science and technology

Silent technical advancement noteworthy in school management software

Of course, there are different software vendors in the market to manage administration works of different industries. If you think that school software is chiefly to manage records, process payroll and maintain attendance, then you are...




science and technology

Key Advantages of Building Financial Applications Using HTML5

Before we start, let’s have a brief introduction on HTML5 framework. A HTML5 mobile application is a web page or series of web pages...




science and technology

Tablets PCs Revolutionizing Our Computing Needs

From a historical perspective, we started with main frames, then moved on to mini computers and then came the boom of personal computers. These three major developments in computers have defined our computing habits the past few decades....




science and technology

India now the the third largest smartphone market

India has become the 3rd largest smart phone market in the world, having overtaken Japan in Q1 of 2013. China and America occupy the first two positions.

Various smartphone manufacturers like Apple, HTC, LG,...




science and technology

The great Indian mobile travel portal revolution

There has been an explosion in the usage of mobile phones and smartphones to access travel related websites and portals in India. More and more users are turning to their mobile phones to book tickets for local, national and...




science and technology

Sniffing Out Microphones and Other Bugging Devices Yourself




science and technology

Transform Business Process using Telecom Billing Solution!

In the edge of high technology, it is essential to integrate telecom solutions and platforms with CSPs. It can help operators and as well as subscribers too. Billing platform is only the medium among...




science and technology

Social Media Marketing is not Just, Likes and Comments, Why?




science and technology

Telecom Software Helps to Deliver Seamless User Experience, How?

In, rapid enhancement of telecommunication industry, it is quite drastic job to deliver right solutions. CSPs aren’t finding the perfect telecom service providers, and so it has become one of...




science and technology

Top Testing Suite: Robust Testing Platform Forever!

I was literally confused to deployment testing services and testing scenarios, but thank to my one friend who advised me to use the computaris “top testing suite”. It was the...




science and technology

Toll-free number is a magic wand for SMEs

Who doesn’t like to feast on free support and services? The businesses which work on the paradigm of providing ultimate customer satisfaction handle hundreds of calls on a daily basis, including exchange, complaint, inquiry and...




science and technology

July 2019 - Microsoft Releases Security Patches

Microsoft addresses vulnerabilities in its July security bulletin. Trend Micro Deep Security covers the following:


    CVE-2019-1001 - Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the improper handling of objects in memory by the scripting engine in Microsoft browsers. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1004 - Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the improper handling of objects in memory by the scripting engine in Microsoft browsers. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1062 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the handling of objects in memory in the Chakra scripting engine of Microsoft Edge. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1063 - Internet Explorer Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the handling of objects in memory by Internet Explorer. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1092 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the handling of objects in memory in the Chakra scripting engine of Microsoft Edge. Attackers looking to exploit this vulnerability may host a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1103 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may create a specially crafted webpage that contains an exploit to this vulnerability.



    CVE-2019-1104 - Microsoft Browser Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the improper handling of objects in memory by Microsoft browsers. Attackers looking to exploit this vulnerability may create a specially crafted webpage that contains an exploit to this vulnerability.



    CVE-2019-1106 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may gain the same user rights as the currently logged on user.



    CVE-2019-1107 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This memory corruption vulnerability exists in the handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability may gain the same user rights as the currently logged on user.



    CVE-2019-1112 - Microsoft Excel Information Disclosure Vulnerability
    Risk Rating: Important

    This information disclosure vulnerability exists in the disclosure of memory contents by Microsoft Excel. Attackers looking to exploit this vulnerability may host a specially crafted file that contains an exploit to this vulnerability.


.
Read More




science and technology

August 2019 - Microsoft Releases Security Patches

Microsoft addresses vulnerabilities in its August security bulletin. Trend Micro Deep Security covers the following:


    CVE-2019-1196 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1139 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1140 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1141 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1195 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1197 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way to convince a user to visit a specially crafted website that contains an exploit to this vulnerability.



    CVE-2019-1201 - Microsoft Word Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by Microsoft Word. Attackers looking to exploit this vulnerability may create a specially crafted file that contains an exploit to this vulnerability.


.
Read More




science and technology

September 2019 - Microsoft Releases Security Patches

Microsoft addresses several vulnerabilities in its September security bulletin. Trend Micro Deep Security covers the following:


    CVE-2019-1257 - Microsoft SharePoint Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the failure of Microsoft SharePoint to check an application package's source markup. Attackers looking to exploit this vulnerability must find a way to convince a user to open a malicious SharePoint application package.



    CVE-2019-1295 - Microsoft SharePoint Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper protection of data input in Microsoft SharePoint APIs. Attackers looking to exploit this vulnerability must find a way for a vulnerable Microsoft SharePoint version to input data in a susceptible API.



