Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/9/2020
01:00 PM
50%
50%

Malware Campaign Feeds on Coronavirus Fears

A new malware campaign that offers a "coronavirus map" delivers a well-known data-stealer.

Criminals are leveraging the Covid-19 epidemic to spread malware through a "Coronavirus Map" app that provides no useful information to victims but may provide the victims' user names, passwords, credit card numbers, and other sensitive information to the attacker.

The new campaign, described in a blog post by researchers at Reason Labs, uses a strain of malware called AZORult. AZORult is a data-stealer first recognized in 2016.

In addition to scraping data out of victims' Web browsers and applications, AZORult acts as a downloader, bringing additional malware onto an infected system. AZORult is commonly sold in online malware markets in Russia, and is one of the more commonly sold data-stealers in those forums.

For more, read here.

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "Out at Sea, With No Way to Navigate: Admiral James Stavridis Talks Cybersecurity."

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/16/2020
Cybercrime May Be the World's Third-Largest Economy by 2021
Marc Wilczek, Digital Strategist & COO of Link11,  4/13/2020
Web Pioneers Launch Identity Startup That Ditches Passwords
Kelly Jackson Higgins, Executive Editor at Dark Reading,  4/14/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5569
PUBLISHED: 2020-04-20
An unquoted search path vulnerability exists HDD Password tool (for Windows) in version 1.20.6620 and earlier which is stored in CANVIO PREMIUM 3TB(HD-MB30TY, HD-MA30TY, HD-MB30TS, HD-MA30TS), CANVIO PREMIUM 2TB(HD-MB20TY, HD-MA20TY, HD-MB20TS, HD-MA20TS), CANVIO PREMIUM 1TB(HD-MB10TY, HD-MA10TY, HD...
CVE-2020-11930
PUBLISHED: 2020-04-20
The GTranslate plugin before 2.8.52 for WordPress has Reflected XSS via a crafted link. This requires use of the hreflang tags feature within a sub-domain or sub-directory paid option.
CVE-2020-11928
PUBLISHED: 2020-04-20
In the media-library-assistant plugin before 2.82 for WordPress, Remote Code Execution can occur via the tax_query, meta_query, or date_query parameter in mla_gallery via an admin.
CVE-2019-20786
PUBLISHED: 2020-04-19
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
CVE-2020-11894
PUBLISHED: 2020-04-19
Ming (aka libming) 0.4.8 has a heap-based buffer over-read (8 bytes) in the function decompileIF() in decompile.c.