DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Creator of Mariposa Botnet sentenced to 58 months in jail

Posted on December 27, 2013 by Dissent

SAPA reports: A Slovenian court on Monday sentenced to 58 months in jail Matjaz Skorjanc, the creator of the “Mariposa Botnet”, a vast network of virus-infected computers used by criminal hackers. Skorjanc was found guilty of “creating a malicious computer programme for hacking information systems, assisting in wrongdoings and money laundering”, the Maribor regional court…

Read more

More than 1,400 Financial institutions in 88 Countries targeted by Banking Trojan in 2013

Posted on December 22, 2013 by Dissent

Swati Khandelwal writes: As the year draws to a close, we have seen the number of emerging threats like advance phishing attacks from the Syrian Electronic Army, financial malware and exploit kits, Cryptolocker ransomware infections, massive Bitcoin theft, extensive privacy breach from NSA and many more. The financial malware’s were the most popular threat this year….

Read more

New Android Malware Disguises Itself as a Settings App, Steals SMS Messages

Posted on December 18, 2013 by Dissent

Vinay Pidathala, Hitesh Dharmdasani, Jinjian Zhai and Zheng Bu write: FireEye has uncovered and helped weaken one of the largest advanced mobile botnets to date. The botnet, which we are dubbing “MisoSMS,” has been used in at least 64 spyware campaigns, stealing text messages and emailing them to cybercriminals in China. MisoSMS infects Android systems…

Read more

TN: Bojangles fast food restaurant hacked, credit card info stolen (update 1)

Posted on December 4, 2013 by Dissent

Mike Krafcik reports that police in Newport, Tennessee are investigating a string of fraudulent credit and debit card charges that they say point back to a fast food restaurant, Bojangles. Police believe the restaurant’s Wi-Fi network may to be blame and the problem may not be isolated to just that one location: In a statement,…

Read more

Look What I Found: Moar Pony!

Posted on December 4, 2013 by Dissent

Daniel Chechik and Anat (Fox) Davidi of Trustwave write: In our last episode of “Look What I Found” we talked about a fairly large instance of the Pony Botnet Controller. With the source code of Pony leaked and in the wild, we continue to see new instances and forks of Pony 1.9. One of the latest instances we’ve run…

Read more

AHW reports online stores compromised by malware

Posted on November 28, 2013 by Dissent

AHW LLC in Illinois operates a number of online stores. In May, and as noted previously on this blog, they notified the New Hampshire Attorney General’s Office that Green Fun Store (greenfunstore.com) had apparently been comprised during the fourth quarter of 2012. They were alerted to the breach in March by their credit card vendor, Evalon,…

Read more
  • Previous
  • 1
  • …
  • 693
  • 694
  • 695
  • 696
  • 697
  • 698
  • 699
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Threat actors have reportedly launched yet another campaign involving an application connected to Salesforce
  • Russian hackers target IVF clinics across UK used by thousands of couples
  • US, allies sanction Russian bulletproof hosting services for ransomware support
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • Large medical lab in South Africa suffers multiple data breaches
  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Closing the Privacy Gap: HIPRA Targets Health Apps and Wearables
  • Researchers claim ‘largest leak ever’ after uncovering WhatsApp enumeration flaw
  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.