Users login

Create an account »

JOIN XATRIX

Users login

Hundreds of porn clicker trojans infiltrate Google Play

On average 10 new porn clickers bypassed Google Play's security checks a week. They did not just made it to the store, they sucessfully infiltrated user devices.

1

Upgraded version of CTB Locker encrypts WordPress sites

It seems that the new version of CTB Locker ransomware encrypts WordPress websites demanding 0.5 BTC to release files.

2

Nissan Leaf EV doesnt require authentication

An attendee of a computer security workshop discovered that Nissan Leaf's API doesn't require authentication to control certain features of this electric vehicle.

3

US DoJ files motion to force Apple to fulfill FBI iPhone crack order

The US Department of Justice has filed a motion compelling Apple to comply with a court order to help the FBI get access of the San Bernardino murderer's iPhone.

4

Xbot Banking Trojan for Android steals bank login info

Miscreants have created a new attack designed to steal banking credentials and CC information using phishing pages crafted to look like Google Play's payment interface.

5

Hollywood Presbyterian hospital paid $17,000 to hackers

An LA hospital has paid $17,000 in bitcoins to hackers in order to get access to their computers which have been infected with ransomware for more than a week.

6

Zero Days, the Story of Stuxnet

In the new documentary by Alex Gibney, an Oscar-winning filmmaker the phenomenon of Stuxnet is explored. A super worm discovered in 2010 by security researchers had one goal - to infect Iran's nuclear program. However, the worm ended up spreading uncontrollably.

7

Americans more likely to pay data ransom, Brits pay higher amounts

In the United States alone more than 50% of ransomware victims have paid the extortionists according to a study conducted by Bitdefender in November 2015. Half of victims are willing to pay up to $500 to recover their data.

8

YiSpecter iOS malware

The first iOS malware capable of infecting stock and jailbroken iOS devices has been identified. It's target are users running iOS 8.

9

Household Appliances Sending Spam, opening backdoors

Proofpoint published research of never seen but heavily theorized Internet-of-Things cyber attack. They believe this is an industry first - standard household appliances such as smart TVs and Refrigerators used to send malicious and junk email accross the globe.

10

Vulnerabilities

What's cooking right now?

HowTo Videos

First Stack Buffer Overflow to modify Variable


Stack overflow - modify program execution

Owning Windows Domain through MSSQL reverse shell


Demonstrating reverse shell attack on MSSQL


Dissecting the Dyre Loader

Read about Dissecting the Dyre Loader

Dyre or Dyreza, is a pretty prominent figure in the world of financial malware. The Dyre of today comes loaded with a multitude of modules and features while also appearing to be well maintained. The first recorded instance of Dyre I have found is an article in June 2014 and the sample in question is version 1001, while at the time of this report Dyre is already up to version 1166. While the crypters and packers have varied over time, for at least the past 6 months Dyre has used the same loader to perform it's initial checks and injection sequence. It is the purpose of this report to go through the various techniques and algorithms present in the loader, and at times reverse them to python proof of concepts.
» Full paper on Dissecting the Dyre Loader


Virus updates


Tips & Tricks

We're introducing a new tutorials section. Stay tuned...

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »