Tag Archives: Virus Lab

Linux DDoS Trojan hiding itself with an embedded rootkit

At the end of September 2014, a new threat for the Linux operating system dubbed XOR.DDoS forming a botnet for distributed denial-of-service attacks was reported by the MalwareMustDie! group. The post mentioned the initial intrusion of SSH connection, static properties of related Linux executable and encryption methods used. Later, we realized that the installation process is […]

South Korea hit with banking malware using VPN connection

South Korean banks have been attacked by hackers again! This is not the first time we reported malware which targets Korean banking customers. In the past, we wrote about Chinese threats against Korean Windows users and last year we published a series of blogposts, Fake Korean bank applications for Android (part 1, part 2, part […]

Is backing up your data the same as exposing it? In this case – Yes!

Losing contacts from your mobile phone is highly inconvenient. There’s seems to be a solution –  You can find them online! The catch? Your contacts are in a publicly accessible place. Seriously. If you care for your privacy you should always be suspicious about “Cloud Backup” solutions you find in the Google Play Store. The […]

Tiny Banker Trojan targets customers of major banks worldwide

The Tinba Trojan aka Tiny Banker targeted Czech bank customers this summer; now it’s gone global. After an analysis of a payload distributed by Rig Exploit kit, the AVAST Virus Lab identified a payload as Tinba Banker. This Trojan targets a large scope of banks like Bank of America, ING Direct, and HSBC.   In […]

Self-propagating ransomware written in Windows batch hits Russian-speaking countries

Ransomware steals email addresses and passwords; spreads to contacts. Recently a lot of users in Russian-speaking countries received emails similar to the message below. It says that some changes in an “agreement’ were made and the victim needs to check them before signing the document. The message has a zip file in an attachment, which […]

Reveton ransomware has dangerously evolved

      No Comments on Reveton ransomware has dangerously evolved

The old ransomware business model is no longer enough for malware authors. New additions have made Reveton into a truly dangerous business. The latest generation of Reveton, the infamous “police” lock screen/ransomware, targets new black market business. The authors upped the ante of the despised malware from a LockScreen-only version to a dangerously powerful password […]

Tinybanker Trojan targets banking customers

Tinba Trojan specifically targets bank customers with deceitful debt notice. The Tinba Trojan is banking malware that uses a social engineering technique called spearfishing to target its victims. Recently, targets havebeen banking customers in Czech Republic, AVAST Software’s home country. Tinba, aka Tinybanker,  was first reported in 2012 where it was active in Turkey. A […]

Falešné pohledávky od Vaší banky [reloaded]

V České republice právě opět probíhá emailová kampaň, jejímž cílem je podvodný zisk finančních prostředků. Mnoho našich uživatelů dostalo emailovou zprávu, která vypadá zhruba takto: Jedná se o novou variantu kampaně, o které jsme Vás informovali před 2 měsíci (Pozor na falešné pohledávky od Vaší banky). Zpráva opět obsahuje spustitelný soubor v příloze zabalený v […]

Samsung Galaxy S5 and other popular phones vulnerable to “TowelRoot” Android exploit

avast! Mobile Security protects from an Android flaw which leaves nearly all new smartphones and tablets vulnerable to attack. Last week, a wave of articles about a newly discovered Android security flaw flooded the Internet. They sounded a warning, similar to this: “A flaw in the Android operating system may leave many Android phones and […]

Are hackers’ passwords stronger than regular passwords?

Hackers use weak passwords just like the rest of us. Nearly two thousand passwords used by hackers were leaked this week, when I tried to decode a PHP shell without knowing the key. Because I did not know the exact content of the encoded file and searching the key could take me years, I chose a […]