Tag Archives: malware

Ransomware strain evolves, RATs cause mischief, and yet another data breach strikes | Avast

Magniber ransomware grows stronger and scarier
The Magniber strain of ransomware is back, stronger than before, and starting to spread through much of Asia. Cybersecurity experts are taking note of the substantial changes the malware has undergone ov…

Stay a Step Ahead of Today’s Bigger, Badder Cyberthreats | Avast

Cyberthreats and attacks have been a negative side effect of our computer age for more than three decades. The first viruses or worms were less harmful, designed to slow a system down or annoy other users. Some even say the first viruses were designed …

Three new threats at large and one thrown behind bars | Avast

SamSam ransomware is back with a surprising addition
The ransomware strain that locked up the city of Atlanta in March of this year has returned, cybersecurity experts report, but with one mysterious addition. This new variant of the most infamous ran…

Travel site phishing scam and genealogy site data breach | Avast

Booking.com users get phished

Some unfortunate travelers had their thirst for adventure rewarded with a steaming mug of scam. Users of the popular travel-booking site booking.com received bogus texts directing them to change their passwords “due to a security breach.” A malicious link in the text, if clicked, gave the phishers access to that user’s bookings. A second text then capitalized on the booking data by demanding bank info to “process payment” for the user’s specific trip. Booking.com is part of the hospitality magnate that includes priceline.com, kayak.com, and opentable.com. A spokesperson for the site states their system was not compromised, pointing to select hotel partners as the attack victims. The company claims all impacted guests have been notified and that any damages will be compensated.

Routers at risk, Canadian chaos, and a Hidden Cobra | Avast

FBI advises Americans to reset their routers

Last week, we reported how the FBI had seized a key domain to the botnet VPNFilter. That story continued yesterday when the Bureau publicly asked all US residents to reboot their routers. The advice comes with the knowledge that while VPNFilter can take control of a router, part of the malware can be easily kicked off the system with a simple reboot — turning the device off for a moment. This renders the malicious program harmless, though the router can be reinfected. To prevent that, users are also advised to make sure the router’s security is fully up to date and the password has been changed from the default to a suitably complex one. The malware attacks many kinds of routers, most notably Linksys, MikroTik, Netgear, and TP-Link. Each of those companies have posted further detailed instructions to combat VPNFilter on their websites.