Trojan Horse Malware

Type: Keyphrase
Name: Trojan Horse Malware
First reported 4 hours ago - Updated 1 hour ago - 2 reports

Tinba Banking Malware Expands Target List

A Trojan spotted earlier this year targeting banks in the Czech Republic has expanded its target list and become more global.According to researchers at Avast , an analysis of the payload for the Rig Exploit kit identified a payload known as Tinba that ... [Published Security Week - 4 hours ago]
First reported 3 hours ago - Updated 3 hours ago - 1 reports

RRAV Antivirus 1.3 (Freeware)

RRAV Antivirus is a lightweight and easy to understand piece of software whose main purpose resides in protecting your PC from a wide array of threats, enabling you to guard yourself against virus infections and other similar dangers.Straightforward and ... [Published Softpedia - 3 hours ago]
First reported 6 hours ago - Updated 6 hours ago - 1 reports

Citadel Malware Used in Attacks Aimed at Petrochemical Firms

Middle Eastern petrochemical organizations have been targeted in cyberattacks leveraging the notorious Citadel Trojan, researchers at IBM-owned Trusteer reported on Monday.Citadel is a variation of the Zeus malware which emerged after the source code ... [Published Security Week - 6 hours ago]
First reported 9 hours ago - Updated 7 hours ago - 1 reports

Internet privacy is a top security concern for users today: ESET

Pradeesh VS, the General Manager at ESET Middle East speaks about the security threat landscape in the Middle EastSince we are focused on IT security, we regularly monitor security trends – both globally and in the Middle East. In our report titled ‘Trends ... [Published Review Central Middle East - 9 hours ago]
First reported 9 hours ago - Updated 9 hours ago - 1 reports

15 Million Mobile Devices Victim To Malware ...

The recent numbers prove that the malware attack has increased by 17 per cent in the first half of 2014. A new report by Alcatel-Lucent's Kindsight Security Labs has revealed that malware has infected around 15 million mobile devices and most of them ... [Published EFYTimes.com - 9 hours ago]
First reported 11 hours ago - Updated 11 hours ago - 1 reports

Trojan Gen:Variant.Graftor.155439 present in fake emails regarding payments

MX Lab, http://www.mxlab.eu , intercepted different campaigns were the trojan Gen:Variant.Graftor.155439 is present in the attached ZIP archive. The trojan is known as Gen:Variant.Graftor.155439 by most AV engines but it’s also known as Trojan/Win32.Zbot, ... [Published MX Lab - 11 hours ago]
First reported 13 hours ago - Updated 13 hours ago - 1 reports

Understanding the threat landscape

Show  Not a day goes by without the headlines being littered with stories about stolen credit card data, massive data breaches and similar. Most businesses, whether or not they know it have suffered a breach, and many individuals have fallen victim ... [Published Marketing Spread - 13 hours ago]
First reported 20 hours ago - Updated 20 hours ago - 1 reports

Dyre Banking Trojan Used in APT-Style Attacks Against Enterprises

The global cloud computing company Salesforce.com is warning its customers that the Dyre Trojan might be used to target their login credentials. The Dyre banking Trojan, which typically targets customers of large financial institutions, was recently ... [Published Security Intelligence - 20 hours ago]
First reported Sep 15 2014 - Updated Sep 15 2014 - 2 reports

Tiny Banker Trojan targets customers of major banks worldwide

The Tinba Trojan aka Tiny Banker targeted Czech bank customers this summer; now it’s gone global. After an analysis of a payload distributed by Rig Exploit kit, the AVAST Virus Lab identified a payload as Tinba Banker. This Trojan targets a large scope ... [Published Security Bloggers Network - Sep 15 2014]
First reported Sep 15 2014 - Updated Sep 15 2014 - 1 reports

G Data Internet Security Light

G DATA Internet Security Light efficiently protects your smartphone against viruses, trojans, spyware, backdoors and other malware. Free virus protection with easy to use authorisation checking. Protect your identity and personal, confidential content ... [Published ZDNet - Sep 15 2014]
First reported Sep 15 2014 - Updated Sep 15 2014 - 1 reports

Over 22 transnational gangs operating in Thailand

Generic imageINTERNATIONAL NEWS - More than 22 transnational gangs are using Thailand as a base for their criminal activities, a report said Monday.Research by the Thai Institute of Justice found that the gangs were conducting various illegal activities ... [Published Knysna-Plett Herald - Sep 15 2014]
First reported Sep 14 2014 - Updated Sep 14 2014 - 1 reports

Ebola hits not just humans, but also computers

Even as the battle to combat Ebola in West Africa and prevent its spread continues, cybercriminals are using the latest headlines associated with the epidemic to bait innocent victims. IT security firm Symantec has observed three malware operations and ... [Published Financial Express - Sep 14 2014]

Quotes

"At first, XOR operation with a hardcoded value 0xac68d9b2 was applied," he explained. "Then, RC4 decryption with hardcoded password was performed. After RC4 decryption, we noticed AP32 marker at the beginning of the decrypted payload, which signalized aplib compression. Therefore, after aplib decompression, we got the configuration file in plaintext. After studying this roughly 65KB long plaintext file, we noticed that it targets financial institutions worldwide."
"The use of massively distributed malware means that attackers don’t need to spear-phish targets or design custom malware. Instead, they use mass distribution techniques to infect as many PCs as possible. These malware distribution campaigns can use malicious email attachments, drive-by downloads, watering hole attacks and social engineering schemes to infect millions of PCs around the world."
...There is some piece of good news for Android users too as the report says "the quality and sophistication of most Android malware is still a long way behind the more mature Windows PC varieties. The command-and-control mechanisms (C&C) are primitive and often don’t work. Configurations are hard coded and inflexible. The malware makes no serious effort to conceal itself, and attack vectors are limited to hoping someone installs the infected app."
...professional cybercriminals," Kevin McNamee, security architect and director of Alcatel-Lucent's Kindsight Security Labs, said in an announcement. "The quality and sophistication of most Android malware is still behind the more mature Windows PC varieties. Android malware makes no serious effort to conceal itself and relies on unsuspecting people to install an infected app."

