The Latest in IT Security

Posts Tagged ‘infection routine’

W32.IRCBot.NG and W32.PhopifasIn a previous blog, my colleague Kevin Savage detailed a social engineering attack that utilized instant messaging applications. While the infection rates of W32.IRCBot.NG and W32.Phopifas have passed their peaks, the modules continue to be updated daily.The infection routine of these threats has not changed since they were discovered, but the threat authors […]

Read more ...

During the last weeks of July, we received reports from customers that their services.exe files were being patched by an unknown malware. The patched services.exe, detected by Trend Micro as PTCH_ZACCESS (for 32-bit version) and PTCH64_ZACCESS (for 64-bit version), was verified to be a component of the SIREFEF/ZACCESS malware family. ZACCESS (also known as ZEROACCESS) […]

Read more ...

We have seen malware that infects executables operate so that the malicious code runs first, and is then followed by the execution of host file. The malware XDocCrypt takes this a step further. Besides infecting portable executable files, it also infects Microsoft Word and Excel files. In an infected file, the malware body sits at […]

Read more ...


Categories

THURSDAY, APRIL 18, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments