<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>trojan &#8211; Martijn Grooten</title>
	<atom:link href="/tag/trojan/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Lapsed Ordinary</description>
	<lastBuildDate>Fri, 06 Jul 2018 12:00:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Phishing campaign has an extra payload for business networks</title>
		<link>/2018/07/06/phishing-campaign-has-an-extra-payload-for-business-networks/</link>
					<comments>/2018/07/06/phishing-campaign-has-an-extra-payload-for-business-networks/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Fri, 06 Jul 2018 12:00:11 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[lateral movement]]></category>
		<category><![CDATA[payment source]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[smb]]></category>
		<category><![CDATA[trickbot]]></category>
		<category><![CDATA[trojan]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=475</guid>

					<description><![CDATA[A new malicious spam campaign that has been targeting Internet users in the U.K. serves as an important example of how banking malware targets business as well as home users. Read more on Payment Source. (Note: subscription wall.)]]></description>
										<content:encoded><![CDATA[<p>A new malicious spam campaign that has been targeting Internet users in the U.K. serves as an important example of how banking malware targets business as well as home users.<br />
Read more on <a href="https://www.paymentssource.com/news/phishing-campaign-has-an-extra-payload-for-business-networks">Payment Source</a>. (Note: subscription wall.)</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/07/06/phishing-campaign-has-an-extra-payload-for-business-networks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MnuBot banking trojan communicates via SQL server</title>
		<link>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/</link>
					<comments>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/#respond</comments>
		
		<dc:creator><![CDATA[Martijn]]></dc:creator>
		<pubDate>Wed, 30 May 2018 09:34:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[banking]]></category>
		<category><![CDATA[brazil]]></category>
		<category><![CDATA[ibm]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[mnubot]]></category>
		<category><![CDATA[sql server]]></category>
		<category><![CDATA[trojan]]></category>
		<category><![CDATA[virus bulletin]]></category>
		<category><![CDATA[x-force]]></category>
		<guid isPermaLink="false">https://www.lapsedordinary.net/?p=440</guid>

					<description><![CDATA[Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication. Read more on Virus Bulletin&#8217;s blog.]]></description>
										<content:encoded><![CDATA[<p>Researchers at IBM X-Force have discovered MnuBot, a banking trojan targeting users in Brazil, which is noteworthy for using SQL Server for command and control communication.<br />
Read more on <a href="https://www.virusbulletin.com/blog/2018/05/mnubot-banking-trojan-communicates-sql-server/">Virus Bulletin&#8217;s blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/2018/05/30/mnubot-banking-trojan-communicates-via-sql-server/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
