Malware

Remove Lohodf Ransomware screenshot

Remove Lohodf Ransomware

File-encryption Trojans are a type of computer threat, which can cause long-lasting damage to the system and, in particular, your files. Unfortunately, once ransomware has attacked your computer, removing it might not... Read more

May 7, 2021
Chinese APT May be Behind the Newly Discovered Moriya Rootkit screenshot

Chinese APT May be Behind the Newly Discovered Moriya Rootkit

The Moriya Rootkit is a newly identified threat that, however, might have been working for a long time before it was finally discovered. Rootkits like this one are designed to plant themselves deep into the operating... Read more

May 7, 2021
Panda Stealer Targets Cryptocurrency Wallets and Web Browsers screenshot

Panda Stealer Targets Cryptocurrency Wallets and Web Browsers

The potential profits that cryptocurrency investments can bring have attracted millions of investors from around the world, and, unfortunately, many of them are likely to become the targets of scammers and... Read more

May 6, 2021
How to Remove DOUBLEDRAG screenshot

How to Remove DOUBLEDRAG

The DOUBLEDRAG Malware was first spotted in a large-scale attack campaign, which targeted multiple industries, spread around the entire world. While the majority of the attacks were concentrated in the United States,... Read more

May 5, 2021
How to Remove DOUBLEDROP screenshot

How to Remove DOUBLEDROP

Advanced cybercrime groups rarely rely on a single malware family to carry out their attack – typically, they develop a set of hacking tools that would eventually support each other to ensure a swift, silent, and... Read more

May 5, 2021
How to Remove DOUBLEBACK screenshot

How to Remove DOUBLEBACK

DOUBLEBACK is a dangerous backdoor Trojan used and developed by an uncategorized threat actor tracked under the alias UNC2529. The criminals were involved in a large-scale cybercrime campaign that took place in... Read more

May 5, 2021
Pingback Malware Uses the IMCP Windows Service for Sneaky C2 Communication screenshot

Pingback Malware Uses the IMCP Windows Service for Sneaky C2 Communication

Malware researchers have identified a peculiar new malware family that targets Windows systems. It uses a popular trick known as DLL hijacking to fool the Windows operating system into running a maliciously modified... Read more

May 5, 2021
How to Remove the Zenar Miner screenshot

How to Remove the Zenar Miner

The Zenar Miner is a piece of commodity malware currently being sold on hacking forums. Despite its name, it is not exactly a miner that cybercriminals can use out-of-the-box – instead, it is meant to help them run a... Read more

May 3, 2021
Unknown Chinese APT Targets Russia with the PortDoor Malware screenshot

Unknown Chinese APT Targets Russia with the PortDoor Malware

Advanced Persistent Threat (APT) actors continue with their attacks against high-profile targets. This time, the news headlines mention a new piece of malware identified as PortDoor. It is believed to be used and... Read more

May 3, 2021
FakeChat Malware Steals Financial Data from Android Devices screenshot

FakeChat Malware Steals Financial Data from Android Devices

The FakeChat Malware is a dangerous banking Trojan seeking to compromise Android mobile devices. The malware was initially spread throughout Spain, but recent attack campaigns have reached other European countries... Read more

April 30, 2021
WeSteal Infostealer Sold Online by Inexperienced Malware Developers screenshot

WeSteal Infostealer Sold Online by Inexperienced Malware Developers

Public and private hacking forums are the favorite spot of both novice and experienced cybercriminals. Newbies over there can often spend around $50-$100 to get their hands on a personalized piece of malware, which... Read more

April 30, 2021
WeControl RAT is a Commodity Malware Linked to WeSteal Infostealer screenshot

WeControl RAT is a Commodity Malware Linked to WeSteal Infostealer

The WeControl RAT is a Remote Access Trojan (RAT,) which is being sold online via the official website of the developers, as well as through ads posted on various hacking forums. The good news is that WeControl RAT is... Read more

April 30, 2021
'web-browserify' Malware Mimics a Legitimate npm Package screenshot

'web-browserify' Malware Mimics a Legitimate npm Package

Cybercriminals often exploit legitimate resources in an attempt to amplify their attacks or the reach of their operations. One recent campaign has seen the use of this exact strategy. This time, the criminals targeted... Read more

April 30, 2021
Moserpass Malware Spread Through Supply-chain Attack Involving Popular Password Manager screenshot

Moserpass Malware Spread Through Supply-chain Attack Involving Popular Password Manager

Supply-chain attack campaigns are one of the most difficult and dangerous methods that cybercriminals use to propagate malware. These attacks are executed by compromising a legitimate software vendor's network, and... Read more

April 28, 2021
Sysrv-hello Botnet screenshot

Sysrv-hello Botnet

The Sysrv-hello Botnet is a malicious project, which has been tracked closely by cybersecurity researchers since December 2020. The criminals behind this campaign are aiming to install a cryptocurrency miner on... Read more

April 26, 2021
TEARDROP Malware screenshot

TEARDROP Malware

The TEARDROP Malware is identified as a basic Trojan Dropper, which was used by the cybercriminals behind the recent supply-chain attack linked to the SolarWinds software vendor. This campaign involved the use of a... Read more

April 26, 2021
Pareto Botnet Targets Internet-of-Things Devices screenshot

Pareto Botnet Targets Internet-of-Things Devices

Modern botnet creators rarely go after computers and, instead, they are looking into exploiting a far more widely spread piece of technology – Internet-of-things (IoT) devices. In short, IoT devices are pretty much... Read more

April 23, 2021
ToxicEye Malware Hides in Fake Hacking Tools Promoted via Telegram screenshot

ToxicEye Malware Hides in Fake Hacking Tools Promoted via Telegram

ToxicEye is a newly identified malware strain, which has the ability to take over compromised computers and provide attackers with access to features typical for Remote Access Trojans (RATs.) Instead of using a... Read more

April 23, 2021