<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malware &#8211; Martijn Grooten</title>
	<atom:link href="/tag/malware/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Lapsed Ordinary</description>
	<lastBuildDate>Tue, 10 Jul 2018 12:00:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Malware authors&#039; continued use of stolen certificates isn&#039;t all bad news</title>
		<link>/2018/07/10/malware-authors-continued-use-of-stolen-certificates-isnt-all-bad-news/</link>
					<comments>/2018/07/10/malware-authors-continued-use-of-stolen-certificates-isnt-all-bad-news/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Tue, 10 Jul 2018 12:00:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blacktech]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[code-signing]]></category>
		<category><![CDATA[eset]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[plead]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=484</guid>

					<description><![CDATA[A new malware campaign that uses two stolen code-signing certificates shows that such certificates continue to be popular among malware authors. But there is a positive side to malware authors&#8217; use of stolen certificates. More on Virus Bulletin’s blog.]]></description>
										<content:encoded><![CDATA[<p>A new malware campaign that uses two stolen code-signing certificates shows that such certificates continue to be popular among malware authors. But there is a positive side to malware authors&#8217; use of stolen certificates.<br />
More on <a href="https://www.virusbulletin.com/blog/2018/07/malware-authors-continued-use-stolen-certificates-not-only-bad-news/">Virus Bulletin’s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/07/10/malware-authors-continued-use-of-stolen-certificates-isnt-all-bad-news/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Necurs update reminds us that the botnet cannot be ignored</title>
		<link>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/</link>
					<comments>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Fri, 06 Jul 2018 12:00:47 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[c&c]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[necurs]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[trend micro]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=479</guid>

					<description><![CDATA[The operators of the Necurs botnet, best known for being one of the most prolific spam botnets of the past few years, have pushed out updates to its client, which provide some important lessons about why malware infections matter. More on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>The operators of the Necurs botnet, best known for being one of the most prolific spam botnets of the past few years, have pushed out updates to its client, which provide some important lessons about why malware infections matter.<br />
More on Virus Bulletin&#8217;s <a href="https://virusbulletin.com/blog/2018/07/necurs-update-reminds-us-botnet-cannot-be-ignored/">blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/07/06/necurs-update-reminds-us-that-the-botnet-cannot-be-ignored/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Subtle change could see a reduction in installation of malicious Chrome extensions</title>
		<link>/2018/06/13/subtle-change-could-see-a-reduction-in-installation-of-malicious-chrome-extensions/</link>
					<comments>/2018/06/13/subtle-change-could-see-a-reduction-in-installation-of-malicious-chrome-extensions/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 13 Jun 2018 09:37:02 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[browser]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[extension]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=444</guid>

					<description><![CDATA[Google has made a subtle change to its Chrome browser, banning the inline installation of new extensions, thus making it harder for malware authors to trick users into unwittingly installing malicious extensions. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>Google has made a subtle change to its Chrome browser, banning the inline installation of new extensions, thus making it harder for malware authors to trick users into unwittingly installing malicious extensions.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/06/subtle-change-could-see-reduction-installation-malicious-chrome-extensions/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/06/13/subtle-change-could-see-a-reduction-in-installation-of-malicious-chrome-extensions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Polish banks targeted by attackers who hijack customer sessions</title>
		<link>/2018/06/04/polish-banks-targeted-by-attackers-who-hijack-customer-sessions/</link>
					<comments>/2018/06/04/polish-banks-targeted-by-attackers-who-hijack-customer-sessions/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Mon, 04 Jun 2018 09:48:29 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[backswap]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[eset]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[payment source]]></category>
		<category><![CDATA[poland]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=462</guid>

					<description><![CDATA[Rather than hooking into the browser process, BackSwap takes the place of the user and enters the same commands into the browser that a user would if they wanted to hack themselves. Read more on Payment Source. (Note: subscription wall.)]]></description>
										<content:encoded><![CDATA[<p>Rather than hooking into the browser process, BackSwap takes the place of the user and enters the same commands into the browser that a user would if they wanted to hack themselves.<br />
Read more on <a href="https://www.paymentssource.com/news/polish-banks-targeted-by-attackers-who-hijack-customer-sessions">Payment Source</a>. (Note: subscription wall.)</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/06/04/polish-banks-targeted-by-attackers-who-hijack-customer-sessions/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MnuBot banking trojan communicates via SQL server</title>
		<link>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/</link>
					<comments>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 30 May 2018 09:34:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[brazil]]></category>
		<category><![CDATA[ibm]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[mnubot]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[trojan]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<category><![CDATA[x-force]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=440</guid>

					<description><![CDATA[Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/mnubot-banking-trojan-communicates-sql-server/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>XMRig used in new macOS cryptominer</title>
		<link>/2018/05/23/xmrig-used-in-new-macos-cryptominer/</link>
					<comments>/2018/05/23/xmrig-used-in-new-macos-cryptominer/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 23 May 2018 09:34:35 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[macos]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[monero]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=438</guid>

					<description><![CDATA[A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/xmrig-used-new-macos-cryptominer/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/23/xmrig-used-in-new-macos-cryptominer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New malware freezes user&#039;s device in account takeover scheme</title>
		<link>/2018/04/01/new-malware-freezes-users-device-in-account-takeover-scheme/</link>
					<comments>/2018/04/01/new-malware-freezes-users-device-in-account-takeover-scheme/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Sun, 01 Apr 2018 09:41:05 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[payment source]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=450</guid>

					<description><![CDATA[The one thing more valuable to consumers than their bank accounts might be their internet access — and a new version of the ‘Trickbot’ trojan targets both. Read more on Payment Source. (Note: subscription wall.)]]></description>
										<content:encoded><![CDATA[<p>The one thing more valuable to consumers than their bank accounts might be their internet access — and a new version of the ‘Trickbot’ trojan targets both.<br />
Read more on <a href="https://www.paymentssource.com/news/new-malware-freezes-users-device-in-account-takeover-scheme">Payment Source</a>. (Note: subscription wall.)</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/04/01/new-malware-freezes-users-device-in-account-takeover-scheme/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
