Purple Fox Uses New Arrival Vector and Improves Malware Arsenal

Credit to Author: Sherif Magdy| Date: Fri, 25 Mar 2022 00:00:00 +0000

Purple Fox is an old threat that has been making waves since 2018. This most recent investigation covers Purple Fox’s new arrival vector and early access loaders. Users’ machines seem to be targeted with malicious payloads masquerading as legitimate application installers.

Read more

Cyclops Blink Sets Sights on Asus Routers

Credit to Author: Feike Hacquebord| Date: Thu, 17 Mar 2022 00:00:00 +0000

This report discusses the technical capabilities of this Cyclops Blink malware variant that targets ASUS routers and includes a list of more than 150 current and historical command-and-control (C&C) servers of the Cyclops Blink botnet.

Read more

New Nokoyawa Ransomware Possibly Related to Hive

Credit to Author: Don Ovid Ladores| Date: Wed, 09 Mar 2022 00:00:00 +0000

In March 2022, we came across evidence that another, relatively unknown, ransomware known as Nokoyawa is likely connected with Hive, as the two families share some striking similarities in their attack chain, from the tools used to the order in which they execute various steps.

Read more

Latest Mac Coinminer Utilizes Open-Source Binaries and the I2P Network

Credit to Author: Luis Magisa| Date: Mon, 21 Feb 2022 00:00:00 +0000

A Mac coinminer has been spotted using open-source components in its routine and the I2P Network to hide its traffic. We dive into old iterations of this malware, and also analyze the newest version.

Read more

SMS PVA Services’ Use of Infected Android Phones Reveals Flaws in SMS Verification

Credit to Author: Zhengyu Dong| Date: Tue, 15 Feb 2022 00:00:00 +0000

Certain SMS PVA services allow their customers to create disposable user profiles or register multiple accounts on many popular online platforms. These services can be abused by criminals to conduct fraud or other malicious activities.

Read more