The Latest in IT Security

Posts Tagged ‘registry keys’

By now, most users can easily detect spammed messages, particularly those that attempt (and fail) at looking like legitimate notifications. However, some can look convincing, which is why a good social engineering education can be beneficial in the long run. We recently found an email sample pretending to be from the courier service UPS. The […]

Read more ...

Earlier in February we blogged about RARSTONE, a Remote Access Tool (RAT) that we discovered having some similar characteristics to PlugX, an older and more well-known RAT. In April, the same malware family used the Boston Marathon bombing as part of its social engineering bait.Since then, we’ve been looking out for further attacks using RARSTONE. We’ve seen […]

Read more ...

What does it do? When installed on a system, Beta Bot searches for a list of known security products it is said to target. Upon finding one of those programs installed, the bot starts its attacks as described later in the text. Doing so, it prepares itself to attack the av program by killing processes, […]

Read more ...

Categories

SUNDAY, SEPTEMBER 23, 2018

Featured

Archives

Latest Comments

Social Networks