Posts

Showing posts with the label malware

More Than 1 Million Google Accounts Breached by Gooligan

Image
by Check Point Research Team  posted 2016/11/30 As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign. The attack campaign, named Gooligan, breached the security of over one million Google accounts. The number continues to rise at an additional 13,000 breached devices each day. Our research exposes how the malware roots infected devices and steals authentication tokens that can be used to access data from Google Play, Gmail, Google Photos, Google Docs, G Suite, Google Drive, and more. Gooligan is a new variant of the Android malware campaign  found by our researchers in the SnapPea app  last year. Check Point reached out to the Google Security team immediately with information on this campaign. Our researchers are working closely with Google to investigate the source of the Gooligan campaign. “We’re appreciative of both Check Point’s research and their partnership as w...

MALWARE CAN STEAL DATA FROM NON-NETWORKED COMPUTERS, VIA HEAT

Image
"HOT OR NOT?" COMES TO COMPUTER SECURITY By   Dan Moren   Posted  March 24, 2015 bittidjz via Flickr / CC BY-SA 2.0 Back in 1999, Neal Stephenson's novel  Cryptonomicon  introduced me to the idea of  Van Eck phreaking —intercepting the weak electromagnetic radiation from a computer monitor to recreate what the person is seeing on the screen. Now security researchers have come up with an exploit that uses an even simpler form of radiation: heat. BitWhisper , as researchers Mordechai Guri and Professor Yuval Elovici of Ben-Gurion University's Cyber Security Research Center have dubbed their program, targets air-gapped machines—computers that are not physically (or wirelessly) connected to the Internet. By using malware that can tap into computers' cooling systems and temperature sensors, the hack can send information back and forth between two adjacent machines. For example, raising the temperature of one computer by a single degree...

Reign

Image
Aliases of Reign ( AKA ): [Panda] Trojan Horse, Trj/Agent.AA, Trj/Iyus.B, Trj/Iyus.F, Trj/Iyus.C, Trj/Bizex.B, Bck/Xordoor.A [CA] Win32.Reign.K, Win32/Reign.K!Trojan, Win32/Reign.K!HookDLL!Trojan, Win32.Reign.O, Win32/Reign.O!Trojan, Win32.Reign.N, Win32/Reign.N!Trojan, Win32.Reign.Z, Win32/Reign!DLL.102400!Trojan, Win32/Reign.Z!Worm, Win32.Reign.X, Win32/Reign.X!Trojan How to Remove Reign from Your Computer ^ To completely purge Reign from your computer, you need to delete the files, folders, Windows registry keys and registry values associated with Reign. These files, folders and registry elements are respectively listed in the  Files ,  Folders ,  Registry Keys  and  Registry Values  sections on this page. For instructions on deleting the Reign registry keys and registry values, see  How to Remove Reign from the Windows Registry . For instructions on deleting the Reign files and folders, see  How to Delete Reign Files (.exe, .dll,...