Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems. Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware[…]
Archive: March 2016
  		2016
	
	
	
	
		
		
		28		
		
			Mar		
	
	
	
	
	    
	    
	    
		
		
		28		
		
			Mar		
	
	
	
	
	    
	    
	    
		If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be[…]
		
		7		
		
			Mar		
	
	
	
	
	    
	    
	    
		The sample is in virus total: https://www.virustotal.com/ And it is having low detection ratio due to the native form as Java compiled binary and the key strings used for scanning was encrypted.Open the JAR file with any kind of decompiler[…]
  
  	End  
	
|--Although you should be able to work out who I am, I don't really care, as I can work out who you are. So beware of leaving footprints.--|


