The Hacker News – Most Popular Cyber Security, Hacking News Site: Malware

Operator of VirusTotal Like Malware-Scanning Service Jailed for 14 Years

Operator of VirusTotal Like Malware-Scanning Service Jailed for 14 Years
September 22, 2018Mohit Kumar
A Latvian hacker behind the development and operation of counter antivirus service "Scan4You" has finally been sentenced to 14 y...

Mirai Botnet Creators Helping FBI Fight Cybercrime to Stay Out of Jail

Mirai Botnet Creators Helping FBI Fight Cybercrime to Stay Out of Jail
September 19, 2018Mohit Kumar
Three young hackers who were sentenced late last year for creating and spreading the notorious Mirai botnet are now helping the FBI to in...

Ransomware Attack Takes Down Bristol Airport's Flight Display Screens

Ransomware Attack Takes Down Bristol Airport's Flight Display Screens
September 17, 2018Wang Wei
Bristol Airport has blamed a ransomware attack for causing a blackout of flight information screens for two days over the weekend. The ai...

Someone Hijacked MEGA Chrome Extension to Steal Users' Passwords

Someone Hijacked MEGA Chrome Extension to Steal Users' Passwords
September 04, 2018Swati Khandelwal
Warning! If you are using Chrome browser extension from the MEGA file storage service, uninstall it right now. The official Chrome exte...

Thousands of MikroTik Routers Hacked to Eavesdrop On Network Traffic

Thousands of MikroTik Routers Hacked to Eavesdrop On Network Traffic
September 03, 2018Swati Khandelwal
Last month we reported about a widespread crypto-mining malware campaign that hijacked over 200,000 MikroTik routers using a previously d...

New Android Malware Framework Turns Apps Into Powerful Spyware

New Android Malware Framework Turns Apps Into Powerful Spyware
August 22, 2018Swati Khandelwal
Security researchers have uncovered a new, powerful Android malware framework that is being used by cybercriminals to turn legitimate apps i...

Dark Tequila Banking Malware Uncovered After 5 Years of Activity

Dark Tequila Banking Malware Uncovered After 5 Years of Activity
August 21, 2018Swati Khandelwal
Security researchers at Kaspersky Labs have uncovered a new, complex malware campaign that has been targeting customers of several Mexica...

Researchers Developed Artificial Intelligence-Powered Stealthy Malware

Researchers Developed Artificial Intelligence-Powered Stealthy Malware
August 09, 2018Mohit Kumar
Artificial Intelligence (AI) has been seen as a potential solution for automatically detecting and combating malware, and stop cyber attac...

TSMC Chip Maker Blames WannaCry Malware for Production Halt

TSMC Chip Maker Blames WannaCry Malware for Production Halt
August 06, 2018Mohit Kumar
Taiwan Semiconductor Manufacturing Company (TSMC)—the world's largest makers of semiconductors and processors—was forced to shut down ...

Fortnite APK Download for Android Won't Be Available on Google Play Store

Fortnite APK Download for Android Won't Be Available on Google Play Store
August 05, 2018Swati Khandelwal
There's both good news and bad news for Fortnite game lovers. Fortnite, one of the most popular games in the world right now, is co...

iPhone Chip Supplier TSMC Stops Production After Computer Virus Attack

iPhone Chip Supplier TSMC Stops Production After Computer Virus Attack
August 05, 2018Swati Khandelwal
Taiwan Semiconductor Manufacturing Company (TSMC)—Apple's sole supplier of SoC components for iPhones and iPads, and Qualcomm's m...

iPhone Hacking Campaign Using MDM Software Is Broader Than Previously Known

iPhone Hacking Campaign Using MDM Software Is Broader Than Previously Known
July 25, 2018Swati Khandelwal
India-linked highly targeted mobile malware campaign, first unveiled two weeks ago , has been found to be part of a broader campaign targ...

Hackers Used Malicious MDM Solution to Spy On 'Highly Targeted' iPhone Users

Hackers Used Malicious MDM Solution to Spy On 'Highly Targeted' iPhone Users
July 13, 2018Swati Khandelwal
Security researchers have uncovered a "highly targeted" mobile malware campaign that has been operating since August 2015 and f...

Gaza Cybergang Returns With New Attacks On Palestinian Authority

Gaza Cybergang Returns With New Attacks On Palestinian Authority
July 10, 2018Wang Wei
Security researchers from Check Point Threat Intelligence Team have discovered the comeback of an APT (advanced persistent threat) survei...

Stolen D-Link Certificate Used to Digitally Sign Spying Malware

Stolen D-Link Certificate Used to Digitally Sign Spying Malware
July 09, 2018Swati Khandelwal
Digitally signed malware has become much more common in recent years to mask malicious intentions. Security researchers have discover...

Most LokiBot samples in the wild are "hijacked" versions of the original malware

Most LokiBot samples in the wild are "hijacked" versions of the original malware
July 06, 2018Swati Khandelwal
Hacker himself got hacked. It turns out that most samples of the LokiBot malware being distributed in the wild are modified versions of...

New Virus Decides If Your Computer Good for Mining or Ransomware

New Virus Decides If Your Computer Good for Mining or Ransomware
July 05, 2018Mohit Kumar
Security researchers have discovered an interesting piece of malware that infects systems with either a cryptocurrency miner or ransomware...

Github Account of Gentoo Linux Hacked, Code Replaced With Malware

Github Account of Gentoo Linux Hacked, Code Replaced With Malware
June 28, 2018Swati Khandelwal
Downloaded anything from Gentoo's GitHub account yesterday? Consider those files compromised and dump them now—as an unknown group ...

Free Thanatos Ransomware Decryption Tool Released

Free Thanatos Ransomware Decryption Tool Released
June 26, 2018Swati Khandelwal
If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or dec...

New Malware Family Uses Custom UDP Protocol for C&C Communications

New Malware Family Uses Custom UDP Protocol for C&C Communications
June 26, 2018Wang Wei
Security researchers have uncovered a new highly-targeted cyber espionage campaign, which is believed to be associated with a hacking gr...