Trojan

nccTrojan Used by TA428 Threat Actor
A recent report published by security researchers with Kaspersky ICS CERT details a series of attacks against military sector entities located in Eastern Europe and Afghanistan. The report was published in August 2022... Read more

ApolloRAT Uses Multiple Tricks to Evade Detection
ApolloRAT is the name of a newly discovered remote access trojan. ApolloRAT is originally written in Python, but it also uses several tricks to make detection more difficult. ApolloRAT makes use of a source-to-source... Read more

PingPull Malware
Security researchers with Palo Alto's Unit 42 discovered and analyzed a new strain of malware called PingPull. The new malware has RAT capabilities and is particularly difficult to detect. PingPull is the newest tool... Read more

What is PowerShell RAT and How To Remove It
PowerShell RAT is the rather generic name for a newly discovered remote access trojan. The malicious tool can execute PowerShell commands that can compromise the target system. The PowerShell RAT is primarily... Read more

Borat RAT is an Impressive Trojan Being Sold on Forums
The name Borat RAT might sound like a joke based on the infamous movie character, but the truth is that this Remote Access Trojan (RAT) is not a threat to be underestimated. It packs a rich number of features that... Read more

Gh0stCringe RAT Sets Its Sights on SQL Servers
The Gh0stCringe RAT, also known as CirenegRAT, is a Remote Access Trojan (RAT) that was discovered on hundreds of database servers around the world. The primary purpose of the RAT is to exfiltrate sensitive data from... Read more

Woody RAT Can Exfiltrate Data
Woody RAT is the name of a newly discovered piece of malware that exhibits a wide range of malicious capabilities. As the name suggests, Woody is a remote access Trojan or a RAT. This sort of malicious tool is usually... Read more

What is the Xlm.trojan.abracadabra.8.gen Trojan?
The name Xlm.trojan.abracadabra.8.gen is the designator and detection name given to a version of the Abracadabra Trojan. This particular strain has been around for a few years now, first detected in mid-2020. The... Read more

Altruistics Trojan
Altruistics is the unusual name of a piece of malware that exhibits the features and functionality of a Trojan horse. Altruistics is distributed through several methods, including malicious spam emails containing a... Read more

Remove Eagle Monitor RAT
Eagle Monitor RAT is a malicious software suite, which is meant to enable cybercriminals to gain unsupervised access to infected systems. However, they can only get this if their victim launches the Eagle Monitor RAT... Read more

How to Remove the bloom.exe Miner
bloom.exe is a suspicious process, which some Windows users are searching for online, trying to find more information about what it does. Our research shows that bloom.exe is not associated with reputable software or... Read more

RuRAT Trojan Delivered Through Fake Vuxner Chat App
Cybercriminals are often very creative when it comes to propagating the latest malware to their victims. One of the latest samples of this is the RuRAT, which is being spread through the use of a fake messaging... Read more

Health.exe Acts as a Cryptomining Trojan
Health.exe is the name of a file that has been identified as malicious. The malware acts as a cryptocurrency mining Trojan. Cryptomining Trojans or cryptojacking malware, as they are sometimes called, are malicious... Read more

Themida Trojan
Themida is the name of a generic Trojan detection, used by a number of security suites. The file analyzed in this specific instance is called "Disclosing.exe" and can be distributed using all the usual methods used to... Read more

Beware! New ZxxZ Trojan Used by Bitter APT
Security researchers have been tracking an ongoing malicious campaign targeting entities located in Bangladesh. The campaign has been in progress since the second half of last year and makes use of a new Trojan dubbed... Read more

The OldGremlin Ransomware Gang Seeks Victim with the TinyFluff Backdoor
Advanced Persistent Threat (APT) actors do not always show remarkable activities. Some of them prefer to go after a few, highly-targeted attacks that could yield immense returns if executed successfully. This is the... Read more

Serpent Trojan Targets French Users and Institutions
The Serpent Backdoor Trojan is a piece of malware, which was recently observed attacking companies and institutions based in France. The criminals were approaching their victims through phishing emails, which were... Read more

S-400 RAT Rented Out on Hacking Forums
Remote Access Trojans (RATs) are exceptionally dangerous piece of malware, which could cause massive trouble for infected victims. The S-400 RAT is one of the latest malware pieces of this type and, unfortunately, it... Read more