Redaman Banking Trojan

 

 

The Redaman banking trojan ramped up its activity in the last part of 2018, employing ongoing back-end changes in order to evade detection, according to a new Wednesday report.

Redaman as a malware first came on the scene in 2015, and since then has consistently targeted victims that use Russian financial institutions. But from September through December 2018, researchers at Palo Alto Networks’ Unit 42 division saw increasing numbers of mass spam messages delivering the trojan.

The emails targeted Russian email recipients, often with email addresses ending in .ru, and delivered their payloads via a rotating assortment of archived Windows executable files disguised as PDF documents, according to the firm’s analysis.

Source: ThreatPost

How do you protect yourself?

Proper security measures must be in place to defend against Redaman banking trojan and similar threats. Make sure you only download legitimate apps from the app store and do not click on suspicious links. Having proper up-to-date endpoint and firewall security provides a cross-generational blend of threat defense techniques to protect systems from malware.

 

CVE-2018-19726

 

 

Adobe has released security updates for Adobe Experience Manager. These updates resolve one reflected cross-site scripting vulnerability rated Moderate, and one stored cross-site scripting vulnerability rated Important that could result in sensitive information disclosure.

Source: Adobe

How do you protect yourself?

Adobe recommends users update their software installation to the newest version.

 

Anatova Ransomware

 

 

A new ransomware family popped on the radar of analysts, who see it as a serious threat created by skilled authors that can turn it into a multifunctional piece of malware.

Infections with Anatova have been reported all over the world, most of them being in the United States, followed by countries in Europe (Belgium, Germany, France, the UK).

The ransomware includes an anti-analysis routine that gets triggered under certain conditions. Once launched, the ransomware asks for admin privileges, runs a few checks and then encrypts files on the computer and then demands 10 DASH coins, currently valued at $700.

Source: BleepingComputer

How do you protect yourself?

Proper security measures must be in place to defend against Anatova ransomware and similar threats. Having proper up-to-date endpoint security provides a cross-generational blend of threat defense techniques to protect systems from malware.