[email protected] +603-2181 3666
Extol Threat Intelligent Notification
Locker Ransomware
June 1, 2015

This is a new strain of ransomware that lies dormant on infected computers until malware operators decide to unleash it upon unsuspecting victims.  This malware uses a sleeper function.  It infects the maximum number of machines and then activates when no one expects it. Due to the increased number of users reporting infections, it is […]

Mobile Forensics World 2015
June 1, 2015

A little discussed but well-attended dual-lineup conference on forensics and investigations started today in Myrtle Beach, South Carolina as “Mobile Forensics World” and the “Techno Security and Forensics Investigations Conference”. Presentation content here mostly focuses on technologies used in fighting cybercrime malware and the general misuse of mobile and computing power for serious criminal activities. Some of the talks focused […]

What makes one novel strain of malicious software more dangerous or noteworthy than another? Is it the sheer capability and feature set of the new malware, or are these qualities meaningless without also considering the skills, intentions and ingenuity of the person wielding it? Most experts probably would say it’s important to consider attribution insofar […]

Three years ago, on May 28th 2012, we announced the discovery of a malware known as Flame. At the same time we published our FAQ, CrySyS Lab posted their thorough analysis of sKyWIper. A few days earlier, Maher CERT published IOCs for Flamer. In short, Flame, sKyWIper and Flamer are different names for the same […]

Statistics on botnet-assisted DDoS attacks in Q1 2015 [pdf] Methodology A DDoS (Distributed Denial of Service) attack is one of the techniques mostly often used by cybercriminals. It is intended to reduce an information system, typically a website, to a state where it cannot be accessed by legitimate users. One popular DDoS scenario is a […]

Do you have an iPhone? Yes? Well, then the following news may be of interest to you! A new security flaw has been discovered in iOS, Apple’s operating system. This vulnerability affects iPhones running iOS version 8.3, although other versions could also be affected. According to the BBC, a specially crafted text message can cause […]

IT News

Cybercriminals who specialize in phishing — or tricking people into giving up usernames and passwords at fake bank and ecommerce sites — aren’t generally considered the most sophisticated crooks, but occasionally they do exhibit creativity and chutzpah. That’s most definitely the case with a phishing gang that calls itself the “Manipulaters Team”, whose Web site boasts […]

PandaLabs, Panda Security‘s antil-malware laboratory, today published its Quarterly Report for Q1, analyzing the IT security events and incidents from January through March 2015. The multinational security vendor detected over 225,000 new malware strains per day in the first quarter of the year,  with peaks reaching 500,000. This record-breaking figure represents a 40 percent increase […]

Grabit and the RATs
May 28, 2015

Not so long ago, Kaspersky clients in the United States approached Kaspersky researchers with a request to investigate a new type of malicious software that they were able to recover from their organizations’ servers. The malware calls itself Grabit and is distinctive because of its versatile behavior. Every sample we found was different in size […]