New Linux malware combines unusual stealth with a full suite of capabilities

Enlarge (credit: Getty Images) Researchers this week unveiled a new strain of Linux malware that’s notable for its stealth and sophistication in infecting both traditional servers and smaller Internet-of-things devices. Dubbed Shikitega by the AT&T Alien Labs researchers who discovered it, the malware is delivered through a multistage infection chain using polymorphic encoding. It also […]

A Webb Telescope image is being used to push malware

One of the first images taken by the James Webb Telescope that was released by NASA was the "sharpest infrared image of the distant universe to date." It's a wondrous photo showing a detailed cluster of galaxies. It's also currently being used by bad actors to infect systems with malware. Security analytics platform Securonix has […]

Hard-to-detect credential-theft malware has infected 1,200 and is still going

Enlarge (credit: Kit / Flickr) A deceptively simple malware attack has stolen a wide array of credentials from thousands of computers over the past few weeks and continues to steal more, a researcher warned on Tuesday. The ongoing attack is the latest wave of Separ, a credential stealer that has been known to exist since […]

Google Play malware used phones’ motion sensors to conceal itself

Enlarge (credit: Andri Koolme / Flickr) Malicious apps hosted in the Google Play market are trying a clever trick to avoid detection—they monitor the motion-sensor input of an infected device before installing a powerful banking trojan to make sure it doesn’t load on emulators researchers use to detect attacks. The thinking behind the monitoring is […]

More than 500,000 people downloaded games on the Google Play Store that were infected with nasty malware — here are the 13 apps affected (GOOG, GOOGL)

Antonio Villas-Boas/Business Insider Google has removed several games from its Play Store for containing malware.  The games, which were all driving simulators, required users to download an extra app that could then gain full network access to a user’s device.  If you’ve downloaded one of the apps, your best bet is to factory reset your […]

I’ve got a bridge to sell you. Why AutoCAD malware keeps chugging on

Enlarge (credit: Juliancolton / Wikimedia) Criminal hackers continue to exploit a feature in Autodesk’s widely used AutoCAD program in an attempt to steal valuable computer-assisted designs for bridges, factory buildings, and other projects, researchers said Tuesday. The attacks arrive in spear-phishing emails and in some cases postal packages that contain design documents and plans. Included […]