Metamorfo Trojan
A trojan malware campaign is targeting online banking users around the world with the aim of stealing credit card information, finances and other personal details.
Like many other hacking campaigns, Metamorfo begins with phishing emails that in this case claim to contain information about an invoice and invite the user to download a .ZIP file. By downloading and running the file, the victim allows Metamorfo to execute and run on a Windows machine.
Source: ZDNet
How do you protect yourself?
Proper security measures must be in place to defend against Metamorfo trojan and similar threats. Having proper up-to-date endpoint security provides a cross-generational blend of threat defense techniques to protect systems from malware.
CVE-2020-0014
Android has released its monthly security bulletin that contains details of security vulnerabilities affecting Android devices.
The most severe of these issues is a critical security vulnerability in the System component that could enable a remote attacker using a specially crafted transmission to execute arbitrary code within the context of a privileged process.
Source: Android
How do you protect yourself?
Updated your Android to the latest version.
.SaveTheQueen Ransomware
Researchers have uncovered a new strand of ransomware that encrypts files and adds the extension ‘.SaveTheQueen’ to it.
The progress of the newly uncovered malware was found to be tracked using the system volume (SYSVOL) folder found on active directory (AD) domain controllers.
Source: InformationAge
How do you protect yourself?
Proper security measures must be in place to defend against .SaveTheQueen Ransomware and similar threats. Having proper up-to-date endpoint security provides a cross-generational blend of threat defense techniques to protect systems from malware.
0 Comments