Malware

Wise XMRig Cryptominer Malware screenshot

Wise XMRig Cryptominer Malware

Wise XMRig is the name of a malicious tool of the Trojan horse variety. The way Trojan horses work is by quietly infiltrating the victim's system and then allowing the Trojan author nearly unlimited access to the host... Read more

October 22, 2021
DoppelDridex Used by Financially-motivated Actors screenshot

DoppelDridex Used by Financially-motivated Actors

DoppelDridex is a peculiar malware sample, which is being actively spread through several phishing campaigns. The criminals are using a modified version of the Dridex Malware to deploy additional payloads – such as... Read more

September 30, 2021
What is the 'Eicar Test File' and How to Remove it screenshot

What is the 'Eicar Test File' and How to Remove it

The 'Eicar Test File' is a component that many users are not familiar with. You may first encounter it when your firewall or another security product alerts you of its presence. Of course, this does not sound good –... Read more

September 21, 2021
FIN7 Hackers Use the PILLOWMINT Malware to Scrape Card Data screenshot

FIN7 Hackers Use the PILLOWMINT Malware to Scrape Card Data

The FIN7 hacking group is one of the most renowned financially motivated actors. They are the hackers responsible for the development and use of the one of the most dangerous banking Trojans, Carbanak. Of course, the... Read more

September 2, 2021
Remove Roblox Virus screenshot

Remove Roblox Virus

The Roblox Virus is a very generic term, which people often search for online when they encounter an issue with Roblox-related software. While Roblox itself is very safe, there are some 3rd-party tools, which might... Read more

August 17, 2021
Remove Great Discover screenshot

Remove Great Discover

Great Discover is a fake Windows application, which is typically installed without the user's approval. It is not the product of an official software publisher, and you will not find any official information regarding... Read more

July 29, 2021
FontOnLink Linux Malware Has Been Active Since May screenshot

FontOnLink Linux Malware Has Been Active Since May

Linux malware is a fairly rare sight when talking about cybersecurity. However, there are multiple Advanced Persistent Threat (APT) actors specializing in the development of malware for Linux. One of the latest... Read more

October 8, 2021
TinyTurla Backdoor, a State-sponsored Turla APT Malware, Hits Germany & the U.S. screenshot

TinyTurla Backdoor, a State-sponsored Turla APT Malware, Hits Germany & the U.S.

The Turla Advanced Persistent Threat (APT) group continues to be one of the most notorious, state-sponsored Russian hackers. They have been active in the hacking scene for nearly a decade, and they are constantly... Read more

September 22, 2021
Capoae Malware Targets Web Servers and WordPress screenshot

Capoae Malware Targets Web Servers and WordPress

Cybercriminals are continuing to actively experiment with malware that uses the Golang programming language. This approach has multiple advantages, but there are two main ones that make it so attractive to... Read more

September 17, 2021
WaterDrop Malware, based on the PRISM Backdoor, Infect Linux Systems screenshot

WaterDrop Malware, based on the PRISM Backdoor, Infect Linux Systems

While Windows continues to be the number one operating system that cybercriminals target, Linux malware is becoming a more common occurrence. One of the notable pieces of malware meant to run on Linux is the Prism... Read more

August 25, 2021
SHurk Steal, an Infostealer, Rented Out by Malware Developers screenshot

SHurk Steal, an Infostealer, Rented Out by Malware Developers

SHurk Steal is a malicious application whose creators are renting it out to likeminded criminals. Unfortunately, it seems very likely that SHurk Steal may attract a lot of attention from the hacking community. Its... Read more

August 11, 2021
LemonCat Malware Executes Devastating Attacks, Carries the Ramnit Trojan screenshot

LemonCat Malware Executes Devastating Attacks, Carries the Ramnit Trojan

The Lemon Duck Malware has been around since 2019. It is still known for being part of one of the largest cryptojacking campaigns in recent years and, unfortunately, it seems like the criminals behind it are not... Read more

July 26, 2021
Debug.exe Crypto Miner screenshot

Debug.exe Crypto Miner

Debug.exe is the file name of what could potentially be a malicious cryptocurrency miner. Obviously, debug.exe may also be the name of a legitimate application, but if you find it always running on your system,... Read more

October 7, 2021
BlueStealer Malware Targets Cookies, Passwords, and Cryptocurrency Wallets screenshot

BlueStealer Malware Targets Cookies, Passwords, and Cryptocurrency Wallets

The BluStealer Malware is an information stealer whose activity increased rapidly in mid-September, infecting over 6,000 users in a single day. The criminals behind this project are propagating it through the use of... Read more

September 22, 2021
PRIVATELOG Malware Hides in the Windows Common Log File System screenshot

PRIVATELOG Malware Hides in the Windows Common Log File System

High-profile threat actors often experiment with new mechanics and strategies to plant malware into places that antivirus tools will not check. The PRIVATELOG Malware is one of the latest samples to utilize an... Read more

September 8, 2021
HolesWarm Malware Goes After Windows and Linux, Mines Monero screenshot

HolesWarm Malware Goes After Windows and Linux, Mines Monero

The HolesWarm Malware infiltrates Windows and Linux systems in order to harvest their hardware resources for cryptocurrency mining. Such attacks are often difficult to spot because the cryptocurrency miners take extra... Read more

August 19, 2021
Meteor Wiper Malware Hits Iranian Railways screenshot

Meteor Wiper Malware Hits Iranian Railways

In recent years we have seen a massive change in the way cybercriminals operate. Instead of using destructive malware, they have focused on developing complicated extortion schemes or high-quality malware that steals... Read more

July 30, 2021
Activity of the Taurus Loader Continues to Increase, Delivers Other Malware screenshot

Activity of the Taurus Loader Continues to Increase, Delivers Other Malware

The cybercrime gang behind the Taurus Stealer is involved in the development and usage of other, less-known malware families. One of these is the Taurus Loader. It has been around for over a year, and it still... Read more

July 26, 2021