Trojan

Coper Android Trojan Strikes Colombian Users screenshot

Coper Android Trojan Strikes Colombian Users

Coper is a newly identified threat, which appears to have features typical for banking Trojans. It goes after Android mobile devices exclusively, and it is able to target a wide range of financial institutions. Its... Read more

July 23, 2021
MosaicLoader Spreads RATs and Infostealers screenshot

MosaicLoader Spreads RATs and Infostealers

Malware researchers have identified a new strain of malware, which goes under the name MosaicLoader. The threat is able to distribute additional payloads to its victims, and it has been typically used in combination... Read more

July 21, 2021
BIOPASS RAT Spread Through Compromised Gambling Sites screenshot

BIOPASS RAT Spread Through Compromised Gambling Sites

An unknown threat actor is using a new Python-based payload to target users of Chinese gambling sites. The malware is being spread via fraudulent messages and pop-ups, which show up on legitimate gambling sites – this... Read more

July 13, 2021
ReverseRat, a Pakistani Trojan Targeting Indian Entities screenshot

ReverseRat, a Pakistani Trojan Targeting Indian Entities

The cyber warfare between India and Pakistan continues. This time, an unknown Pakistani threat actor has been using a new malware, called ReverseRat, to compromise the network security of India-based power companies.... Read more

July 6, 2021
RustyBuer, a Reworked Version of the Buer Trojan screenshot

RustyBuer, a Reworked Version of the Buer Trojan

The Buer downloader is a dangerous Trojan whose activity dates back to the end of 2020. Its creators use it to propagate different pieces of malware such as banking Trojans, ransomware, and information stealer.... Read more

July 1, 2021
What is the 'Wup.exe' Process? screenshot

What is the 'Wup.exe' Process?

One of the first thing that tech-savvy users do when they experience performance issues is to check the Task Manager. This essential Windows tool reveals a lot about the way your computer's resources are being used.... Read more

June 28, 2021
PYSA Gang Employs the ChaChi Trojan to Deliver Ransomware screenshot

PYSA Gang Employs the ChaChi Trojan to Deliver Ransomware

Ransomware gangs often rely on a wide range of malware families to gain complete control over infected systems, as well as to spread laterally across entire networks. One of the ransomware gangs to recently introduce... Read more

June 25, 2021
Reworked JSSLoader Delivers the Carbanak Trojan screenshot

Reworked JSSLoader Delivers the Carbanak Trojan

Refactoring code is a popular technique that software developers use to, in layman's terms, modify the internal structure of their program without changing its behavior at all. Malware developers also employ such... Read more

June 25, 2021
PJobRAT Used Against Indian Military Personnel screenshot

PJobRAT Used Against Indian Military Personnel

PJobRAT, a Remote Access Trojan (RAT,) was recently seen being used in an ongoing campaign against Indian military personnel. The highly targeted attack has been active since January, and the criminals are abusing... Read more

June 22, 2021
Financially-motivated Threat Actors Use the Klingon RAT screenshot

Financially-motivated Threat Actors Use the Klingon RAT

Cybercriminals and malware developers experiment with all sorts of tricks and innovations to try and make their implants or operations more difficult to spot. Over the past three years, there has been an influx of... Read more

June 22, 2021
Remove Turian Backdoor screenshot

Remove Turian Backdoor

The Turian Backdoor is the primary implant used by a newly identified Advanced Persistent Threat (APT), the  that targets diplomatic entities in Africa and the Middle East. On top of the political targets, the... Read more

June 11, 2021
Remove FatalRAT screenshot

Remove FatalRAT

Remote Access Trojans (RATs) are one of the top tools in the arsenal of cybercriminals. They usually pack a wide range of features, which could enable the operator of the malware to spy on victims, steal data, modify... Read more

May 26, 2021
Remove Wacatac screenshot

Remove Wacatac

The Wacatac Trojan is a threat commonly reported by popular antivirus software. The good news is that seeing the Wacatac Trojan warning by your antivirus app may not always mean that there is a serious infection to be... Read more

May 19, 2021
Bizarro Banking Trojan Looks for Victims in Latin America and Europe screenshot

Bizarro Banking Trojan Looks for Victims in Latin America and Europe

Bizarro Banking Trojan, sometimes called Bizzaro, is a threat, which first emerged in South America. However, just after a few months of activity in the region, its operators opted to expand their operation by going... Read more

May 18, 2021
FIN7 Cybercrime Gang Returns with the Lizar Backdoor screenshot

FIN7 Cybercrime Gang Returns with the Lizar Backdoor

The hackers from the FIN7 cybercrime gang are best-known for their involvement in the development and usage of the Carbanak Trojan, one of the most notorious banking Trojans to be released online. Just like other... Read more

May 17, 2021
FakeChat Malware Steals Financial Data from Android Devices screenshot

FakeChat Malware Steals Financial Data from Android Devices

The FakeChat Malware is a dangerous banking Trojan seeking to compromise Android mobile devices. The malware was initially spread throughout Spain, but recent attack campaigns have reached other European countries... Read more

April 30, 2021
WeControl RAT is a Commodity Malware Linked to WeSteal Infostealer screenshot

WeControl RAT is a Commodity Malware Linked to WeSteal Infostealer

The WeControl RAT is a Remote Access Trojan (RAT,) which is being sold online via the official website of the developers, as well as through ads posted on various hacking forums. The good news is that WeControl RAT is... Read more

April 30, 2021
RotaJakiro Trojan Targets Linux Systems screenshot

RotaJakiro Trojan Targets Linux Systems

The RotaJakiro Trojan is a Linux-compatible piece of malware whose creators have paid extra attention to making their payload as difficult to analyze as possible. While many malware developers tend to pay attention to... Read more

April 29, 2021