Free Republic 3rd Qtr 2023 Fundraising Target: $75,000 Receipts & Pledges to-date: $64,302
Woo hoo!! And we're now over 85%!! Thank you all very much!! God bless.

Keyword: malware

Brevity: Headers | « Text »
  • Internet malware scam question

    09/14/2023 9:24:25 AM PDT · by LouAvul · 30 replies
    I cleaned my computer cache (IE files; Internet "history"; and CC cleaner). I then went online to Walmart link. Then my computer screen had the dreaded pseudo Microsoft warning: "You have malware; call our number..." There were several flashing banners, etc. I shut the computer down; rebooted; cleaned cache; etc. I didn't get the scam from the Walmart website, did I? Microsoft's website says this is a common scam currently, and my Malwarebytes didn't catch it. Neither did AVG. Did this piggyback something? Is it a time release program? I was on Zillow, Freerepublic, 3 gun forums, etc. thnx
  • TEMU is Cleverly Hidden Spyware that Poses an Urgent Security Threat to U.S. National Interests

    09/11/2023 2:42:56 AM PDT · by ifinnegan · 28 replies
    Grizzly Research ^ | 9/10/23 | Grizzly Research
    TEMU app software has the full array of characteristics of the most aggressive forms of malware/spyware. The app has hidden functions that allow for extensive data exfiltration unbeknown to users, potentially giving bad actors full access to almost all data on customers’ mobile devices. It is evident that great efforts were taken to intentionally hide the malicious intent and intrusiveness of the software. We engaged numerous independent data security experts to decompile and analyze TEMU app’s code, integrated with experts of our own staff, and analysts who have written independently in the public domain. Contributing to the danger of mass...
  • China Embedded Crippling Malware in U.S. Bases

    07/31/2023 7:16:23 AM PDT · by MtnClimber · 22 replies
    Front Page Magazine ^ | 31 Jul. 2023 | Daniel Greenfield
    "They do not know the full extent of the code’s presence in networks around the world". The fact that China was able to do this is catastrophic. We’re losing any pre-war prep to China which means that it’s likely to move more aggressively. A balance of power is the best way to avert a war and that depends on us keeping up our end. The Biden administration has failed grotesquely at that. Biden’s latest decision to pick a “historic” Navy Chief of Naval Operations instead of the one readiest to take on China just plays into that. But the national...
  • New Russian malware could bring down the US power grid

    05/31/2023 9:07:33 PM PDT · by SeekAndFind · 29 replies
    Hotair ^ | 05/31/2023 | Jazz Shaw
    As if you didn’t have enough to worry about. Who will bring down America’s power grid first? Joe Biden or Vladimir Putin? Biden has a head start, to be sure. But some Russian hackers have reportedly cooked up some new malware designed specifically to target electrical grids and cause disruptions. The new threat was discovered by Mandiant, a cyber threat intelligence specialist firm. They believe that this new malware system “poses a plausible threat” to the operational technology behind various electrical grid assets. (Security Week)Mandiant on Thursday detailed a new piece of malware that appears to be linked to Russia...
  • FBI warns against using public phone charging stations

    04/10/2023 8:13:25 AM PDT · by Red in Blue PA · 36 replies
    The FBI is warning consumers about “juice jacking,” where bad actors use public chargers to infect phones and devices with malware. The law enforcement agency says consumers should avoid using public chargers at malls and airports, and stick to their own USB cables and charging plugs.
  • How to Check if Your Linux System is Infected with a Virus

    02/07/2023 9:50:22 AM PST · by ShadowAce · 60 replies
    LinuxSecurity ^ | 23 January 2023 | Brittany Day
    Linux is undoubtedly the best open-source operating system, and is arguably the most secure OS by design. Most computers these days are Linux-based. Android OS, which is the most commonly used mobile operating system, is also Linux-based. The same goes for Chromebooks and a variety of tablets. As amazing as Linux is, the chances of it getting compromised are also increasing due to its growing popularity. Although many tech enthusiasts believe that Linux is immune to viruses and malware, and doesn't require any anti-malware or anti-virus solutions, this isn't entirely true. What you need to understand is that no operating...
  • New Alchimist attack framework hits Windows, Linux and Mac

