Juniper Threat Labs has been monitoring a campaign that pushes a new IcedID banking trojan. This new campaign changes tactics by injecting into msiexec.exe to conceal itself and use
![IoT botnet exploiting TVT Shenzhen DVRs still lingers](https://blogs.juniper.net/wp-content/uploads/2020/03/GettyImages-482550134-2-1-1024x684.png)
Juniper Threat Labs has been monitoring an IoT botnet that has been active in the wild since October 2, 2019. It exploits a vulnerability in Shenzhen TVT DVR NVMS-9000. The
![Breadsecurity looking to make some dough off your router](https://blogs.juniper.net/wp-content/uploads/2020/03/Screen-Shot-2020-03-20-at-12.00.20-PM.png)
Earlier in February, Juniper Threat Labs started to see a variant of Mirai attacks with an attempt to download a MIPS executable file to SOHO routers. We have seen Huawei
![Dota3: Is your Internet of Things device moonlighting?](https://blogs.juniper.net/wp-content/uploads/2020/02/Dota3-1.png)
Dissecting the evolution of malware gives researchers insights into the knowledge of, and development processes used by, malware authors. Dota3, active in the wild, offers a unique opportunity to examine
![GoMiner Mutates and Spreads via Public Cloud Storage Providers](https://blogs.juniper.net/wp-content/uploads/2020/01/GoMiner-1.png)
Juniper Threat Labs discovered a family of Monero Miners that spreads through cloud storage providers such as OneDrive, Google Drive and Dropbox. It also has the ability to mutate or
![MageCart Skims Credit Cards from FocusCamera.com](https://blogs.juniper.net/wp-content/uploads/2020/01/Magecart-Anchor-Image.jpg)
Late in December 2019, someone I know received a notification from their credit card company stating a transaction for a purchase of substantial value was pending. Not recognizing the transaction,
![Stalking Stalkerware: A Deep Dive Into FlexiSPY](https://blogs.juniper.net/wp-content/uploads/2020/01/Threat-Research-16182936.jpg)
In October, the FTC announced it had reached a settlement effectively shutting down Retina-X Studios, maker of MobileSpy, PhoneSheriff and TeenShield. According to the FTC: “Retina-X did not make sure
![CVE-2019-3398: Atlassian Confluence Download Attachments Remote Code Execution](https://blogs.juniper.net/wp-content/uploads/2020/01/IMAGE_1-20483iB30EA889AD24C962.png)
Atlassian Confluence is a collaboration tool that is used by organizations to create and share various documents related to marketing, design specifications, project planning, etc. It can be licensed both
![Growing attacks using Accept-Charset exploit](https://blogs.juniper.net/wp-content/uploads/2020/05/Threat-Research_v4_color.png)
Juniper Threat Labs is seeing a growing attack on Accept-Charset HTTP Header. This request header allows the client to indicate what character sets, i.e., ISO-8859-1 or utf-8, are available for
![How to defend against every day IOT threats](https://blogs.juniper.net/wp-content/uploads/2020/01/IMAGE_1-20293iCEF89E2E69511547.jpg)
“Alexa, can you tell me which of my Internet of Things devices are vulnerable to an attack?” Echo: “Hmmm, I don’t know that one.” “Alexa, can anyone access my camera