At the end of March and beginning of June, we saw the Evolution of the JSWorm ransomware, the ransomware threat landscape has been gradually changing. We have been witness to a paradigm shift. Also, the Bizarro banking malware targets 70 banks in Europe and South America.
For more articles, check out our #onpatrol4malware blog.
Bizarro banking malware targets 70 banks in Europe and South America
Source: BleepingComputer
A banking trojan named Bizarro that originates from Brazil has crossed the borders and started to target customers of 70 banks in Europe and South America. Read more.
Evolution of JSWorm ransomware
Source: SecureList
Over the past few years, the ransomware threat landscape has been gradually changing. We have been witness to a paradigm shift. From the massive outbreaks of 2017, such as WannaCry. Read more.
Attributing CryptoCore Attacks Against Crypto Exchanges to LAZARUS (North Korea)
Source: ClearSky
CryptoCore is an attack campaign against crypto-exchange companies that has been ongoing for three years and was discovered by ClearSky researchers. Read more.
Joint CISA-FBI Cybersecurity Advisory on Sophisticated Spearphishing Campaign
Source: CISA
CISA and the Federal Bureau of Investigation (FBI) are responding to an ongoing spearphishing campaign targeting government organizations, intergovernmental organizations, and non-governmental organizations. Read more.
Android Trojan Malware Disguised as Syrian e-gov Android AppÂ
Source: Cyble Inc
In a recent tweet, security researchers spoke about a Trojanized version of a Syrian E-government android app available from the e-gov web portal. Our investigation indicated that this malware campaign targets Syria and its surrounding countries struggling with the ongoing onslaught of the COVID-19 pandemic. Read more.
Necro Python bot adds new exploits and Tezos mining to its bag of tricks
Source: Talos
Although the bot was originally discovered earlier this year, the latest activity shows numerous changes to the bot, ranging from different commands and control. Read more.