malware Archives | Hacked: Hacking Finance
user

Hacked: Hacking Finance


Archives


Navigation
Tagmalware
Featured

Knowledge Base

Malware

Posted on September 13th, 2016.

Malware is a broad category which encompasses any software which may act contrary to the user’s demands. For this reason, various subcategories, including scamware and ransomware have been created over the years to more precisely define malware. Some viruses can be considered malware, if they were downloaded with some other stated...

Featured

Cybersecurity

Report: Cybercriminals Are Cooking up Malware in Record Numbers

Posted on January 26th, 2016.

2015 was a record year for the number of malware samples, a total that stands at 84 million new samples from 2014. That’s already 9 million more new malware strains than 2014. Researchers from Panda Security have released figures to claim a total of 84 million new malware samples that were detected and disabled in 2015. A press release...

Featured

Breaches

Backdoors Affect Bitcoin ATMs and ATMs Alike

Posted on January 25th, 2016.

The Bitcoin ATM, as a relatively new industry, has perhaps not been put to the test like Bitcoin exchanges. This has some criminals worrying if Bitcoin ATMs could be a good place to steal value.  Criminals all over the world already target regular ATMs, so, perhaps thinking that the amateur-nature of Bitcoin could make such ATMs...

Featured

Bugs

UConn Website Compromise Plugs Malware Download Prompt

Posted on December 28th, 2015.

The University of Connecticut’s website was the target of a cyberattack on Sunday, prompting visitors with a dialog box to download a malicious program pretending to be an updated version of Adobe’s Flash Player. The official website of the University of Connecticut was the subject of a compromise late Sunday, according to the...

Featured

Cybersecurity

Google’s VirusTotal Now Offers Apple Malware Scanning Sandbox

Posted on November 20th, 2015.

Apple has seen more malware incidents this year than many previous years’ put together. It was only a matter of time before leading online virus scanner – VirusTotal opened its doors for Mac users to check for malware among their files. Google’s VirusTotal is now offering support for malware detection in OS X files including Mac-O...

Featured

Cybersecurity

Dridex Malware Targets Users with a Fake IKEA Receipt

Posted on October 28th, 2015.

The developers of the infamous Dridex malware have stepped up a gear in their creative means to get around law enforcement by tailoring a new spam campaign using IKEA’s brand name. Dridex malware developers have launched a new spam campaign today by sending emails purporting to be one from IKEA, to targeted users, reports Heimdal...

Featured

Cybersecurity

Feds and White Hats Put the Brakes on Bank-Swindling Botnet – Dridex

Posted on October 14th, 2015.

Law enforcement agencies from around the world and private cybersecurity companies have come together to stop a far-reaching botnet that infected hundreds of thousands of computers every year to steal money from targeted banks. The mastermind behind malicious botnet has also been arrested. Multiple law enforcement agencies and several...

Featured

Bugs

Malware Peddling Vigilantes behind Linux.Wifatch Speak Up

Posted on October 7th, 2015.

  The group of black/white-hat (?) hackers who infected over 10,000 Linux routers with malware to fend off the really bad malware have come forward in speaking to Symantec, the security software company that originally revealed the mysterious malware. Linux.Wifatch recently made plenty of headlines when security researchers at...

Featured

Bugs

Kemoge: A Vicious New Malware That Could Take over Your Android Device

Posted on October 7th, 2015.

  A new malicious adware dubbed “Kemoge” has been discovered to operate in the wild by security researchers. The malware is spotted spreading worldwide quickly, and it allows the complete compromise and takeover of the targeted Android device. Security researchers at FireEye have uncovered a new Android malware that is aggressively...

Featured

Bugs

YiSpecter Malware Targets All iOS Devices: More than 100 Apps are Compromised

Posted on October 5th, 2015.

A new ad-based malware dubbed “YiSpecter” is now infecting iPhones and iPads that are both jailbroken and non-jailbroken by abusing private APIs within the iOS system, discovers a security firm. Security firm Palo Alto Networks has uncovered a new malware that appears to originate from an advertising company in China by...

Featured

Breaches

Report: Publicly Disclosed Data Breaches are Increasing, Dramatically

Posted on October 3rd, 2015.

The 2015 Internet Organized Crime Threat Assessment (IOCTA) has revealed that the number of “publically disclosed” data breaches this year has increased significantly, leading to secondary crimes wherein the breached data is used for extortion, identity theft, fraud and other similar offences. The 2015 law enforcement-centric IOCTA...

Featured

Bugs

Linux.Wifatch: Vigilante Hacker Infects Routers with Malware to Fight Bad Malware

Posted on October 2nd, 2015.

