Get a Pentest and security assessment of your IT network.

News

BitDefender weekly review

The malware is disguised as a Microsoft Office Word Document by having its usual executable executable icon changed, to trick users into launching it. It will drop a DLL file in %windir%system32 with a random name that is composed of 9 letters (e.g: frjacnwrm.dll) The file will be registered as a Browser Helper Object by making changes to registry values that will affect Internet Explorers behavior. The BHO is used to monitor the users browsing behavior and the gathered data is sent to a domain similar to: http://[removed]idbredov.ru/.”]

Source: https://www.bitdefender.com/blog/hotforsecurity/bitdefender-weekly-review-tricky-word-documents/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin