Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![bleepingcomputer.webp](./Ressources/img/bleepingcomputer.webp) |
2018-07-05 12:40:00 |
Hamas Lures Israeli Soldiers to Malware Disguised in World Cup and Dating Apps (lien direct) |
In a report published earlier this week, the Israeli military has accused Hamas cyber-operatives of attempting to lure Israel Defence Forces (IDF) soldiers into installing malware-infected apps on their phones. [...] |
Malware
|
|
|
![bleepingcomputer.webp](./Ressources/img/bleepingcomputer.webp) |
2018-06-30 13:06:03 |
Clipboard Hijacker Malware Monitors 2.3 Million Bitcoin Addresses (lien direct) |
While we have covered cryptocurrency clipboard hijackers in the past, most of the previous samples monitored for 400-600 thousand cryptocurrency addresses. This week BleepingComputer noticed a sample of this type of malware that monitors for a over 2.3 million cryptocurrency addresses! [...] |
Malware
|
|
|
![bleepingcomputer.webp](./Ressources/img/bleepingcomputer.webp) |
2018-06-29 03:50:01 |
File-Wiping Malware Placed Inside Gentoo Linux Code After GitHub Account Hack (lien direct) |
An unknown hacker has temporarily taken control over the GitHub account of the Gentoo Linux organization and embedded malicious code inside the operating system's distributions that would delete user files. [...] |
Malware
Hack
|
|
|
![bleepingcomputer.webp](./Ressources/img/bleepingcomputer.webp) |
2018-06-29 01:00:00 |
PROPagate Code Injection Technique Detected in the Wild for the First Time (lien direct) |
Security firm FireEye has detected that malware authors have deployed the PROPagate code injection technique for the first time inside a live malware distribution campaign. [...] |
Malware
|
|
|
![bleepingcomputer.webp](./Ressources/img/bleepingcomputer.webp) |
2018-06-22 00:45:00 |
New GZipDe Malware Drops Metasploit Backdoor (lien direct) |
Security researchers from AlienVault have discovered a new malware strain named GZipDe that appears to be part of a targeted attack âmost likely a cyber-espionage campaign. [...] |
Malware
|
|
|