    CVE-2019-1296 - Microsoft SharePoint Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper protection of data input in Microsoft SharePoint APIs. Attackers looking to exploit this vulnerability must find a way for a vulnerable Microsoft SharePoint version to input data in a susceptible API.


.
Read More




science and technology

October 2019 - Microsoft Releases Security Patches

Microsoft addresses several vulnerabilities in its October security bulletin. Trend Micro Deep Security covers the following:


    CVE-2019-1335 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in Microsoft Edge's Chakra scripting engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.



    CVE-2019-1364 - Win32k Elevation of Privilege Vulnerability
    Risk Rating: Important

    This elevation of privilege vulnerability exists in the improper handling of objects in memory by the Windows kernel-mode driver. Attackers looking to exploit this vulnerability must find a way to be logged on to the vulnerable system.



    CVE-2019-1060 - MS XML Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper parsing of user input by the Microsoft XML Core Services MSXML. Attackers looking to exploit this vulnerability must find a way for a user to access a website using Internet Explorer.



    CVE-2019-1238 - VBScript Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the VBScript engine. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.



    CVE-2019-1239 - VBScript Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the VBScript engine. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.



    CVE-2019-1307 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.



    CVE-2019-1308 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.



    CVE-2019-1366 - Chakra Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects in memory by the Chakra scripting engine in Microsoft Edge. Attackers looking to exploit this vulnerability must find a way for a user to access a website where the exploit is hosted.



    CVE-2019-1361 - Microsoft Graphics Components Information Disclosure Vulnerability
    Risk Rating: Important

    This information disclosure vulnerability exists in the improper handling of objects in memory by the Microsoft Graphics Components. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file.


.
Read More




science and technology

November 2019 - Microsoft Releases Security Patches

Microsoft addresses several vulnerabilities in its November security bulletin. Trend Micro Deep Security covers the following:


    CVE-2019-1390 - BScript Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the VBScript engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.



    CVE-2019-1429 - Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This elevation of privilege vulnerability exists in the improper handling of objects in memory by the scripting engine in Internet Explorer. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.



    CVE-2019-1359 - Jet Database Engine Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects by the Windows Jet Database Engine. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file.



    CVE-2019-1358 - Jet Database Engine Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects by the Windows Jet Database Engine. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted file.



    CVE-2019-1311 - Windows Imaging API Remote Code Execution Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the improper handling of objects in memory by the Windows Imaging API. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted .WIM file.


.
Read More




science and technology

December 2019 - Microsoft Releases Security Patches

Microsoft addresses several vulnerabilities in its December security bulletin. Trend Micro Deep Security covers the following:


    CVE-2019-0617 - Jet Database Engine Remote Code Execution Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the Windows Jet Database engine in respect to handling objects in memory. Attackers looking to exploit this vulnerability must find a way to convince a user to open a specially crafted file.



    CVE-2019-1485 - VBScript Remote Code Execution Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the improper handling of objects in memory by VBScript engine. Attackers looking to exploit this vulnerability must find a way to convince a user to access a malicious website where the exploit is hosted.



    CVE-2019-0853 - GDI Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the improper handling of objects by the Windows Graphics Device Interface (GDI). Attackers looking to exploit this vulnerability must find a way for a user to open a website that contains the exploit, or to open a specially crafted file via file-sharing.



    CVE-2019-1458 - Win32k Elevation of Privilege Vulnerability
    Risk Rating: Important

    This elevation of privilege vulnerability exists in the improper handling of objects by the the Win32k component in Windows. Attackers looking to exploit this vulnerability must find a way for a user to open a specially crafted application.



    CVE-2019-1439 - Windows GDI Information Disclosure Vulnerability
    Risk Rating: Important

    This information disclosure vulnerability exists in the improper handling of objects in memory by the Windows GDI component. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.



    CVE-2019-1117 - DirectWrite Remote Code Execution Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.



    CVE-2019-1118 - DirectWrite Remote Code Execution Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.



    CVE-2019-1119 - DirectWrite Remote Code Execution Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the improper handling of objects in memory by the DirectWrite. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted document.



    CVE-2019-0959 - Windows Common Log File System Driver Elevation of Privilege Vulnerability
    Risk Rating: Important

    This elevation of privilege vulnerability exists in the improper handling of objects in memory by the Windows Common Log File System. Attackers looking to exploit this vulnerability must find a way for a user to execute a specially crafted application.


.
Read More




science and technology

January 2020 - Microsoft Releases Security Patches

Microsoft addresses several vulnerabilities in its January security bulletin. Trend Micro Deep Security covers the following:


    CVE-2020-0609 - Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution, pre-authentication vulnerability exists in the Windows Remote Desktop Gateway (RD Gateway) and requires no user interaction. Attackers looking to exploit this vulnerability could send a specially crafted request via RDP.



