BlackByte Ransomware Returns

A fresh exploration of the malware uncovers a new tactic for bypassing security products by abusing a known driver vulnerability | Continue reading


@news.sophos.com | 1 year ago

CryptoRom Fake iOS Cryptocurrency Apps Hit US, European Victims

Scammers combine romantic lures with crypto scams, abusing Apple’s ad-hoc app distribution to steal millions from people around the world. | Continue reading


@news.sophos.com | 2 years ago

Have a domain name? “Beg bounty” hunters may be on their way

You are probably familiar with the popular practice of “bug bounty” programs in software security, where an organization offers rewards or bounties to security researchers who ethically disclose se… | Continue reading


@news.sophos.com | 2 years ago

Trash Panda as a Service: Raccoon Stealer steals cookies, cryptocoins, and more

Cookie and credential stealing malware-as-a-service delivered by dropper-as-a-service now packs a “clipper” to steal crypto-transactions, and can drop other malware. | Continue reading


@news.sophos.com | 2 years ago

Malware increasingly targets Discord users by host, spread, and control malware

Criminals abuse a successful chat service to host, spread, and control malware targeting their users. | Continue reading


@news.sophos.com | 2 years ago

REvil uses supply chain exploit to attack hundreds of businesses

Friday afternoon ransomware rampage exploited Kaseya update system to spread (and conceal) ransomware rampage. | Continue reading


@news.sophos.com | 2 years ago

Vigilante malware rats out software pirates while blocking ThePirateBay

A collection of malware samples revives a decade-old HOSTS modification trick to block hundreds of websites | Continue reading


@news.sophos.com | 2 years ago

Nearly half of malware now use TLS to conceal communications

As more of the Internet uses Transport Layer Security, analysis of detection telemetry shows the volume of TLS encrypted communications by malware has doubled in a year. | Continue reading


@news.sophos.com | 3 years ago

Black Kingdom ransomware begins appearing on Exchange servers

A novel, if not particularly well made, ransomware is spreading to Exchange servers that haven’t been patched against the ProxyLogon exploit | Continue reading


@news.sophos.com | 3 years ago

Ping of Death Redux

A vulnerability in Windows’ TCP/IP driver handling of IPv6 allows denial of service—and possibly remote code execution. | Continue reading


@news.sophos.com | 3 years ago

Lemon_Duck cryptominer targets cloud apps and Linux

An aggressive cryptojacker tests new exploits as it rapidly adopts upgraded features | Continue reading


@news.sophos.com | 3 years ago

Ransomware deploys virtual machine to dodge security

A new ransomware attack method takes defense evasion to a new level—deploying as a full virtual machine on each targeted device to hide the ransomware from view. In a recently detected attack, Ragn… | Continue reading


@news.sophos.com | 3 years ago

Zero Day Trojan Exploits Sophos Firewalls

Customized malware used to compromise physical and virtual firewalls | Continue reading


@news.sophos.com | 4 years ago

Sandboxie is now an open source tool

The Sandboxie technology will live on in the hands of its dedicated users. | Continue reading


@news.sophos.com | 4 years ago

Don’t let fleeceware sneak into your iPhone

A SophosLabs investigation reveals fleeceware app publishers are also operating on Apple’s App Store for iPhones and iPads | Continue reading


@news.sophos.com | 4 years ago

‘Cloud Snooper’ Attack Bypasses Firewall Security Measures

Continue reading


@news.sophos.com | 4 years ago

Ransomware borrows vulnerable driver to remove security software

Continue reading


@news.sophos.com | 4 years ago

“MegaCortex” ransomware wants to be The One

The sudden appearance of a new ransomware on a large number of enterprise networks was not the May Day gift anyone wanted | Continue reading


@news.sophos.com | 4 years ago