Quad7 botnet targets more SOHO and VPN routers, media servers

September 9, 2024 at 05:30PM The Quad7 botnet is expanding its operations to target additional SOHO devices with new custom malware for Zyxel VPN appliances, Ruckus wireless routers, and Axentra media servers. It is evolving by setting up new staging servers, launching new botnet clusters, employing backdoors and reverse shells, and moving away from SOCKS … Read more

Hacker Conversations: Tom Anthony and Scratching an Itch Without Doing Harm

August 14, 2024 at 08:39AM Tom Anthony, a British hacker living in Germany, developed his skills out of curiosity rather than personal gain. From his early days hacking shareware games to his involvement in bug bounties, he has always been motivated by the challenge and understanding, not illicit activities. Despite legal troubles, Anthony’s commitment to … Read more

Why Haven’t You Set Up DMARC Yet?

May 2, 2024 at 09:13AM In early 2024, the adoption of Domain-based Messaging Authentication, Reporting and Conformance (DMARC) increased as companies prepared for Google and Yahoo’s mandates. However, many companies have only completed minimal DMARC configurations due to concerns about potential email service disruptions. The deployment of DMARC can be simple for smaller businesses but … Read more

ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan

May 1, 2024 at 07:12AM The ZLoader malware, resurfaced after a two-year hiatus, has evolved with new anti-analysis features that make it harder to detect and analyze. It now restricts execution to the infected machine and employs techniques to avoid running on different hosts. Additionally, threat actors are utilizing fraudulent websites to spread malware through … Read more

Chameleon Android Trojan Offers Biometric Bypass

December 21, 2023 at 11:28AM A new variant of the Android banking Trojan, Chameleon, has evolved to target users in Australia, Poland, UK, and Italy by bypassing biometric security and utilizing new commands. This includes the ability to interrupt biometric operations, employ Android’s Accessibility service for device takeover attacks, and task scheduling through the AlarmManager … Read more