    CVE-2020-0610 - Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution, pre-authentication vulnerability exists in the Windows Remote Desktop Gateway (RD Gateway) and requires no user interaction. Attackers looking to exploit this vulnerability could send a specially crafted request via RDP.



    CVE-2020-0652 - Microsoft Office Memory Corruption Vulnerability
    Risk Rating: Important

    This remote code execution vulnerability exists in the improper handling of objects by Microsoft Office. Attackers looking to exploit this vulnerability must find a way for a user to open a website that contains the exploit, or to open a specially crafted file.



    CVE-2020-0601 - Windows CryptoAPI Spoofing Vulnerability
    Risk Rating: Important

    This spoofing vulnerability exists in the validation of Elliptic Curve Cryptography (ECC) certificates by the the Windows CryptoAPI (crypt32.dll). A successful exploitation of this vulnerability could allow man-in-the-middle (MiTM) attacks.


.
Read More




science and technology

February 2020 - Microsoft Releases Security Patches

Microsoft addresses several vulnerabilities in its February security bulletin. Trend Micro Deep Security covers the following:


    CVE-2020-0674 - Scripting Engine Memory Corruption Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the scripting engine of Internet explorer in the way it handles objects in memory. Attackers looking to exploit this vulnerability could host a specially crafted website that contains an exploit.



    CVE-2020-0681 - Remote Desktop Client Remote Code Execution Vulnerability
    Risk Rating: Critical

    This remote code execution vulnerability exists in the Windows Remote Desktop Client. It exists when a user connects to a malicious server. Attackers looking to exploit this vulnerability could find ways to convince a user of a vulnerable machine to connect to a malicious server.



    CVE-2020-0692 - Microsoft Exchange Server Elevation of Privilege Vulnerability
    Risk Rating: Important

    This elevation of privilege vulnerability, that requires an enabled Exchange Web Services (EWS), exists in the Microsoft Exchange Server. Attackers looking to exploit this vulnerability must find a way to change Security Access Token parameters and forward that to the vulnerable Microsoft Exchange Server.


.
Read More




science and technology

Warning: PPE - essential against COVID-19 - poses serious risk of skin injury

Around 42.8 percent experienced serious skin injury related to the use of personal protective equipment (PPE), including masks, goggles, face shields, and protective gowns, a study has shown.




science and technology

Undercover robot captures footage of gorillas singing before dinner (VIDEO)

The robotic undercover agent was made in such a way that it could replicate all basic mannerisms of a real-life gorilla.




science and technology

Coronavirus will not 'just disappear', pathogen is not deliberately manipulated: Anthony Fauci

The coronavirus that originated from Wuhan, China has already claimed the lives of more than 253,230 people worldwide.




science and technology

Alien life could exist in these atmospheric conditions: Expands researchers' scope

The growth and reproduction of yeast and E.coli suggests that alien life could be thriving in some giant exoplanets.




science and technology

New deadly mutation of coronavirus requires urgent attention, warns study

The study report suggested that this mutated pathogen seems to have replaced the original coronavirus that originated in Wuhan.




science and technology

From Mahesh Babu, Pawan Kalyan to Arjun Kapoor: Indian celebrities react to the shocking Vizag gas leak

The Vizag gas leak which took place last night has left over 5000 people sick. The tragedy has left the country shocked, and celebrities have taken to social media to show solidarity with the people of Vizag.




science and technology

Researchers discover giant Ice Age sloths that walked in two legs

Unlike elephants, these giant ice age sloths roamed across the earth's surface in two legs around 20,000 years ago.




science and technology

Apple is addressing the biggest pain-point of iPhone users during COVID-19

Apple is soon going to roll out a new software that addresses the pain-point of iPhone users in wake of COVID-19 pandemic.




science and technology

OnePlus users rejoice: Here are five exciting features coming your way

From Always on Display to sending a notification when the phone is fully charged, here are five community-inspired features coming to OnePlus smartphones.




science and technology

After Facebook, Silver Lake to invest Rs 5,655 crore in Reliance Jio Platforms

Facebook last month poured in Rs 43,574 crore for a 9.99 per cent stake in India's oil-retail-telecom conglomerate-led Jio Platforms -- the largest investment for a minority stake by a tech giant.




science and technology

Xiaomi Mi 10 price in India tipped ahead of May 8 launch: Specs, features & more

Xiaomi has announced that it will launch the Mi 10 in India on May 8 and here's everything you need to know about the phone.




science and technology

Huawei is bringing new premium mid-range smartphone to India; could be under Rs 20,000

Huawei lists new smartphone on its India site, hinting at an imminent arrival of Huawei Y9s in the country.




