Trojan

Trojan Al11 Malware Detection & Removal - An Essential Step for Victimized Computer Users
Trojan al11 Virus is a type of malware that poses a significant threat to your system's security. Malware developers often use Trojan Horse malware like Trojan al11 Virus for various purposes, making them extremely... Read more

PuaBundler May Cause Security and Privacy Issues on Your Computer
PuaBundler is a malicious program that can take over a user's computer by gaining administrative privileges and controlling all processes in the system. This Trojan horse can be used for various malicious activities,... Read more

Remote Access Trojan 'HiatusRAT' Targets Router Firmware
Researchers with Lumen Black Lotus Labs discovered a new malware campaign that they have named "Hiatus". This campaign targets business-grade routers, mainly the DrayTek Vigor models 2960 and 3900, which can support... Read more

Phonzy Trojan Could Load on Vulnerable PCs To Steal Data
The Phonzy trojan is a type of banking trojan that belongs to the family of trojan-stealers. This type of trojan has become increasingly common with the rise of online banking worldwide. As the name suggests, banking... Read more

Ekipa RAT Sold on Dark Web
Ekipa RAT is the name of a remote-access Trojan malicious tool. The malware was spotted when it was put up for sale on hacker forums. According to researchers, Ekipa has a scary range of possibilities, likely to match... Read more

Schoolyard Bully Trojan Steals Facebook Account Info
Researchers with Zimperium zLabs have uncovered an Android malware campaign referred to as the Schoolyard Bully Trojan, which has affected over 300,000 victims since 2018. The malicious apps making up the... Read more

Trojan:Script/Wacatac.H!ml Malware Detection
Our team has recently received requests for assistance from a number of web users who have fallen victim to a Trojan known as Trojan Script/Wacatac.h!ml. This particular Trojan is one of the latest versions of malware... Read more

Trojan.Malware.300983.Susgen Detection
Trojan.Malware.300983.Susgen is the name and designator of a heuristic detection. Trojan.Malware.300983.Susgen is intended as a designator for an unspecified Trojan horse malware detection. The detection does not... Read more

Colour-Blind RAT Wriggles Its Way Onto PyPI
A Python package named "colourfool" that was uploaded to PyPI has been discovered to contain a malicious information stealer and remote access trojan. Kroll's Cyber Threat Intelligence team identified the malware,... Read more

PY#RATION RAT Uses Unique C2 Approach - PC Users Beware!
Security researchers have identified a new cyber attack using a Python-based Remote Access Trojan (RAT) back in August 2022. According to Securonix, the malware, referred to as PY#RATION, is unique with its usage of... Read more

Demon Stealer Seeks Your Personal Information
Demon Stealer is a malicious Trojan horse infection that may present itself after it has performed many malevolent activates on an infected PC. The Demon Stealer threat may load without notifying the computer user and... Read more

What is Woreflint Trojan?
Woreflint is the detection name assigned to a malicious program that functions as a trojan horse. Detection names are not always the same thing as the actual payload and the Woreflint detection can signify a number of... Read more

Warning! Nexus Banking Trojan Can Steal 2FA Codes
A new Android banking Trojan called Nexus has been discovered, which has already been utilized by several cybercriminals to target approximately 450 financial apps and engage in fraudulent activities. Cleafy, an... Read more

Nexus Banking Trojan Linked to Older Sova Malware
The Android banking trojan, known as Nexus, has been identified by researchers at Cyble. The malware was found to be a rebranded version of the S.O.V.A. banking trojan and targets primarily banking and finance-related... Read more

MQsTTang Backdoor Targets IoT Devices Exploiting System Vulnerabilities
MQTTang Backdoor is a Trojan horse threat that targets Internet of Things (IoT) devices and uses the MQTT (Message Queuing Telemetry Transport) protocol as a means of communication with its command and control... Read more

What Does Ursu Trojan Do To Your Computer?
Ursu is a malicious Trojan that can be installed on your computer without your knowledge or permission. It often takes advantage of system vulnerabilities and security flaws, such as downloading software from... Read more

BreeZip Trojan Horse is Malware That Could Severely Damage Your PC
BreeZip is a Trojan horse malware that can severely damage computers, devices, and networks. BreeZip appears to be designed to infiltrate a system, steal data or take control of the device without the user's... Read more

KEYSTEAL Trojan Targets Macs To Steal Data
KEYSTEAL is the name of a Trojan malicious application. As the name suggests, KEYSTEAL is developed to steal information contained in a Mac's Keychain password storage. Keychain is a proprietary Apple password... Read more