813.321.0987

Here are a few of our favorite infosec articles from the past few weeks. Learn about Android botnet “Black Rose Lucy” and about “BlueBorne”, which exploits Bluetooth vulnerabilities. Read how the Necurs Botnet, DarkHydrus and other threat actors are turning to inconspicuous files to peddle malspam.

For more articles, check out our #onpatrol4malware blog.

emotet trojan

New Android Botnet Pops Up on Malware-as-a-Service Market

Source: Security Boulevard

Security researchers have discovered a new Android botnet toolkit, dubbed Black Rose Lucy by researchers from security firm Check Point Software Technologies, that is being developed as a malware-as-a-service (MaaS) offering for other cybercriminals. Read more.

emotet trojan

Threat Actors Eyeing IQY Files To Peddle Malspam

Source: Threatpost

Researchers at IBM X-Force this week disclosed that both the Necurs Botnet, as well as DarkHydrus and the threat actor behind the Marap downloader, have all been observed utilizing weaponized IQY file attachments to deliver malware. Read more.

emotet trojan

Bad Actors Sizing Up Systems Via Lightweight Recon Malware

Source: Threatpost

Well-known financial crime gang Cobalt Group and other threat actors have recently shifted tactics to incorporate lightweight modular downloaders that “vet” target machines for their attractiveness before proceeding with a full-fledged attack.  Read more.

emotet trojan

The many faces of omnichannel fraud

Source: Malware Bytes

The rise of new technologies, social networks, and other means of online communication have brought about compelling changes in industries across the board. Most organizations do not have adequate tools and measures in place to protect their businesses against fraud in the omnichannel environment. Read more.