science and technology

Apple-Google's contact-tracing system upholds user-privacy; bans location tracking

Apple and Google's contact tracing system won't allow apps built using its API to use location services in smartphones, addressing some concerns privacy experts might have.




science and technology

Ethical hacker discovers 'security issue' in Aarogya Setu: Centre downplays risks

If the tweet by the French hacker is to be believed, the privacy of more than 90 million Indians is at stake. The issue has been revealed to the concerned departments as the ethical hacker waits for it to be resolved.




science and technology

Digital India: 14% of India's active Internet users in 5-11 age group

According to the latest statistics, more and more users are getting online, but there's a large chuck in the rural areas that hasn't been exposed to the internet.




science and technology

Amazon Prime subscribers get special gaming benefits in India: Details here

Amazon Prime subscribers in India get exclusive gaming benefits, which grants free access to some interesting mobile games.




science and technology

Mukesh Ambani's fake Twitter account gains thousands of followers in days

A fake account of Mukesh Ambani on Twitter has gained thousands of followers in a matter of days. Here's how we spotted the fake account.




science and technology

Backdoor.Perl.SHELLBOT.AB

Over All Risk Rating : Low


This backdoor comes bundled with a Monero miner, both spread by a botnet. The techniques employed are reminiscent of the Outlaw hacking group that Trend Micro reported in November 2018.

This Backdoor connects to Internet Relay Chat (IRC) servers. It joins an Internet Relay Chat (IRC) channel.

Read More




science and technology

Ransom.MSIL.FREEZING.A

Over All Risk Rating : Low


This ransomware is one of the few ransomware families that is loaded and executed under the legitimate PowerShell executable. It also is one of the few that uses restart session manager to terminate processes that have associated files it tries to encrypt.

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.

Read More




science and technology

Backdoor.Linux.MIRAI.VWIQT

Over All Risk Rating : Low


IoT malware uses two different encryption routines for its strings and modified the magic number of UPX.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.

Read More




science and technology

Backdoor.Perl.SHELLBOT.D

Over All Risk Rating : Low


This backdoor is downloaded and installed in systems via malicious URL. It is installed with a miner.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.

Read More




science and technology

ELF_SETAG.SM

Over All Risk Rating : Low


This malware is part of an attack chain that involves searching for exposed or publicly accessible Elasticsearch databases/servers. The malware would invoke a shell with an attacker-crafted search query with encoded Java commands.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Read More




science and technology

Backdoor.Linux.BASHLITE.SMJC2

Over All Risk Rating : Low


This backdoor is seen propagating via CVE-2018-18636, a cross-site scripting vulnerability affecting the wireless router D-Link DSL-2640T. This malware is capable of receiving commands to flood other systems.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.

Read More




science and technology

Coinminer.Win64.MALXMR.TIAOODBZ

Over All Risk Rating : Low


This miner figured in the fileless GhostMiner that uses WMI Objects. GhostMiner is known to kill competing other miner payloads.

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

Read More




science and technology

Rootkit.Linux.SKIDMAP.A

Over All Risk Rating : Low


This rootkit is used by Skidmap - a Linux malware - to hide its cryptocurrency-mining abilities.

This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Read More




science and technology

Trojan.JS.KOVCOREG.A

Over All Risk Rating : Low


This malware is part of the fileless botnet Novter distributed by the KovCoreG malvertising campaign.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible.

Read More




science and technology

Trojan.JS.NODSTER.A

Over All Risk Rating : Low


This malware is part of the fileless botnet Novter that is delivered via the KovCoreG malvertising campaign.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.

Read More




science and technology

Trojan.SH.KERBERDS.A

Over All Risk Rating : Low


This new version of KERBERDS, a cryptomining malware that uses an ld.so.preload-based rootkit for stealth, now hides CNC traffic in DNS TXT records.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Read More




science and technology

Coinminer.Linux.KERBERDS.A

Over All Risk Rating : Low


This new version of KERBERDS, a known crypto-mining malware that uses an ld.so.preload-based rootkit for stealth, was seen propagating by telnet bruteforce attacks.

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It uses the system's central processing unit (CPU) and/or graphical processing unit (GPU) resources to mine cryptocurrency.

Read More




science and technology

Backdoor.MSIL.REMCOS.AOJ

Over All Risk Rating : Low


This malware was seen delivered via malicious spam spoofing the brand DHL as the sender. It came as an .ISO attachment. It possibly is used for spearphishing activities.

This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system.

Read More




science and technology

Backdoor.Win64.ANCHOR.A

Over All Risk Rating : Low


This is the Trend Micro detection for the backdoor installed by the PowerTrick post-exploitation toolkit believed to be developed by creators of Trickbot.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It connects to certain websites to send and receive information.

Read More