Anti-Malware Research

Unmasking the SYS01 Infostealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

Unmasking the SYS01 Infostealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages 2024-10-30 at 15:33 By Ionut Alexandru BALTARIU In a digital world where advertising is king, businesses and organizations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by […]

React to this headline:

Loading spinner

Unmasking the SYS01 Infostealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages Read More »

Unfading Sea Haze: New Espionage Campaign in the South China Sea

Unfading Sea Haze: New Espionage Campaign in the South China Sea 2024-05-28 at 18:01 By Bitdefender Bitdefender researchers investigated a series of incidents at high-level organizations in countries of the South China Sea region, all performed by the same  threat actor we track as Unfading Sea Haze. Based on the victimology and the cyber-attack’s aim,

React to this headline:

Loading spinner

Unfading Sea Haze: New Espionage Campaign in the South China Sea Read More »

AI meets next-gen info stealers in social media malvertising campaigns

AI meets next-gen info stealers in social media malvertising campaigns 2024-04-04 at 16:02 By Nicolae POSTOLACHI The impact that AI has on society has steadily crept into the darkest nooks and crannies of the internet. So much so that cybercrooks are hitching free rides on the AI bandwagon by leveraging the increased demand of AI-powered

React to this headline:

Loading spinner

AI meets next-gen info stealers in social media malvertising campaigns Read More »

When Stealers Converge: New Variant of Atomic Stealer in the Wild

When Stealers Converge: New Variant of Atomic Stealer in the Wild 2024-02-27 at 16:03 By Andrei LAPUSNEANU Here at Bitdefender, we’re constantly working on improving detection capabilities for our macOS cyber-security products; part of this effort involves revisiting old (or digging up new) samples from our mawlware zoo. During routine verifications, we were able to

React to this headline:

Loading spinner

When Stealers Converge: New Variant of Atomic Stealer in the Wild Read More »

Details on Apple’s Shortcuts Vulnerability: A Deep Dive into CVE-2024-23204

Details on Apple’s Shortcuts Vulnerability: A Deep Dive into CVE-2024-23204 2024-02-22 at 16:03 By Jubaer Alnazi JABIN CVE-2024-23204 [https://nvd.nist.gov/vuln/detail/CVE-2024-23204] sheds light on the critical importance of continuous security vigilance. Apple’s Shortcuts application, designed to enhance user automation, can inadvertently become a potential vector for privacy breaches. This analysis aims to provide users, developers, and security

React to this headline:

Loading spinner

Details on Apple’s Shortcuts Vulnerability: A Deep Dive into CVE-2024-23204 Read More »

Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms

Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms 2024-02-14 at 16:01 By Nicolae POSTOLACHI Bitdefender Labs has been keeping up with the latest modus operandi of cybercrooks who adapt emerging technologies to siphon money from consumers. Artificial intelligence is just one of the many tools that help in the creation

React to this headline:

Loading spinner

Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms Read More »

New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group

New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group 2024-02-08 at 22:31 By Andrei LAPUSNEANU Bitdefender researchers have discovered a new backdoor targeting Mac OS users. This previously undocumented family of malware is written in Rust and includes several interesting features. While the investigation is ongoing, we’re sending out this alert

React to this headline:

Loading spinner

New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group Read More »

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud 2024-01-25 at 15:16 By Alexandra BOCEREG SMS services remain a critical part of telecommunications; they don’t require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a

React to this headline:

Loading spinner

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud Read More »

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximize crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximize crypto-doubling scams 2024-01-18 at 15:02 By Ionut Alexandru BALTARIU As of October 2023, researchers at Bitdefender Labs have been actively keeping tabs [https://www.bitdefender.com/blog/labs/a-deep-dive-into-stream-jacking-attacks-on-youtube-and-why-theyre-so-popular/] on steam-jacking attacks against high-profile YouTube accounts used to conduct a myriad of crypto doubling scams. Fast forward to 2024; our

React to this headline:

Loading spinner

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximize crypto-doubling scams Read More »

Unveiling Mobile App Secrets: A 6-Month Deep Dive into Surprising Behavior Patterns

Unveiling Mobile App Secrets: A 6-Month Deep Dive into Surprising Behavior Patterns 2024-01-08 at 14:02 By Silviu STAHIE Bitdefender launched in May 2023, an industry-first technology called App Anomaly Detection [https://www.bitdefender.com/blog/labs/app-anomaly-detection-technology-from-bitdefender-to-protect-against-yet-unknown-threats/] that gave the security solutions feature in our mobile security solution for Android the power to analyze app behavior and identify threats based on

