulnerable platforms. Hackers have pushed trojans …
John Leyden, 23 May 2017

FireEye calls Shim-anigans: Bank-raiding hackers switch tactics

A group of money-grabbing cybercrooks have switched up their tactics in a pretty interesting way, we're told. Buckle up and let us explain. FIN7, whose stock in trade is targeting financial institutions through phishing emails, previously relied on a malicious Windows service to plant the Carbanak backdoor on targeted systems …
John Leyden, 5 May 2017

Recruiters considered really harmful: Devs on GitHub hit with booby-trapped fake job emails

Recruiters are known to be a bit of a pain in the ASCII in the tech world – but how about these ones: bogus headhunters attempting to infect GitHub-using software developers. The miscreants have harvested email addresses for active GitHub accounts, and spammed the inboxes with booby-trapped job offers. These malicious messages …
Man in an orange jumpsuit clutches prison bars. Image by Shutterstock

FBI secures guilty plea from Russian bot-herder

A Russian citizen behind “tens of thousands” of Ebury trojan infections has entered a guilty plea in the US and will face sentencing in August. The US Department of Justice indicted Maxim Senakh, now 41, in January 2015. Ebury was a trojan carrying an SSH rootkit and putting backdoors into its targets, which were Linux, …

TeamSpy hackers get the crew back together after four-year hiatus

Updated Cybercrooks have once again begun slinging malware that subverts elements of the legitimate TeamViewer remote control app to snoop on victims. The tactic was previously seen in 2013. Attacks typically begin with booby-trapped emails harbouring malicious attachments that pose as eFax messages. If installed, the malicious code …
John Leyden, 21 Feb 2017

Mega UK hospitals trust Barts says IT borkage was due to trojan – not ransomware

Barts Health NHS Trust has blamed the disruption of its IT systems last Friday on a trojan horse infection and not ransomware. The trust, which runs five east London hospitals and is among the biggest in the UK, was forced to quarantine systems in response to the outbreak last week. In an update on Monday, the trust said that …
John Leyden, 17 Jan 2017

Brother-and-sister duo arrested over hacking campaign targeting Italy's bigwigs

A hacking operation featuring the EyePyramid trojan successfully compromised the systems of numerous high-profile Italian targets, including two former prime ministers, say Italian police. High-profile targets were targeted by a spear-phishing campaign that served a remote-access trojan codenamed "EyePyramid" as a malicious …
John Leyden, 12 Jan 2017
asteroid mission

NASA plans seven-year trip to Jupiter – can we come with you, please?

Vid NASA has OKed two new missions to study some of the most interesting asteroids in our solar system, as part of its ongoing Discovery mission program. The first mission, named Lucy, will launch in October 2021 and will head off to the gas giant of Jupiter to explore its Trojan zones. These are two points on either side of the …
Iain Thomson, 5 Jan 2017
I AM NIKOM / Shutterstock.com

New Android-infecting malware brew hijacks devices. Why, you ask? Your router

Hackers have brewed up a strain of Android malware that uses compromised smartphones as conduits to attack routers. The Switcher trojan does not attack Android device users directly. Instead, the malware uses compromised smartphones and tablets as tools to attack any wireless networks they connect to. Switcher brute-forces …
John Leyden, 3 Jan 2017

Bad news, fandroids: Mobile banking malware now encrypts files

Cybercrooks have outfitted ransomware functionality onto an already dangerous mobile banking Trojan. The modified Faketoken can steal credentials from more than 2,000 Android financial applications, security researchers at Kaspersky Lab warn. Based on telemetry, Kaspersky Lab estimates that Faketoken has claimed over 16,000 …
John Leyden, 20 Dec 2016

Hospital info thief malware puts itself into a coma to avoid IT bods

A Trojan targeting US healthcare organizations attempts to avoid detection by going to sleep for prolonged periods after initial infection, security researchers warn. Symantec estimates that thousands of organizations have been hit by the Gatak Trojan since 2012. The malware is programmed to spread aggressively across an …
John Leyden, 22 Nov 2016

Google to patch Chrome mobile hole after bank trojan hits 318k users

An Android Chrome bug that's already under attack - with criminals pushing banking trojans to more than 300,000 devices - won't get patched until the next release of the mobile browser. The flaw allows malware writers to quietly download Android app installation (.apk) files to devices without requiring approval. Users need …
Darren Pauli, 8 Nov 2016
image by TSHIRT-FACTORYdotCOM http://www.shutterstock.com/gallery-110716p1.html

Hax0rs sow Discord by using VoIP service to sling malware at gamers

Hackers abused a free VoIP service for gamers to distribute remote-access Trojans and other malware. Miscreants took to Discord and distributed malicious programs including NanoCore, njRAT, SpyRAT to gamers using the chat servers, but that was just one aspect of a wider pattern of abuse. Symantec discovered some groups were …
John Leyden, 21 Oct 2016

Double-dipping malware steals iOS creds and roots Android

A newly-outed trojan is exploiting iOS and Android devices, ripping iCloud credentials abusing the trusted link between phones and PCs, says Palo Alto security researcher Claud Xiao. The attack appears to have failed in most circumstances, thanks to iOS' sandboxing security controls, hardened modern Android operating systems, …
Darren Pauli, 15 Sep 2016

Create a news alert about Trojan, or find more stories about Trojan.

Biting the hand that feeds IT © 1998–2017