MaMoCrypt Ransomware Decryption Tool
We’re happy to announce the availability of a new decryptor for MaMoCrypt, a strain of ransomware that appeared in December last year. MaMoCrypt is an unusual piece of ransomware, a variant of ...
Interplanetary Storm Botnet Shows Signs of Anonymization-Purpose Proxy-for-Hire Infrastructure
Silvia Pripoae | | anonymization proxy, Anti-Malware Research, botnet, InterPlanetary Storm, ipstorm, ipstorm botnet, ipstorm research, Whitepapers
While botnets have been used for anything from performing Distributed Denial-of-Service (DDoS) attacks to stealing data and even sending spam, Bitdefender researchers have found signs that the Interplanetary Storm botnet could be ...
There’s a New a Golang-written RAT in Town
Silvia Pripoae | | Anti-Malware Research, CVE-2019-2725, golang rat, PowerGhost, PowerGhost RAT, remote-access Trojan
Security researchers at Bitdefender have discovered a new Golang-written RAT that targets devices by using the CVE-2019-2725 (Oracle WebLogic RCE) vulnerability identified last year. Unlike other bots that have exploited this vulnerability, ...
Fake Users Rave but Real Users Rant as Apps on Google Play Deal Aggressive Adware
Oana ASOLTANEI | | aggressive adware, android adware, android aggressive adware, Android apps, Anti-Malware Research, Google Play, google play adware
Bitdefender researchers recently stumbled across 13 Google Play applications packing aggressive ads and potentially using over 1,000 fake reviews to gain a cumulative download count of over half of million. While fake ...
LemonDuck Crypto-Miner – a KingMiner Successor
Crypto-miners have been around for several years, in all forms and shapes, and distributed via various attack avenues. Increased competition from other cyber-criminal groups and various defenses set in place at the ...
Apps on Google Play Tainted with Cerberus Banker Malware
The official Android app market has traditionally been regarded as a safe place to install applications from. Every once in a while, remarkably malicious apps slip right through and start wreaking havoc ...
APT Hackers for Hire Used for Industrial Espionage
Liviu Arsene | | Advanced persistent threat, Anti-Malware Research, APT, apt as a service, apt mercenary, Autodesk 3ds Max, Whitepapers
Bitdefender recently investigated an APT-style cyberespionage attack targeting an international architectural and video production company, pointing to an advanced threat actor and South Korean-based C&C infrastructure. The targeted company is known to ...
WannaRen Decryption Tool
A decryptor for the WannaRen ransomware is now available for download. Initially spotted in April 2020, WannaRen is mostly spreading through websites offering “cracked” software. This new decryptor works on all known ...
Smart Locks Not So Smart with Wi-Fi Security
Bogdan Botezatu | | Anti-Malware Research, August Connect, IoT Research, IoT Security, Smart Lock, Whitepapers
The rise of online property rental in an increasingly competitive sharing economy has had a severe impact on the adoption of Internet-connected smart locks. Packed with features that allow landlords to issue ...
Towards a Universal Security Solution against Bluetooth Low Energy Attacks
For the past couple of years, Bluetooth has become the de-facto standard in low-range communication, with a particular impact on smart home and IoT development. From smart speakers to smart lights and ...