KnowBe4

Security Awareness Training Blog

Malware Blog

Covering the latest malware threats affecting software, hardware, cloud networks, etc. Keeping you informed so you can keep your users safe.

Get Ready for the First Wave of AI Malware

This is an excerpt from an article in SecurityWeek by Gunter Ollmann, who is currently the CSO of Microsoft’s Cloud and AI Security division. He is a seasoned information security leader.
Continue Reading

A Powerful Malware That Tried To Blow Up A Saudi Plant Strikes Again

A highly capable malware reportedly used in a failed plot to blow up a Saudi petrochemical plant has now been linked to a second compromised facility.
Continue Reading

Rietspoof Malware Attack Uses Messaging Apps to Distribute Ransomware

Researchers at antivirus vendor Avast have identified a new malware attack that leverages Skype, Facebook Messenger, and other messaging applications.
Continue Reading

Malware Blindness in the Enterprise

A growing percentage of cyberattacks are using encryption to avoid detection, according to a new report by Zscaler’s ThreatLabZ researchers. Their report, summarized by Help Net Security, ...
Continue Reading

[Heads-up] 40 Percent Of Malicious URLs Found On Good Domains. YIKES!

Webroot revealed the results of their 2019 Threat Report, showing that tried-and-true attack methods are still going strong, but new threats emerge daily, and cybercrime is highly ...
Continue Reading

Remote Access Credentials Are the Latest Malware Attack Target

The latest iteration of notable banking trojan, Trickbot, now includes a password grabbing module designed to provide cybercriminals with remote access to internal systems.
Continue Reading

Online Job Offer Turns Would-Be Applicant into Unwitting Conspirator in Malware Attack

The context of contacting the victim via a credible website may be all that was needed to trick one job seeker into installing malware on the network of a bank.
Continue Reading

Malicious Memes Trigger Malware Functions

Cybercriminals are using steganography to deliver commands to malware via malicious memes, according to researchers at Trend Micro. Steganography is the art of hiding messages inside ...
Continue Reading

DNSpionage Malware Targets Domains in Lebanon and United Arab Emirates

A new threat actor is targeting Lebanon and United Arab Emirates (UAE) government domains, as well as a Lebanese airline company, according to Warren Mercer and Paul Rascagneres at Cisco ...
Continue Reading

Malware Targets 67 Online Brands Ahead of Black Friday

14 malware families have been discovered as part of an elaborate scam aimed at users shoppers of major e-commerce sites looking for pre-Black Friday deals. We’re all gearing up for some ...
Continue Reading

[Heads-up] Now In The Wild: New Super Evil Rootkit Survives Even "Nuke From Orbit" And HD Swap

This thing is a nightmare that escaped into daylight. The Russian GRU—aka Fancy Bear—probably was riveted reading the Wikileaks CIA Vault 7 UEFI Rootkit docs (PDF) and built one of these ...
Continue Reading

Microsoft Office Macros Remain Top Choice for Malware Delivery

Microsoft Office documents containing malicious macros accounted for 45 percent of malware loaders in August 2018, according to a blog post by Cofense. These macros were used to deliver a ...
Continue Reading

Bad guys use Google's Golang to cross-compile multi-platform malware

Here is the bad news: The use of Google's Golang (also called Go) programming language allows attackers to cross-compile malware for use on multiple platforms, making potential attacks on ...
Continue Reading

North Korea Brings Light to a “Cool” Way to Spread Malware

In the midst of all the political talk about the recent summit between the United States and North Korea, one particular gift caught the eye of security experts.
Continue Reading

They’re Trying to Run Malicious Code (And You’re Letting Them!)

According to a new threat report from security vendor eSentire, 91% of endpoint incidents involve files that won’t be defeated/blocked/removed by anti-malware solutions.
Continue Reading

Ad Network Uses Advanced Malware Technique To Conceal Cryptojacking Ads

I blogged a few days ago about a method to embed a crypto-mining script in a Word doc. Turns out an ad network has done an even better job! Arstechnica wrote: "Domain-name algorithms are ...
Continue Reading

KillDisk Fake Ransomware Hits Financial Firms in Latin America

  A new version of the KillDisk disk-wiping malware has hit companies in the financial sector in Latin America, Trend Micro reported yesterday. Just like previous versions, KillDisk ...
Continue Reading

Skeleton in the closet: 17-year old MS office flaw allows malware install when user opens file

Here is a new pain in the neck! Fix this one ASAP. While the world is still dealing with the threat of 'unpatched' Microsoft Office's built-in DDE feature, researchers have uncovered a ...
Continue Reading

Scary new malware hides in memory, uses DNS to communicate, and spreads through phishing

Cisco has a separate threat research group called Talos. They just published a report on a scary new form of malware that’s hard to detect. They called it DNSMessenger, and the malicous ...
Continue Reading

[Heads-Up] First-Ever Russian Malicious Mac Macro Discovered

Appleinsider reported Feb 9, 2017: "Mac malware discovered in Microsoft Word document with auto-running macro", which was the second example of malware targeting macOS users this week.   ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews