Call +1 (720) 897-8113

Archive for the Malware Category

eWeek Interviews zvelo on its Debut of its IoT Security Platform to Profile Device Risk

eWeek Interviews zvelo on its Debut of its IoT Security Platform to Profile Device Risk

Content categorization vendor moves into the IoT space, adding new capabilities to discover and profile devices. *****The following article, by Sean Michael Kerner , appears in the Security section on eWeek’s web site and was originally published on June 14 , 2017. Content categorization vendor zvelo is getting into […]

Read more

Top 4 Takeaways for Guarding Against Ransomware Attacks After WannaCry

Top 4 Takeaways for Guarding Against Ransomware Attacks After WannaCry

By Eric Watkins, Senior Malicious Detection Researcher at zvelo Earlier this month WannaCry was named the world’s biggest cyberattack which hit at over 150 countries and infected over 300,000 machines across hospitals, universities, manufacturers, government agencies and other important centers. This nasty ransomware encrypted files on a […]

Read more

Full Path URL Categorization and Content Distribution Networks (CDNs)

Full Path URL Categorization and Content Distribution Networks (CDNs)

By Eric Watkins, Senior Malicious Detection Researcher at zvelo Earlier this  month, I came across a use case that capitalizes on the value of full path content categorization. Before discussing this use case in detail, let’s go over the definition of a content distribution network (CDN) and […]

Read more

Best Practices You Can Adopt to Help Protect Against Router Vulnerabilities

Best Practices You Can Adopt to Help Protect Against Router Vulnerabilities

About two months ago, I posted a video blog showing how easy it is to obtain unauthenticated root access on a very popular Netgear router. This Netgear vulnerability received overwhelming news coverage and the urgent call went out across the Internet to patch all of their routers […]

Read more

Netgear Vulnerability Exploit Demonstration Video

Netgear Vulnerability Exploit Demonstration Video

Once you see this vulnerability in action you can easily see how this exploit can be used to create havoc. If someone does take control of your router, they can easily infect or target other devices like IoT. – Eric Watkins, Sr. Malicious Detection Researcher

Read more

IoT, Botnets and DDOS: Avoid Becoming Part of the Problem

IoT, Botnets and DDOS: Avoid Becoming Part of the Problem

IoT, Botnets and DDOS: Avoid Becoming Part of the Problem Recently, hackers successfully unleashed an absolutely massive Distributed Denial of Service (DDoS) attack that swiftly knocked some popular websites offline, including Twitter, Spotify, Amazon and even GitHub. DDoS attacks are of course nothing new, but the latest […]

Read more

Bot Fraud: Malware bots vs. Ad-fraud bots

Bot Fraud: Malware bots vs. Ad-fraud bots

Bot Fraud: Malware Bots vs. Ad-fraud Bots The size and magnitude of the Malware and Ad-fraud bot problem is immense and growing. And, as bots continue to proliferate, there’s important distinctions to point out between Malware bots and Ad-fraud bots.  At zvelo, we’re always looking for ways […]

Read more

Ad Fraud Q&A: Partner SpotX Talks Ad Fraud with zvelo

Ad Fraud Q&A: Partner SpotX Talks Ad Fraud with zvelo

Partner SpotX holds Q&A with zvelo Business Development Vice President, Cordell BaanHofman, on all things ad fraud related. SpotX recently sat down with Cordell BaanHofman, our VP Business Development here at zvelo to discuss the current state of fraud in the industry, including brand safety challenges and […]

Read more

How Hackers Got Away with over $80 Million from Bangledesh Bank

Demonstrating the need for increased security against malware and malicious website, reports have emerged of a group of unknown hackers that broke into Bangladesh’s central bank. Once in, they obtained the credentials needed for payment transfers from Federal Reserve Bank of New York and then transferred large […]

Read more

And Now There’s MaaS: “Malware as a Service!”

And Now There’s MaaS: “Malware as a Service!”

 And Now There’s MaaS: “Malware as a Service!” The cyber arms race just got crazier. You’ve heard of SaaS…DaaS… now there’s MaaS – “Malware as a Service.” This means cybercrooks are figuring out tricks to make the life of anti-virus heros much harder. The UK’s National Crime […]

Read more

IAB Report shows $8.2B a year being lost to online fraud and malware in the digital advertising industry.

IAB Report shows $8.2B a year being lost to online fraud and malware in the digital advertising industry.

IAB Report shows $8.2B a year being lost to online fraud and malware in the digital advertising industry. A new report* released  by the Interactive Advertising Bureau called, “What Is An Untrustworthy Supply Chain Costing the Digital Advertising Industry,” shows that $8.2 billion being lost to online fraud […]

Read more

Obfuscated Mobile Malware Detection

I got my hands on a copy of a Northwestern University research paper titled “Evaluating Android Anti-malware against Transformation Attacks.” After digging into it, my zveloLABS colleagues and I decided to conduct an experiment of our own based on the information provided in the research paper.

Read more

IPv6 Malware Examples and Other Web Attacks

Malware authors are quickly exploiting the vulnerabilities of IPv6 as more and more websites support the new communications protocol. Nefarious IPv6 tools exist that can be used for malicious online activity, even if the tools are intended to facilitate communication between the IPv6 and IPv4 protocols. There is a common misconception that IPv6 is more secure than IPv4, which is not necessarily true. The threat of malware in IPv6 is real, regardless of native or tunneled implementations. zvelo pointed out some challenges in supporting IPv6 while upgrading its own infrastructure. As a follow up, here are some notable IPv6 malware examples that vendors should consider for their own web filtering, parental controls, anti-virus, network and other security software solutions.

