article thumbnail

Understanding Malware: A Guide for Software Developers and Security Professionals

The Crazy Programmer

Malware or malicious software brings significant threats to both individuals and organisations. It is important to understand why malware is critical for software developers and security professionals, as it helps to protect systems, safeguard sensitive information, and maintain effective operations. What is Malware?

Malware 130
article thumbnail

Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines 

Ooda Loop

Gamers searching for game cheats are unknowingly downloading a Lua-based malware. This malware can establish persistence on the user’s system and then deliver additional payloads. Lua gaming engine supplements are very popular among student gamers, and these attacks are capitalizing on the popularity.

Malware 59
article thumbnail

Bumblebee Malware Distributed Via Trojanized Installer Downloads

SecureWorks

Type: Blogs Bumblebee Malware Distributed Via Trojanized Installer Downloads Restricting the download and execution of third-party software is critically important.

Malware 91
article thumbnail

Latrodectus Malware Increasingly Used by Cybercriminals 

Ooda Loop

Cybercriminals are increasingly using the Latrodectus malware. It is believed that a threat actor known as LunarSpider developed the downloader. According to a Forcepoint analysis, recent campaigns are targeting the financial, automotive, and healthcare sectors. It is […]

Malware 64
article thumbnail

Necro Trojan Infects Google Play Apps With Millions of Downloads

Ooda Loop

Researchers have found that Google Play apps have been infected with malware. Researchers have identified that two Google Play apps contain the Necro Trojan malware. The apps were identified as Wuta Camera and Max Browser which have a combined 11 million downloads.

Malware 59
article thumbnail

Muhstik Malware Targets Message Queuing Services Applications

Aqua Security

Aqua Nautilus discovered a new campaign of Muhstik malware targeting message queuing services applications, specifically the Apache RocketMQ platform. Our investigation revealed that the attackers downloaded the known malware Muhstik onto the compromised instances by exploiting a known vulnerability in the platform.

Malware 98
article thumbnail

The latest trends in the threat landscape

CIO

Each quarter HP’s security experts highlight notable malware campaigns, trends and techniques identified by HP Wolf Security. Living-off-the-land techniques Many malware campaigns relied on living-off-the-land (LOTL) techniques to help attackers remain undetected by blending in with legitimate system admin activity [7].

Trends 263