Malware
Beware! Jackal Malware Becomes a Master at Manipulation
A notorious Advanced Persistent Threat (APT) group named GoldenJackal has recently developed a potent collection of .NET malware tools known as Jackal. This malicious toolset, comprising various components like... Read more
Horse Shell Malware Targets Wide Range of Routers
Check Point Research, a group of cybersecurity researchers, has discovered a hazardous Chinese malware capable of infecting your home or office router. Referred to as "Horse Shell," this backdoor enables malicious... Read more
What is Acwzmain.accde Malware?
Acwzmain.accde is a genuine file developed by Microsoft for Windows systems and is usually located in C:\Program Files (x86)\Microsoft Office\root\Office16\ACCWIZ\ACWZMAIN.ACCDE. However, certain trojans can... Read more
EvilExtractor Malware Seeks to Steal Data
EvilExtractor is a malicious tool that targets Windows operating systems to extract data and files from endpoint devices. Its modules operate through an FTP service and were developed by a company named Kodex, which... Read more
Beware of 'Estimate Speed Up' Rogue Optimization App
Estimate Speed Up is a program that falls under the category of potentially unwanted programs. This software claims to optimize your computer by scanning it for invalid entries, broken links, and other issues that... Read more
Rilide Stealer Targets the Chromium Platform
A new malware known as Rilide has been discovered, which targets Chromium-based web browsers. This malware disguises itself as a legitimate Google Drive extension to gather sensitive information and siphon... Read more
Why TurkoRat Remote Access Tool is Extremely Dangerous on Your Computer
In the realm of cybersecurity, new threats emerge regularly, targeting unsuspecting users and organizations alike. One such threat is TurkoRat, a versatile malware that functions as a Trojan horse, password-stealing... Read more
DownEx Malware Used in Espionage Campaign
A new type of malware called DownEx has been discovered by Romanian cybersecurity researchers. It is being used in a sophisticated espionage campaign that is targeting government organizations in Central Asia, with... Read more
LOBSHOT Malware Used in Malvertising Campaign
Earlier this year, Elastic Security Labs, in collaboration with the research community, detected a significant rise in the use of malvertising. Attackers utilized a sophisticated strategy of creating phony websites... Read more
SnowyAmber Malware Leveraged by Russian Cyberspies To Attack NATO & EU Organizations
In recent cybersecurity news sources, it was reported that Russian cyberspies had launched a new malware toolset, which they used to target NATO and European Union (EU) organizations. The malware toolset has been... Read more
'Global PC Cleaner Pro' Trips Up Malware Detections
Global PC Cleaner Pro is marketed as a software tool that is designed to optimize a computer's performance by cleaning up unnecessary files and programs that may slow down its speed. However, upon investigating this... Read more
Trojan:Win32/Casdet!rfn Malware Detection & Removal
Trojan:Win32/Occamy.C hacktool is a type of malware that often remains undetected on a user's device. While it may not show any obvious signs of its presence, the user may begin to notice changes in the performance of... Read more
Minas is a Multi-Stage Cryptominer Malware
Minas, a malicious software designed for cryptocurrency mining, is an insidious threat that exploits the XMRIG application, originally intended for legitimate Monero mining. This particular type of malware exerts... Read more
RoarBAT Malware Spotted by Ukrainian CERT
The Computer Emergency Response Team of Ukraine (CERT-UA) has reported an ongoing phishing campaign that uses invoice-themed lures to spread the SmokeLoader malware. The emails are sent from compromised accounts and... Read more
RustBucket Mac Malware Attributed to BlueNoroff Threat Actor
Jamf, a mobile device management company, has identified a new malware called RustBucket that is being used to target Apple devices. The malware is believed to be associated with the BlueNoroff advanced persistent... Read more
Balada Injector Malware Targets Websites Using WordPress
According to GoDaddy's Sucuri, a massive campaign named Balada Injector has infected more than one million WordPress websites with malware since 2017. The attackers use various methods and vulnerabilities to breach... Read more
CryptoClippy Malware Works as a Stealer
CryptoClippy is a form of malware that functions as a cryptocurrency clipper. Its main objective is to monitor the user's clipboard and detect instances where the user copies a cryptocurrency wallet address. Once... Read more
OpcJacker Malware Uses Fake VPN to Spread
Since the second half of 2022, cybersecurity experts have identified a new form of malware that steals information called OpcJacker. According to researchers from Trend Micro, this malware can perform a variety of... Read more