    10/17/2022 11:33:45 AM PDT · by ShadowAce · 8 replies
    techrepublic ^ | 13 October 2022 | Cedric Pernet
    A standalone Command and Control (C2) server called “Alchimist” was recently discovered by Cisco Talos. The framework has been designed to run attacks via standalone GoLang-based executables that can be distributed easily. The framework found by Talos contains both the whole web user interface and the payloads.GoLang-written frameworkGo programming language, also known as GoLang, becomes increasingly popular for developers looking to compile their code on multiple different systems and architecture. As an example, we recently wrote about the Sliver offensive framework, fully written in Go. It is therefore no wonder that more cybercriminals are also adopting it.Alchimist, whose name has...
  • Meta warns as many as one million Facebook users that their logins may have been compromised

    10/09/2022 4:01:25 PM PDT · by BenLurkin · 28 replies
    Meta's researchers have discovered more than 400 malicious Android and Apple apps designed to steal personal Facebook logins. The applications are disguised as games, photo editors, and health and lifestyle services. Often, app users are asked to log in with their Facebook, which enables hackers to steal logins and passwords.
  • That 'clean' Google Translate app is actually Windows crypto-mining malware

    08/30/2022 2:44:29 PM PDT · by BenLurkin · 1 replies ^ | 'jeff burt
    Watch out: someone is spreading cryptocurrency-mining malware disguised as legitimate-looking applications, such as Google Translate, on free software download sites and through Google searches. The cryptomining Trojan, known as Nitrokod, is typically disguised as a clean Windows app and works as the user expects for days or weeks before its hidden Monero-crafting code is executed. It's said that the Turkish-speaking group behind Nitrokod – which has been active since 2019 and was detected by Check Point Research threat hunters at the end of July – may already have infected thousands of systems in 11 countries. What's interesting is that the...
  • Real-Time Behavior-Based Detection on Android Reveals Dozens of Malicious Apps on Google Play Store

    08/18/2022 12:04:56 PM PDT · by BenLurkin · 5 replies
    Most of the time, users can choose to delete the...these new malicious apps trick victims into installing them, only to change their name and icons and even take some extra steps to conceal their presence on the device. Users can still delete them at will, the developers make it more difficult to find them on the affected devices. The 'GPS Locations Maps' app makes it difficult for users to find and uninstall it by changing its icon. Also, on some devices, a few malicious apps even request permission to bypass the battery optimization feature and start foreground services notifications to...
  • This 'evasive' new Linux malware creates a backdoor to steal passwords and more

    07/08/2022 10:34:58 AM PDT · by ShadowAce · 13 replies
    ZDNet ^ | 8 July 2022 | Danny Palmer
    A newly uncovered form of Linux malware creates a backdoor into infected machines and servers, allowing cyber criminals to secretly steal sensitive information while also maintaining persistence on the network. Detailed by cybersecurity researchers at Intezer, the previously undetected malware has been called Orbit after filenames it used to temporarily store the output of executed commands. Linux is a popular operating system for servers and cloud infrastructure, which makes it a tempting target for cyber criminals. Orbit malware provides cyber criminals with remote access to Linux systems, allowing them to steal usernames and passwords and log TTY commands – the...
  • Chinese hackers are going after American routers – How to protect yours

    06/14/2022 2:18:09 PM PDT · by American Number 181269513 · 33 replies
    KimKomando ^ | JUNE 13, 2022 | CHARLIE FRIPP
    Your router is a crucial part of your home’s connection. It’s the primary way the internet gets into your house, and it sends out the Wi-Fi signal that connects all your wireless devices. Has it been years since you updated your router? We put together a quick quiz to help you choose the perfect model for your home and needs. This is a must if your connection is spotty and your router isn’t equipped with the latest security standards. Tap or click here to take our router-finder quiz. Even if your firmware is up to date, your router is still...
  • Apple Says WebKit Zero-Day Hitting iOS, macOS Devices

    02/11/2022 5:20:38 PM PST · by bitt · 10 replies
    security week ^ | 2/10/2022 | Ryan Naraine
    Apple’s struggles with zero-day attacks on its iOS and macOS platforms are showing no signs of slowing down. For the second time in as many months, Cupertino released iOS, iPadOS and macOS updates to address a critical WebKit security defect (CVE-2022-22620) that exposes Apple devices to remote code execution attacks. “Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited,” the company said in a barebones advisory. As is customary, Apple did not provide details on the scope of the attack, the platform being targeted,...
  • Watch Out For This Android Malware That Factory Resets Your Phone After Stealing Your Money