Read more

Phishing Alert: Rejected Federal Tax Payment Scam

zveloLABS detected a suspicious-looking email purporting to come from the Electronic Federal Tax Payment System (EFTPS) of the U.S. Treasury Department. This email is fraudulent and claims that “Your Federal Tax Payment ID has been rejected.” The payment rejection is falsely attributed to the use of an invalid identification number. Here is an example of the actual phishing email (see image 01), followed by some observations that should raise red flags about its validity.

Read more

Malware Distribution Point Detection – a Case Study

The media consistently warns people that clicking on links within emails from unknown sources can be dangerous. What about links in seemingly harmless emails received from individuals of trust? More so, what if the URL of a said link points to a familiar website? In recent weeks, zveloLABS® has identified several websites that appear benign in nature at first glance, but after further analysis these sites have been categorized as malware distribution points. What made the following case study interesting is that none of the well-known Internet blacklists and malware analysis tools flagged these URLS as being malicious. The following analysis shows how these trusted control mechanisms were circumvented with nothing more than a guise and a fundamental understanding of how the Internet operates.

Read more

Hybrid Scam Abuses Social Media, e-Mail and SMS Text Messaging

It’s hard to imagine unsolicited spam getting any more annoying. One way would be to receive it from three different sources and at the same time, which is precisely the type of hybrid spam campaign zveloLABS™ recently unearthed. The scam abuses Facebook, e-mail and SMS text messaging simultaneously to bombard unsuspecting victims with various “offers.”

 

Read more

8 Easy Tips to Avoid Hackers & Scammers on Social Sites

The rapid growth and popularity of social networking sites like Facebook and Twitter has wrought a seismic and lasting change to the Internet. The Web has evolved from a source of static information to a proxy of real world interaction. These changes have evolved to make the virtual world of the Internet as dangerous as the real world in a number of ways.  A number of recent articles, studies and reports have been published regarding the safety, privacy and security of the Internet and the particular challenges posed by the dynamic, unmoderated world of social networking websites.

 

Read more

Red Button SEO Poisoning and Malware Campaign

zveloLABS™ have been tracking a new campaign by cybercrooks, compromising and creating websites for use in SEO poisoning and malware distribution. Thousands of these sites have been detected which use elaborate techniques to trick search engines and are ready to serve malware in an instant.

 

Read more

Introduction to Rogue Anti Virus

This post is for those users who are not already familiar with this widespread and common threat known as “Rogue AV,” or fake anti-virus software.

 

Read more

135,000 Fake YouTube Pages Delivering Malware

zveloLABS™ has uncovered thousands of compromised web servers hosting fake YouTube pages.  Attempting to play the video on these fake pages prompts the user to install a ‘media codec’ which then infects the machine with malware.

 

Read more

Google Groups Latest Hot Spot for Rogue AV and Malware

zveloLABS™ researchers have been tracking a recent campaign abusing Google Groups to spread malicious links in Spam emails.  Users following the link are infected with a Downloader Trojan, silently infecting the machine with various types of malware including Rogue Anti-Virus.

 

Read more

March Madness Malware

The first week of March Madness has brought about many compelling stories, with a good deal of upsets and bracket busters. The most newsworthy of these has been the University of Northern Iowa’s ousting of #1 overall seed Kansas. This ‘Cinderella’ story has deservedly gotten a great deal of press coverage. However, those looking for information on the web may get infected with malware rather than a great story.

 

Read more

Virus Alert! Twitter, Google, Hallmark and Others Subject To Attack

zveloLABS™ is warning customers today of a new email scam circulating very quickly.  These fraudulent emails claim to be from Google Staffing, Hallmark, Twitter as well as other social networks and legitimate businesses.

 

Read more

IRS Tax Avoidance Scam

Today, zvelo is alerting customers to a new targeted email scam.  This newest twist to the common IRS email scam seems to be targeted to organizations, notifying the recipient of a tax evasion complaint being filed against the company.  Opening the file infects the user’s machine with dangerous trojans that monitor the infected machine, report back to the attacker and download other malicious payloads.

 

Read more

Poisoned search results – Super Bowl

The Super Bowl is the one of the biggest and most watched television events of the year in the United States. People everywhere scour the internet looking for predictions, gambling spreads and news before the event and scores, stories and clips after the event.  In anticipation of the increased search traffic for Super Bowl related terms, cybercriminals have shown themselves to be well-organized and planning ahead.  Search results for Super Bowl related search terms are already turning up top-ten results linked to malicious websites.

 

Read more

Boeing 787 Searches Hijacked by Rogue AV

Today, the Boeing 787 Dreamliner jet completed its much awaited first flight. As users searched to find videos and news articles related to the story, blackhats quickly moved in for yet another attack against Google search results.

 

Read more

Compromised Web Servers Host Koobface Malware Cocktail

The Koobface gang has struck again using compromised web servers to deliver a potent mix of malware. zveloLABS™ researchers have found hundreds of newly exploited sites hosting malware which includes downloaders, keyloggers and multiple variants of the Koobface worm.

 

Read more

Black Hat – Las Vegas 2011: Report #2

Tuesday was another full day of malware analysis. The coursework, hosted by Mandiant, consisted of an introduction to OllyDbg, an in-depth look at the Windows loader and the Windows API, specifically covering registry functions, process/threading functions, and sockets.

Read more

Black Hat – Las Vegas 2011: Report #1

On Monday, I took a killer crash course from Mandiant on malware analysis. Mandiant was not shy and dove right into the course curriculum. They even setup a great VM for us to practice on, complete with real world samples of malware.

Read more

Latest News

Corporate Headquarters

zvelo, Inc.
8350 East Crescent Parkway, Suite 450
Greenwood Village, CO 80111
Phone: +1 (720) 897-8113
Toll Free: +1 (877) 77-zvelo (US Only)
Fax: +1 (720) 897-6544

Contact Us:

Affiliations