Malware

A new trend, which was also pointed out in our Q1 cybercrime report, is the combination of PUPs and Tech Support Scams. Most of these PUPs are so-called system optimizers. This is worrying as the damage done by PUPs was limited or we would have marked them as malware. By…

Read More

This fake financial spam leads to malware: From:    ScotiaBank [Secure.Mail@scotiabankmail.com]Date:    27 April 2017 at 14:13Subject:    Secure email communicationSigned by:    scotiabankmail.com Scotia Secure Email LogoSecure mail waiting: (Secure)Scotiabank has sent you a secure, encrypted e-mail message. To view this e-mail, please visit “Scotiabank Secure Email Service” or check attach file. For…

Read More

This fake Royal Mail email leads to malware. From: Aretha Stickles [mailto:support@360modshop.com] Sent: 27 April 2017 12:31Subject: Delivery attempt fail notice Dеаr customеr [redacted] Your pаrcel has been in the post office for a very long time.You must to receive it it within five days. TRACKING: RB379949016UK Expeсted Delivery Dаte:…

Read More

People and media are mostly looking at ransomware as a fairly recent problem. That seems to be logical if you see the steep rise of ransomware the past three years. In fact, the problem is much older than most of us think. For this we need to go back in…

Read More

People and media are mostly looking at ransomware as a fairly recent problem. That seems to be logical if you see the steep rise of ransomware the past three years. In fact, the problem is much older than most of us think. For this we need to go back in…

Read More

The Android operating system clearly dominates the mobile market, with a share of around 72 percent. In Germany alone, around 67 percent of smartphone owners use a device with an Android operating system (source: Statcounter). G DATA security experts discovered over 750,000 new Android malware apps in the first quarter…

Read More

One of the most common malware campaigns from compromised websites is known as EITest and has traditionally been redirecting victims towards exploit kits. But it also has an alternate payload for browsers other than Internet Explorer, specifically for Google Chrome, where it tricks users into downloading a fake font file. The…

Read More

In this series, we will be using the flowchart below to follow the process of determining which adware we are dealing with. Our objective is to give you an idea of how many different types of adware are around for Windows systems. Though most adware will be classified as PUPs,…

Read More

Since our last post on Terror EK, we haven’t really seen much activity from this exploit kit. However, in recent days it popped back up again with a slightly new format. One thing that seemed consistent with Terror EK was the use of a plain IP address in its URL…

Read More

iCloud is an increasingly large target for scams of all kinds. It’s a common target for scams involving phishing e-mails. The goal of such scams is to get you to click a link that takes you to a fake iCloud login page, resulting in you submitting your iCloud login credentials…

Read More