    01/28/2022 2:57:16 AM PST · by Libloather · 14 replies
    Gizmodo ^ | 1/27/21 | Lucas Ropek
    Research published earlier this week shows that a nasty Android banking malware has evolved, bringing with it a number of alarming new features—including the ability to factory reset your device after stealing your money. The malware in question is called BRATA, short for “Brazilian Remote Access Tool Android.” As you might expect from its name, it originally popped up in Brazil several years ago but has since spread to many other parts of the globe. Researchers with security firm Cleafy wrote this week that the newest version of the malware, first spotted in December, has a number of additional features...
  • Persistence without “Persistence”: Meet The Ultimate Persistence Bug – “NoReboot”

    01/09/2022 5:59:05 PM PST · by algore
    Mobile Attacker’s Mindset Series – Part II Evaluating how attackers operate when there are no rules leads to discoveries of advanced detection and response mechanisms. ZecOps is proudly researching scenarios of attacks and sharing the information publicly for the benefit of all the mobile defenders out there. iOs persistence is presumed to be the hardest bug to find. The attack surface is somewhat limited and constantly analyzed by Apple’s security teams. Creativity is a key element of the hacker’s mindset. Persistence can be hard if the attackers play by the rules. As you may have guessed it already – attackers...
  • Microsoft Admits It Signed Rootkit Malware That Phones Home To Chinese Military

    Ever since the introduction of Windows Vista in early 2007, Microsoft has enforced the rule that Windows drivers must carry digital signatures by default. Any software that runs in kernel mode, in fact, has to be signed by the company. This is a security measure that should prevent malicious software from digging its claws in too deep. However, what happens when Microsoft gives its blessing to a rootkit? That's what happened a few months ago and was just now discovered thanks to G DATA Software security analyst Karsten Hahn. Initially, the company received a false-positive alert from a driver that...
  • Microsoft warns: Watch out for this new malware that steals passwords, webcam and browser data

    05/13/2021 7:22:23 AM PDT · by ShadowAce · 19 replies
    ZDNet ^ | 13 May 2021 | Liam Tung
    Microsoft has issued an alert over a remote access tool (RAT) dubbed RevengeRAT that it says has been used to target aerospace and travel sectors with spear-phishing emails. RevengeRAT, also known as AsyncRAT, is being distributed via carefully crafted email messages that prompt employees to open a file masquerading as an Adobe PDF file attachment that in fact downloads a malicious visual basic (VB) file. Security firm Morphisec recently flagged the two RATs as part of a sophisticated Crypter-as-a-Service that delivers multiple RAT families.SEE: Network security policy (TechRepublic Premium)According to Microsoft, the phishing emails distribute a loader that then delivers...
  • Stealthy Linux backdoor malware spotted after three years of minding your business

    04/30/2021 8:55:20 AM PDT · by ShadowAce · 34 replies
    The Register ^ | 29 April 2021 | Thomas Claburn
    Chinese security outfit Qihoo 360 Netlab on Wednesday said it has identified Linux backdoor malware that has remained undetected for a number of years.The firm said its bot monitoring system spotted on March 25 a suspicious ELF program that interacted with four command-and-control (C2) domains over the TCP HTTPS port 443 even though the protocol used isn't actually TLS/SSL."A close look at the sample revealed it to be a backdoor targeting Linux X64 systems, a family that has been around for at least three years," Netlab researchers Alex Turing and Hui Wang said in an advisory.An MD5 signature for the...
  • WikiLeaks Vault 7 Marble: Latest Leaks Show CIA Ability To Hide Origins Of Attack

    03/31/2017 4:55:39 PM PDT · by markomalley · 9 replies
    International Business Times ^ | 3/31/17 | AJ Dellinger
    WikiLeaks continued its ongoing release of documents from the CIA Friday with a collection of files detailing the agency’s ability to obscure its activities and make it difficult for investigators to attribute the origins of attacks and hacking.The latest release from what WikiLeaks calls Vault 7 is titled “ Marble ” and contains documentation of files that are purportedly part of the CIA Core Library of malware code. WikiLeaks describes Marble as part of the CIA’s “anti-forensics approach.” The name “Marble” refers to a specific algorithm that scrambles and unscrambles data.Marble is one of the more technical releases that WikiLeaks...
  • China Used Secret Microchip to Spy on US Computers

    02/15/2021 9:50:10 AM PST · by Navy Patriot · 48 replies
    NewsSmacks ^ | February 15, 2021
    In 2010, the U.S. Department of Defense found thousands of its computer servers sending military network data to China — the result of code hidden in chips that handled the machines’ startup process. In 2014, Intel Corp. discovered that an elite Chinese hacking group breached its network through a single server that downloaded malware from a supplier’s update site. And in 2015, the Federal Bureau of Investigation warned multiple companies that Chinese operatives had concealed an extra chip loaded with backdoor code in one manufacturer's servers.