A newly discovered malware, called Linux.Wifatch by security firm Symantec, has been found to compromise at least 10,000 Linux-routers. Unlike other malware, however, Wifatch protects the router from other infections, protecting victims instead. Security giant Symantec has discovered a new vigilante malware that behaves like most other...

Featured

Cybersecurity

XcodeGhost Malware Infects over 4,000 iOS Apps

Posted on September 24th, 2015.

Security researchers have discovered that the malicious app campaign plaguing Apple’s App Store is far worse than initially thought, with over 4000 App store applications affected by the XcodeGhost malware. It was less than a week ago when Apple suffered its first major malware attack targeting its App Store. At the time, it was believed...

Featured

Cybersecurity

Russian Government behind Malware-Aided Cyberespionage for 7 Years

Posted on September 17th, 2015.

Cybersecurity researchers have discovered a state-sponsored Russian hacking group called “the Dukes” running cyber espionage operations against other Governments for nearly a decade, according to reports. Finland-based F-Secure Labs, a security firm, has published a new report that details the discovery of a well-resourced,...

Featured

Cybersecurity

MIT Triumphs as the Most Insecure University in the US, Study Reveals

Posted on September 12th, 2015.

One of the foremost computer science and engineering schools, Massachusetts Institute of Technology (MIT) ranked at the very end of 485 colleges and universities analyzed and graded for IT security risks in a security benchmarking study. In a press release, The 2015 Higher Education Security Report, conducted by security firm...

Featured

Cybersecurity

New Android Malware ‘MKero’ Packs a Heavy Financial Punch

Posted on September 9th, 2015.

Security researchers at Bitdefender have revealed a new CAPTCHA-bypassing Android malware – Mkero, that is embedded in Google Play store as applications by malicious developers. The malware is designed to get thousands of users to subscribe to premium-rate SMS services, which adds up to a big pot of money. Security researchers estimate...

Featured

Cybersecurity

Sophisticated Malware ‘Carbanak Trojan’ Robbing Banks of a Billion Dollars Returns

Posted on September 4th, 2015.

Danish cybersecurity researchers have discovered newer and improved variants of the notorious Carbanak Trojan, now surfacing to target banks and financial institutions in U.S. & Europe. Carbanak, the malware that enabled a cyber-gang to siphon over $1 billion from a hundred financial institutions all over the world has made its...

Featured

Cybersecurity

KeyRaider Malware Results in World’s Largest iCloud Hijack

Posted on August 31st, 2015.

In what is seen as the most comprehensive Apple accounts hijack in history, a malware named ‘KeyRaider’ is said to affect over 225,000 jailbroken Apple devices. A new iOS malware known as KeyRaider, targeting jailbroken devices, has already claimed private account information from over 225,000 Apple accounts, reports ThreatPost. A team...

Featured

Cybersecurity

Malware Alert: Files on WikiLeaks Can Infect Your Computer

Posted on August 26th, 2015.

An independent data researcher had originally discovered a massive data dump released by WikiLeaks to contain malware in torrent files made available by the whistleblowing website. Since then, the researcher has also confirmed that some of the files taken from the dump and now hosted on WikiLeaks.org are also malware infected. Josh...

Featured

Cybersecurity

Botnet Surge Expected After Malware Builder Leak

Posted on July 11th, 2015.

The tools to build and customize malware based on the ZeusVM banking Trojan were published online for free in June. Malware Researchers Malware Must Die! went public with the information on their blog. The group began on twitter when a band of malware researchers joined together to form a volunteer campaign to raise awareness of malware...

The team:
Dmitriy Lavrov
Analyst
Dmitriy Lavrov is a professional trader, technical analyst and money manager with 10 years of trading experience. He covers Forex, Commodities and Cryptocurrencies. He is among the top 10 most Read More
Jonas Borchgrevink
Founder
Jonas Borchgrevink is the founder of Hacked.com and CryptoCoinsNews.com. He is a serial entrepreneur, trader and investor. He shares his own personal journey on Hacked.com.
Mate Csar
Analyst
Trader and financial analyst, with 10 years of experience in the field. An expert in technical analysis and risk management, but also an avid practitioner of value investment and passive Read More
Mati Greenspan
Analyst
Senior Market Analyst at Etoro.com.
Rakesh Upadhyay
Analyst
Rakesh Upadhyay is a Technical Analyst and Portfolio Consultant for The Summit Group. He has more than a decade of experience as a private trader. His philosophy is to use Read More
Pamela Meropiali
Account Manager
Pamela Meropiali is responsible for users on Hacked.com.
Joseph Young
Journalist
Joseph Young is a finance and tech journalist & analyst based in Hong Kong. He has worked with leading media and news agencies in the technology and finance industries, offering Read More