More Content

All (1433) | News (736) | Reports (0) | Blogs (691) | Audio/Video (0) | Fact Sheets (1) | Press Releases (3)
sort by: Date | Relevance
IObit Malware Fighter Offline Database 2.4.1 1374 [Published MajorGeeks.com - 1 hour ago]
Anatomy of a Virus [Published The Scientist - 2 hours ago]
RRAV Antivirus 1.3 (Freeware) [Published Softpedia - 3 hours ago]
Tinba Banking Malware Expands Target List [Published Security Week - 4 hours ago]
Tinba Banking Malware Expands Target List [Published SecurityWeek RSS Feed - 4 hours ago]
2014 DSU Royalty Crowned [Published Noodls - 5 hours ago]
Looking for the Key to Security in the Internet... [Published Spectrum Online - 5 hours ago]
Looking for the Key to Security in the Internet... [Published IEEE Spectrum - 5 hours ago]
Citadel Malware Used in Attacks Aimed at Petroc... [Published Security Week - 6 hours ago]
Royal Bank of Scotland : Protecting yourself fr... [Published 4 Traders - 6 hours ago]
Mobile security is the top priority for ESET [Published Channel Post MEA - 7 hours ago]
Internet privacy is a top security concern for ... [Published Review Central Middle East - 9 hours ago]
15 Million Mobile Devices Victim To Malware ... [Published EFYTimes.com - 9 hours ago]
Trojan Gen:Variant.Graftor.155439 present in fa... [Published MX Lab - 11 hours ago]
Essential Things Individuals Need to know Conce... [Published Pressbox.co.uk - 12 hours ago]
Understanding the threat landscape [Published Marketing Spread - 13 hours ago]
Dyre Banking Trojan Used in APT-Style Attacks A... [Published Security Intelligence - 20 hours ago]
Report: Malware infections spiking on mobile de... [Published FierceMobileHealthcare - 21 hours ago]
Wikileaks releases FinFisher 'weaponized malwar... [Published Digital Journal - 22 hours ago]
Tiny Banker Trojan targets customers of major b... [Published Security Bloggers Network - Sep 15 2014]
Tiny Banker Trojan targets customers of major b... [Published avast! blog - Sep 15 2014]
Spyware Terminator 3.0.0.82 [Published MajorGeeks.com - Sep 15 2014]
Salesforce.com CEO Leaks Analytics Cloud Plan [Published Information Week - Sep 15 2014]
WikiLeaks: Australian Police Use ‘Weaponized Sp... [Published Inquisitr - Sep 15 2014]
Open Access Issue of Proceedings of the IEEE Ex... [Published PRWeb - Sep 15 2014]
Why whiteflies must be stopped; and how [Published Produce Grower - Sep 15 2014]
A new perspective on antivirus solutions [Published Pro Security Zone - Sep 15 2014]
A new Android ransomware family sets unlock pas... [Published Security Affairs - Sep 15 2014]
How to Unravel the Tangle of a Financial Cyber-... [Published Technology Banker - Sep 15 2014]
'SA spent €2m on snooping malware' [Published iafrica.com - Sep 15 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Tinba Banking Malware Expands Target List [Published SecurityWeek RSS Feed - 4 hours ago]
 A Trojan spotted earlier this year targeting banks in the Czech Republic has expanded its target list and become more global.  read more ...
Looking for the Key to Security in the Internet... [Published IEEE Spectrum - 5 hours ago]
<?xml version="1.0" encoding="UTF-8"?> Photo-illustration: iStockphoto As the number of Internet connected-devices in any home skyrockets from a few, to a few dozen, to perhaps even a few hundred—including interconnecting thermostats, appliances, ...
Trojan Gen:Variant.Graftor.155439 present in fa... [Published MX Lab - 11 hours ago]
MX Lab, http://www.mxlab.eu , intercepted different campaigns were the trojan Gen:Variant.Graftor.155439 is present in the attached ZIP archive. The trojan is known as Gen:Variant.Graftor.155439 by most AV engines but it’s also known as Trojan/Win32.Zbot, ...
Dyre Banking Trojan Used in APT-Style Attacks A... [Published Security Intelligence - 20 hours ago]
The global cloud computing company Salesforce.com is warning its customers that the Dyre Trojan might be used to target their login credentials. The Dyre banking Trojan, which typically targets customers of large financial institutions, was recently ...
Tiny Banker Trojan targets customers of major b... [Published Security Bloggers Network - Sep 15 2014]
The Tinba Trojan aka Tiny Banker targeted Czech bank customers this summer; now it’s gone global. After an analysis of a payload distributed by Rig Exploit kit, the AVAST Virus Lab identified a payload as Tinba Banker. This Trojan targets a large scope ...
1 2 3 4 5 6 7 8 9 10 ...

Press Releases

sort by: Date | Relevance
MRG Effitas Awards Wontok SafeCentral New Real ... [Published GlobeNewswire: Acquisitions News - Jul 21 2014]
Speech: Cyber security: City Week 2014 [Published Keeping the UK safe in cyber space - Activity o ... - Mar 31 2014]
Booz Allen Says Cyber Attacks Are the “New Norm... [Published Business Wire - Dec 04 2013]
1
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.