Remove 2018 Remove Analysis Remove Encryption Remove Libraries
article thumbnail

OceanLotus APT group leverages a steganography-based loader to deliver backdoors

Security Affairs

. “While continuing to monitor activity of the OceanLotus APT Group, BlackBerry Cylance researchers uncovered a novel payload loader that utilizes steganography to read an encrypted payload concealed within a.png image file.” ” reads the report published by the experts.

article thumbnail

Victims of Pylocky ransomware can decrypt their files for free

Security Affairs

In this phase, the ransomware sends to the command and control server information on the encryption process, including a string that contains the Initialization Vector (IV) and a random password used by the ransomware to encrypt the files. “To combat this ransomware, Cisco Talos is releasing a free decryption tool.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Iran-linked group Cobalt Dickens hit over 60 universities worldwide

Security Affairs

This operation is similar to the threat group’s August 2018 campaign , using compromised university resources to send library-themed phishing emails.” ” reads the analysis published by Secureworks. The landing page appears to be identical or quite similar to the spoofed library resource.

article thumbnail

Buran ransomware-as-a-service continues to improve

Security Affairs

Buran is advertised as a stable malware that uses an offline cryptoclocker , 24/7 support, global and session keys, and has no third-party dependencies such as libraries. The Rig EK was exploiting the CVE-2018-8174 to deliver the Buran ransomware. ” reads the analysis published by McAfee. ” concludes the analysis.

article thumbnail

The Long Run of Shade Ransomware

Security Affairs

As stated in a recent Eset report , the Shade infection had an increase during October 2018, keeping a constant trend until the second half of December 2018, taking a break around Christmas, and then resuming in mid-January 2019 doubled in size (shown in Figure 1). Technical analysis. References to an Oil-Gas company.

article thumbnail

Application Security: Complete Definition, Types & Solutions

eSecurity Planet

CNAP provides encryption, access control, threat detection and response features for enhanced security. Mobile behavioral analysis: Similar to user and entity behavioral analysis (UEBA) solutions, mobile behavioral analysis tools look for signs that apps are engaging in risky or malicious behaviors.

article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

The group was first spotted by ESET in 2018, when the experts detected a sophisticated piece of spyware, tracked as InvisiMole, used in targeted attacks in Russia and Ukraine in the previous five years. ” reads the analysis published by ESET. This allows the InvisiMole group to devise creative ways to operate under the radar.”