July 5, 2020
Inside the Ransomware Economy
Serious players in the ransomware scene don’t use malware for which decryption tools are publicly available, however. At this point, incident response consultants may be able to determine how the actor was able to gain access to the victim organization’s infrastructure but that is heavily dependent upon factors like the actor’s “dwell time”
May 31, 2020
ESET detects new trick used by malware to slip into Android app store
Faced with malware that displayed no additional functionality nor suspicious permissions on top of Accessibility Services, all known security mechanisms failed to trigger any alarm. As a result, DEFENSOR ID made it onto the Google Play store, stayed there for a few months and was never detected by any security vendor participating in the VirusTotal program.
April 26, 2020
ESET researchers disrupt cryptomining botnet VictoryGate
ESET researchers have been “sinkholing” several domain names that control the botnet’s actions, replacing them with machines that do not send the botnet’s slave computers the commands they expect, but simply monitor botnet activity. Based on this data and ESET telemetry, ESET estimates that at least 35,000 devices became infected with VictoryGate at one point or another during this campaign.
February 5, 2020
Threat actors pivot toward more targeted attacks, SonicWall
Cybercriminals are honing their ability to design, author and deploy stealth-like attacks with increasing precision while growing their capabilities to evade detection by sandbox technology,” said SonicWall President and CEO Bill Conner.