Malware

TinyTurla-NG Backdoor Uses Against Targets in Poland screenshot

TinyTurla-NG Backdoor Uses Against Targets in Poland

The threat actor Turla, associated with Russia, has been observed employing a new backdoor named TinyTurla-NG in a campaign spanning three months targeting Polish non-governmental organizations in December 2023.... Read more

February 19, 2024
Ov3r_Stealer Malware Spreads Fake Facebook Job Ads to Steal Personal Data screenshot

Ov3r_Stealer Malware Spreads Fake Facebook Job Ads to Steal Personal Data

Threat actors have devised a cunning scheme involving fake job ads on Facebook, using them as a gateway to deploy a newly discovered Windows-based stealer malware known as Ov3r_Stealer. Deceptive Tactics Unveiled The... Read more

February 7, 2024
GoStealer Malware Targets Indian Military screenshot

GoStealer Malware Targets Indian Military

A sophisticated cyber espionage incident targeting the Indian Air Force has been uncovered by security researchers. The cyberattack on the Indian Air Force involves a variant of the well-known Go Stealer, a malicious... Read more

January 19, 2024
PureLand Stealer screenshot

PureLand Stealer

PureLand is a type of stealer malware designed to target Mac devices with the intent of extracting information from infected systems. Specifically, it focuses on pilfering data from cryptocurrency wallets and other... Read more

January 17, 2024
FBot is a New Malicious Tool Targeting AWS screenshot

FBot is a New Malicious Tool Targeting AWS

A recently discovered hacking tool named FBot, developed in Python, is now targeting a range of online services including web servers, cloud platforms, content management systems, and software as a service platforms... Read more

January 12, 2024
Silver RAT Linked to Syrian Threat Actor screenshot

Silver RAT Linked to Syrian Threat Actor

A hacking group known as Anonymous Arabic has recently unleashed a new remote access trojan (RAT) named Silver RAT. This malware is designed to circumvent security software and discreetly initiate concealed... Read more

January 10, 2024
New HijackLoader Version Uses Advanced Threat Evasion screenshot

New HijackLoader Version Uses Advanced Threat Evasion

Threat actors capitalize on the potency of HijackLoader as a robust tool for embedding malicious code into legitimate processes, facilitating the discreet execution of payloads. This method enables them to bypass... Read more

February 15, 2024
Beware of the Bank Confirmation Email Scam screenshot

Beware of the Bank Confirmation Email Scam

The email scam, often titled "Payment Confirmation," lures recipients into believing they are receiving a bank confirmation related to a payment. However, the attached file, typically named "Payment Confirmation... Read more

February 6, 2024
SPICA Backdoor Linked to Russian Hacker Collective screenshot

SPICA Backdoor Linked to Russian Hacker Collective

The Threat Analysis Group (TAG) at Google revealed that the Russian hacking group COLDRIVER is engaged in credential phishing activities targeting prominent NGOs, former intelligence and military personnel, as well as... Read more

January 19, 2024
AndroxGh0st Botnet Comes Up in CISA's Radar screenshot

AndroxGh0st Botnet Comes Up in CISA's Radar

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation have issued a warning regarding the deployment of the AndroxGh0st malware by threat actors. These actors are... Read more

January 17, 2024
NoaBot - a New Malware Based on Mirai Code screenshot

NoaBot - a New Malware Based on Mirai Code

A recently emerged botnet named NoaBot, which is based on Mirai, has been employed by threat actors in a crypto mining campaign since the beginning of 2023. According to a report from security researcher Stiv Kupchik,... Read more

January 11, 2024
Rose Grabber Comes With Rich Malicious Toolkit screenshot

Rose Grabber Comes With Rich Malicious Toolkit

Rose is a type of malicious software known as a grabber, designed with the intent to pilfer sensitive information from a targeted system. This updated version of the Phorcy stealer exhibits the capability to extract... Read more

January 9, 2024
Troll Stealer Malware Threat Targets Korean Computer Users screenshot

Troll Stealer Malware Threat Targets Korean Computer Users

A recently discovered cyber threat has put Korean computer users at risk, as a sophisticated malware dubbed "Troll Stealer" has emerged, suspected to be orchestrated by the North Korea-linked nation-state actor,... Read more

February 8, 2024
Chinese Threat Actor Linked to NSPX30 Spyware screenshot

Chinese Threat Actor Linked to NSPX30 Spyware

A previously unknown threat actor with ties to China has been identified in a series of adversary-in-the-middle (AitM) attacks, where legitimate software update requests are exploited to deliver an advanced implant... Read more

January 26, 2024
Bigpanzi Botnet Infects Hundreds of Thousands of Android Devices screenshot

Bigpanzi Botnet Infects Hundreds of Thousands of Android Devices

Security experts have attributed a Distributed Denial of Service (DDoS) botnet, potentially affecting millions of smart TVs and set-top boxes, to an established cybercrime group known as Bigpanzi, active for eight... Read more

January 18, 2024
Snackarcin Antivirus Detection screenshot

Snackarcin Antivirus Detection

The notification regarding PUAIDManager:Win32/Snackarcin indicates a problem with your computer that requires attention. Ignoring it may result in severe consequences. Snackarcin is a malicious application designed to... Read more

January 16, 2024
Atrioc Trojan Malware screenshot

Atrioc Trojan Malware

The Atrioc Virus App is a Trojan that silently enters systems, employing advanced techniques to acquire sensitive data. It evades standard security measures, discreetly gathering personal information and login... Read more

January 10, 2024
Atructis Malware screenshot

Atructis Malware

The Atructis malicious app is a cunning Trojan that seeks to quietly infiltrate systems, utilizing sophisticated methods to exfiltrate sensitive data. It may evade conventional security measures, clandestinely... Read more

January 5, 2024
Loading...