Recent variants of the "Merry Christmas" ransomware, also known as Merry X-Mas, are also downloading the DiamondFox malware on infected computers, which is used by the ransomware's operators to collect data from infected hosts, such as passwords, sensitive files, and others.
Mirai-based DDoS botnets have lost the exclusivity on high output DDoS attacks, according to DDoS mitigation firm Imperva, who says that it mitigated a DDoS attack of over 650 Gbps and over 150 million packets per seconds (Mpps) on December 21.
Last week, the Swiss Governmental Computer Emergency Response Team (GovCERT), together with SWITCH, the registrar of .ch top-level domain names, have taken action against the Tofsee malware botnet that was abusing Swiss domains to host its dynamic command and control (C&C) servers.
Somebody is building a botnet by infecting Linux servers and Linux-based IoT devices with a new malware strain named Rakos. First detected online over the summer, this new malware strain is harmless, at least in its current variant.
A bot farm involving hundreds of servers and over 570K different IP addresses has caused losses for online video advertisers ranging from $3 to $5M per day. This bot farm, nicknamed Methbot, dates back to Sep 2015, when US security firm White Ops had first detected signs of automated traffic coming from the crook's infrastructure.
Following a failed takedown attempt, changes made to the Mirai malware variant responsible for building one of today's biggest botnets of IoT devices will make it incredibly harder for authorities and security firms to shut it down.
The United States Computer Emergency Readiness Team (US-CERT), an organization within the Department of Homeland Security (DHS), has published a security alert yesterday, warning owners of Netgear R6400 and R7000 models against using their routers for the time being, because of a severe security flaw.
Hundreds of thousands of IP cameras from several vendors are affected by two zero-day vulnerabilities that allow an attacker to hijack the device, use it as a pivot point for other attacks, or spy on the camera's owner.
Since November 23, an unidentified group has been using a massive botnet to launch large DDoS attacks on a daily basis, targeting a small number of targets concentrated on the US west coast.
Law enforcement agencies and Internet companies from across the globe have worked together to take down one of the largest cyber-crime networks ever discovered in the past decade. Their efforts resulted in the arrest of five suspects, searchers at 37 locations, the seizure of 37 servers, and the takedown of 221 other servers.
As of December 1, 2016, US law enforcement has gained new hacking powers thanks to changes to Rule 41 of the Federal Rules of Criminal Procedure that now simplify the process of getting warrants to hack into devices of US citizens and the citizens of other countries.
A new multi-functional malware family detected as Proteus can transform the computers of infected users in proxy servers, can mine for various types of crypto-currencies, can log keystrokes, and check the validity of stolen online accounts.
A botnet of IoT (Internet of Things) devices created with the Linux/Moose malware is behind many bots that are plaguing social networks such as YouTube, Periscope, Twitter, and Instagram, above all.
Crooks are using hacked WordPress and Joomla sites to send massive amounts of spam using a complex botnet structure spread across seven different server layers.