Home Tags Internet Protocol (IP)

Tag: Internet Protocol (IP)

We confront hundreds of thousands of new threats every day and we can see that threat actors are on a constant lookout for new attack opportunities.

According to our research, connecting a software license management token to a computer may open a hidden remote access channel for an attacker.
Hackers want to get at Xiaomirsquo;s latest device, but GPL violations make it impossible.
At the beginning of October 2017, we discovered new Android spyware with several features previously unseen in the wild.
In the course of further research, we found a number of related samples that point to a long-term development process. We believe the initial versions of this malware were created at least three years ago.
Google removes 60 apps packing the "AdultSwine" malware.
Kodak’s stock has tripled since announcing the blockchain project on Tuesday.
LONDON, UK, 10 January 2018 – Potter Clarkson LLP, one of the largest full service IP practices in Europe, has selected the OnePlace Client Lifecycle Management (CLM) solution to boost the firm’s marketing and business development activitie...
In recent data theft campaigns, the APT group has been downloading malware from what appears to be legitimate Adobe URLs and IP addresses, ESET says.
But a Mr. Robot-themed plug-in angered Mozilla users unfamiliar with the show.
At the end of September, Palo Alto released a report on Unit42 activity where they – among other things – talked about PYLOT malware. We have been detecting attacks that have employed the use of this backdoor since at least 2015 and refer to it as Travle.

Coincidentally, KL was recently involved in an investigation of a successful attack where Travle was detected, during which we conducted a deep analysis of this malware.
Attackers bypass HTTPS encryption protection by registering new TLS certificate.

Jack of all trades

Among this array of threats we found a rather interesting sample – Trojan.AndroidOS.Loapi.

This Trojan boasts a complicated modular architecture that means it can conduct a variety of malicious activities: mine cryptocurrencies, annoy users with constant ads, launch DDoS attacks from the affected device and much more.
US law offers few protections for gameplay design.