React to this headline:

Loading spinner

Unveiling Mobile App Secrets: A 6-Month Deep Dive into Surprising Behavior Patterns Read More »

The anatomy of a scam: ‘Like YouTube Videos and Get Paid’ schemes

The anatomy of a scam: ‘Like YouTube Videos and Get Paid’ schemes 18/12/2023 at 16:02 By Nicolae POSTOLACHI Have you ever considered a remote job that only requires you to click the like or subscribe button on YouTube videos? If you have, we’re sorry to say it’s a scam. This month, researchers at Bitdefender Labs

React to this headline:

Loading spinner

The anatomy of a scam: ‘Like YouTube Videos and Get Paid’ schemes Read More »

NodeStealer attacks on Facebook take a provocative turn – threat actors deploy malvertising campaigns to hijack users’ accounts

NodeStealer attacks on Facebook take a provocative turn – threat actors deploy malvertising campaigns to hijack users’ accounts 31/10/2023 at 16:04 By Andrei ANTON-AANEI Social media platforms offer immense opportunities for financially motivated threat actors to conduct large-scale attacks against unsuspecting Internet users. Fraudulent and malicious threats are prevalent on all social networks and it

React to this headline:

Loading spinner

NodeStealer attacks on Facebook take a provocative turn – threat actors deploy malvertising campaigns to hijack users’ accounts Read More »

A Deep Dive into Stream-Jacking Attacks on YouTube and Why They’re So Popular

A Deep Dive into Stream-Jacking Attacks on YouTube and Why They’re So Popular 04/10/2023 at 16:03 By Ionut Alexandru BALTARIU Stream-jacking attacks have gained significant traction on large streaming services in recent months, with cybercriminals targeting high-profile accounts (with a large follower count) to send their fraudulent ‘messages’ across to the masses. Starting from the

React to this headline:

Loading spinner

A Deep Dive into Stream-Jacking Attacks on YouTube and Why They’re So Popular Read More »

Check-Out With Extra Charges – Vulnerabilities in Hotel Booking Engine Explained

Check-Out With Extra Charges – Vulnerabilities in Hotel Booking Engine Explained 14/09/2023 at 11:02 By Alexandru MAXIMCIUC Booking engines – they make the worlds of travel and hospitality spin around. Estimated at over $US 500 billion [https://www.grandviewresearch.com/industry-analysis/online-travel-booking-service-market-report] , this market moves fast. These engines are a critical, nearly invisible part of the hospitality industry, and

React to this headline:

Loading spinner

Check-Out With Extra Charges – Vulnerabilities in Hotel Booking Engine Explained Read More »

Abusing the Ad Network – Threat Actors Now Hacking into Companies via Search

Abusing the Ad Network – Threat Actors Now Hacking into Companies via Search 14/09/2023 at 11:02 By Victor VRABIE For the past few years, hackers have increasingly targeted customers and businesses with tainted software boosted via ads. The recipe is simple – cyber-criminal groups set up fake websites for high-interest software and promote them on

React to this headline:

Loading spinner

Abusing the Ad Network – Threat Actors Now Hacking into Companies via Search Read More »

Fragments of Cross-Platform Backdoor Hint at Larger Mac OS Attack

Fragments of Cross-Platform Backdoor Hint at Larger Mac OS Attack 14/09/2023 at 11:02 By Andrei LAPUSNEANU During routine detection maintenance, our Mac researchers stumbled upon a small set of files with backdoor capabilities that seem to form part of a more complex malware toolkit. The following analysis is incomplete, as we are trying to identify

React to this headline:

Loading spinner

Fragments of Cross-Platform Backdoor Hint at Larger Mac OS Attack Read More »

Exposing RDStealer Deep Dive into a Targeted Cyber-Attack Against East-Asia Infrastructure

Exposing RDStealer Deep Dive into a Targeted Cyber-Attack Against East-Asia Infrastructure 14/09/2023 at 11:02 By Victor VRABIE Modern cyber-crime rings are becoming increasingly attracted to the use of legitimate components to achieve their goals. Execution of malicious components via DLL hijacking and persisting on affected systems by abusing legitimate scheduled tasks and services are just

React to this headline:

Loading spinner

Exposing RDStealer Deep Dive into a Targeted Cyber-Attack Against East-Asia Infrastructure Read More »

Scroll to Top