Trojan

nccTrojan Used by TA428 Threat Actor screenshot

nccTrojan Used by TA428 Threat Actor

A recent report published by security researchers with Kaspersky ICS CERT details a series of attacks against military sector entities located in Eastern Europe and Afghanistan. The report was published in August 2022... Read more

August 9, 2022
ApolloRAT Uses Multiple Tricks to Evade Detection screenshot

ApolloRAT Uses Multiple Tricks to Evade Detection

ApolloRAT is the name of a newly discovered remote access trojan. ApolloRAT is originally written in Python, but it also uses several tricks to make detection more difficult. ApolloRAT makes use of a source-to-source... Read more

July 19, 2022
PingPull Malware screenshot

PingPull Malware

Security researchers with Palo Alto's Unit 42 discovered and analyzed a new strain of malware called PingPull. The new malware has RAT capabilities and is particularly difficult to detect. PingPull is the newest tool... Read more

June 16, 2022
What is PowerShell RAT and How To Remove It screenshot

What is PowerShell RAT and How To Remove It

PowerShell RAT is the rather generic name for a newly discovered remote access trojan. The malicious tool can execute PowerShell commands that can compromise the target system. The PowerShell RAT is primarily... Read more

May 18, 2022
Borat RAT is an Impressive Trojan Being Sold on Forums screenshot

Borat RAT is an Impressive Trojan Being Sold on Forums

The name Borat RAT might sound like a joke based on the infamous movie character, but the truth is that this Remote Access Trojan (RAT) is not a threat to be underestimated. It packs a rich number of features that... Read more

April 5, 2022
Gh0stCringe RAT Sets Its Sights on SQL Servers screenshot

Gh0stCringe RAT Sets Its Sights on SQL Servers

The Gh0stCringe RAT, also known as CirenegRAT, is a Remote Access Trojan (RAT) that was discovered on hundreds of database servers around the world. The primary purpose of the RAT is to exfiltrate sensitive data from... Read more

March 21, 2022
Woody RAT Can Exfiltrate Data screenshot

Woody RAT Can Exfiltrate Data

Woody RAT is the name of a newly discovered piece of malware that exhibits a wide range of malicious capabilities. As the name suggests, Woody is a remote access Trojan or a RAT. This sort of malicious tool is usually... Read more

August 8, 2022
What is the Xlm.trojan.abracadabra.8.gen Trojan? screenshot

What is the Xlm.trojan.abracadabra.8.gen Trojan?

The name Xlm.trojan.abracadabra.8.gen is the designator and detection name given to a version of the Abracadabra Trojan. This particular strain has been around for a few years now, first detected in mid-2020. The... Read more

July 6, 2022
Altruistics Trojan screenshot

Altruistics Trojan

Altruistics is the unusual name of a piece of malware that exhibits the features and functionality of a Trojan horse. Altruistics is distributed through several methods, including malicious spam emails containing a... Read more

June 14, 2022
Remove Eagle Monitor RAT screenshot

Remove Eagle Monitor RAT

Eagle Monitor RAT is a malicious software suite, which is meant to enable cybercriminals to gain unsupervised access to infected systems. However, they can only get this if their victim launches the Eagle Monitor RAT... Read more

April 25, 2022
How to Remove the bloom.exe Miner screenshot

How to Remove the bloom.exe Miner

bloom.exe is a suspicious process, which some Windows users are searching for online, trying to find more information about what it does. Our research shows that bloom.exe is not associated with reputable software or... Read more

March 23, 2022
RuRAT Trojan Delivered Through Fake Vuxner Chat App screenshot

RuRAT Trojan Delivered Through Fake Vuxner Chat App

Cybercriminals are often very creative when it comes to propagating the latest malware to their victims. One of the latest samples of this is the RuRAT, which is being spread through the use of a fake messaging... Read more

March 7, 2022
Health.exe Acts as a Cryptomining Trojan screenshot

Health.exe Acts as a Cryptomining Trojan

Health.exe is the name of a file that has been identified as malicious. The malware acts as a cryptocurrency mining Trojan. Cryptomining Trojans or cryptojacking malware, as they are sometimes called, are malicious... Read more

July 27, 2022
Themida Trojan screenshot

Themida Trojan

Themida is the name of a generic Trojan detection, used by a number of security suites. The file analyzed in this specific instance is called "Disclosing.exe" and can be distributed using all the usual methods used to... Read more

June 17, 2022
Beware! New ZxxZ Trojan Used by Bitter APT screenshot

Beware! New ZxxZ Trojan Used by Bitter APT

Security researchers have been tracking an ongoing malicious campaign targeting entities located in Bangladesh. The campaign has been in progress since the second half of last year and makes use of a new Trojan dubbed... Read more

May 18, 2022
The OldGremlin Ransomware Gang Seeks Victim with the TinyFluff Backdoor screenshot

The OldGremlin Ransomware Gang Seeks Victim with the TinyFluff Backdoor

Advanced Persistent Threat (APT) actors do not always show remarkable activities. Some of them prefer to go after a few, highly-targeted attacks that could yield immense returns if executed successfully. This is the... Read more

April 15, 2022
Serpent Trojan Targets French Users and Institutions screenshot

Serpent Trojan Targets French Users and Institutions

The Serpent Backdoor Trojan is a piece of malware, which was recently observed attacking companies and institutions based in France. The criminals were approaching their victims through phishing emails, which were... Read more

March 22, 2022
S-400 RAT Rented Out on Hacking Forums screenshot

S-400 RAT Rented Out on Hacking Forums

Remote Access Trojans (RATs) are exceptionally dangerous piece of malware, which could cause massive trouble for infected victims. The S-400 RAT is one of the latest malware pieces of this type and, unfortunately, it... Read more

March 2, 2022