Malware

Hackers Continue to Exploit the COVID-19 Pandemic in Malicious Campaigns

by Verint Cyber Threat Intelligence Research Team

posted at March 22, 2020

The outbreak of the Coronavirus demonstrates how agile and quick cyber attackers are to exploit a vulnerability or human weakness. Read here about recently identified malicious campaigns related to the COVID-19 pandemic.

Suspicious Domains Selling Tickets to the Tokyo 2020 Olympics

by Verint Cyber Threat Intelligence Research Team

posted at March 17, 2020

Global mega events are commonly targeted by cybercriminals, who attempt to monetize them for their own personal gain. Our research team has recently discovered suspicious domains that are allegedly selling tickets to the Tokyo 2020 Olympic games.

The Awakening of PoS Malware (or, has it really been dormant?)

by Verint Cyber Threat Intelligence Research Team

posted at May 7, 2019

The peak of activity of Point-of-Sale (PoS) malware was in late 2013 (with the disclosure of the notorious Target breach[1]), and over the course of 2014, when we witnessed the development and trade of new PoS malware strains. The vigorous discussions on hacking communities at the time, has led hackers to believe PoS malware would

Breaking Down Builder-encrypted RAT

by Nadav Lorber

posted at November 7, 2018

The emerging trend of Fully Undetectable (FUD) malware builders is not new to our research team. However, in light of the wide variety of techniques that the malware authors keep developing, it’s obvious that we will always encounter malicious code execution tricks that successfully bypass traditional anti-malware solutions. This blog post is actually a case