Trojan

ValleyRAT Seeks Vulnerable Computers to Give Remote Access to Hackers screenshot

ValleyRAT Seeks Vulnerable Computers to Give Remote Access to Hackers

ValleyRAT is a newly discovered malware that has become a concern within the cybersecurity community. This article explores what ValleyRAT is, its capabilities, potential damage, and how it infiltrates computers.... Read more

September 22, 2023
What is Shafmia Malware? screenshot

What is Shafmia Malware?

Trojan.Shafmia.A poses a significant threat to your device, carrying the potential for extensive harm, including file theft, alteration, and erasure. Moreover, it grants unauthorized access to sensitive information... Read more

July 20, 2023
Why TurkoRat Remote Access Tool is Extremely Dangerous on Your Computer screenshot

Why TurkoRat Remote Access Tool is Extremely Dangerous on Your Computer

In the realm of cybersecurity, new threats emerge regularly, targeting unsuspecting users and organizations alike. One such threat is TurkoRat, a versatile malware that functions as a Trojan horse, password-stealing... Read more

May 24, 2023
Oneetx.exe Trojan Horse May Expose Your PC To Other Malware Infections screenshot

Oneetx.exe Trojan Horse May Expose Your PC To Other Malware Infections

Identifying a Trojan such as Oneetx.exe can be a challenging task for users as they often remain undetected until they have executed their malicious activity. This is the reason why Trojans have a high success rate,... Read more

April 12, 2023
Warning! Nexus Banking Trojan Can Steal 2FA Codes screenshot

Warning! Nexus Banking Trojan Can Steal 2FA Codes

A new Android banking Trojan called Nexus has been discovered, which has already been utilized by several cybercriminals to target approximately 450 financial apps and engage in fraudulent activities. Cleafy, an... Read more

March 24, 2023
Nexus Banking Trojan Linked to Older Sova Malware screenshot

Nexus Banking Trojan Linked to Older Sova Malware

The Android banking trojan, known as Nexus, has been identified by researchers at Cyble. The malware was found to be a rebranded version of the S.O.V.A. banking trojan and targets primarily banking and finance-related... Read more

March 14, 2023
AIRAVAT RAT Sneaks Onto Android Devices screenshot

AIRAVAT RAT Sneaks Onto Android Devices

AIRAVAT is a Remote Access Trojan (RAT) designed to target Android devices. This type of malware operates by allowing remote access and control over the compromised devices. AIRAVAT encompasses a wide range of harmful... Read more

September 14, 2023
What is Doplik Malware? screenshot

What is Doplik Malware?

Doplik, a dangerous Trojan Clicker, is a name that signifies its ability to hijack your clicks for malicious purposes. Being a Trojan Horse, Doplik is also capable of gathering various types of information from your... Read more

June 27, 2023
Computer Security Experts Discover NodeStealer Malware Designed To Steal Sensitive Data From an Infected PC screenshot

Computer Security Experts Discover NodeStealer Malware Designed To Steal Sensitive Data From an Infected PC

NodeStealer is a dangerous Trojan horse malware that is designed to steal sensitive information from infected systems. This malware is particularly harmful because it can remain undetected for extended periods of... Read more

May 8, 2023
Trojan Al11 Malware Detection & Removal - An Essential Step for Victimized Computer Users screenshot

Trojan Al11 Malware Detection & Removal - An Essential Step for Victimized Computer Users

Trojan al11 Virus is a type of malware that poses a significant threat to your system's security. Malware developers often use Trojan Horse malware like Trojan al11 Virus for various purposes, making them extremely... Read more

March 29, 2023
PuaBundler May Cause Security and Privacy Issues on Your Computer screenshot

PuaBundler May Cause Security and Privacy Issues on Your Computer

PuaBundler is a malicious program that can take over a user's computer by gaining administrative privileges and controlling all processes in the system. This Trojan horse can be used for various malicious activities,... Read more

March 22, 2023
Remote Access Trojan 'HiatusRAT' Targets Router Firmware screenshot

Remote Access Trojan 'HiatusRAT' Targets Router Firmware

Researchers with Lumen Black Lotus Labs discovered a new malware campaign that they have named "Hiatus". This campaign targets business-grade routers, mainly the DrayTek Vigor models 2960 and 3900, which can support... Read more

March 7, 2023
XWorm RAT Malware Could Steal Your PC Data screenshot

XWorm RAT Malware Could Steal Your PC Data

XWorm is a highly dangerous and malicious remote administration/access Trojan (RAT) used by cybercriminals to gain unauthorized access and control over victims' computers. As a RAT, it allows attackers to remotely... Read more

August 4, 2023
What is the Dispout Trojan? screenshot

What is the Dispout Trojan?

Trojan malware is a highly perilous form of malicious software that frequently masquerades as legitimate or harmless files or programs, aiming to deceive users and attain unauthorized entry into their systems. Despite... Read more

June 9, 2023
Beware! AuKill Malware May Secretly Load On Your PC To Gain Remote Access screenshot

Beware! AuKill Malware May Secretly Load On Your PC To Gain Remote Access

AuKill malware, also known as AutoKill Trojan, is a malicious program that belongs to the Trojan horse category. It is designed to silently infiltrate a victim's computer system and perform various malicious... Read more

May 8, 2023
Trojan:Script/Wacatac.H!ml Malware Detection screenshot

Trojan:Script/Wacatac.H!ml Malware Detection

Our team has recently received requests for assistance from a number of web users who have fallen victim to a Trojan known as Trojan Script/Wacatac.h!ml. This particular Trojan is one of the latest versions of malware... Read more

March 28, 2023
Trojan.Malware.300983.Susgen Detection screenshot

Trojan.Malware.300983.Susgen Detection

Trojan.Malware.300983.Susgen is the name and designator of a heuristic detection. Trojan.Malware.300983.Susgen is intended as a designator for an unspecified Trojan horse malware detection. The detection does not... Read more

March 16, 2023
Colour-Blind RAT Wriggles Its Way Onto PyPI screenshot

Colour-Blind RAT Wriggles Its Way Onto PyPI

A Python package named "colourfool" that was uploaded to PyPI has been discovered to contain a malicious information stealer and remote access trojan. Kroll's Cyber Threat Intelligence team identified the malware,... Read more

March 6, 2023
Loading...