Happy New Year. It’s Steve Bassi here, the founder and CEO of PolySwarm.
“Quttera's unique and patented malware detection engine analyzes the bytes of information and weighs the parts of it that are suspicious. Quttera's technology is continuously enhanced with the security intelligence harvested from automated scanning of hundreds of thousands of websites worldwide. Self-learning and non-signature-based mechanisms incorporated into the core of the Quttera’s technology enables identification of the unknown (0-day) malware while improving the detection quality and precision of the malware scanning. We are happy to join forces with PolySwarm along with other top security vendors across the globe to deliver the best tools and services to fight cybercrime.” - Michael Novofastovsky, co-founder and CTO at Quttera
Today, PolySwarm, a threat intelligence platform used to detect new and emerging malware, releases information about a new variant of ZeroCleare (a destructive malware attributed to Iran). PolySwarm Community (free) and Enterprise users were able access to the full content of this sample before it appeared on VirusTotal.
Cybercriminals behind Emotet, one of the most prolific botnets in recent history, have ramped up a new Christmas-themed phishing attack. It lures victims to download malicious attachments related to "menus" for an upcoming Christmas party.
[Updated November 27, 2019]:
Emotet is a banking Trojan that was first identified by security researchers in 2014. Emotet was first designed as a banking malware that attempted to sneak onto computers and steal sensitive and private information. It has evolved over the last several years from a basic threat, and morphed into a customizable modular package and has been seen deploying additional payloads against financial institutions, enterprises, and consumers across the globe.
Ginp is a banking Trojan that is actively being used to impersonate targeted banking apps. The malware brings up a screen on the victims phone and displays a window that mimics the real banking app. First, one is prompted to login with their credentials. The second screen steals the victim's credit card details.
FOR IMMEDIATE RELEASE