Trojan
PuaBundler May Cause Security and Privacy Issues on Your Computer
PuaBundler is a malicious program that can take over a user's computer by gaining administrative privileges and controlling all processes in the system. This Trojan horse can be used for various malicious activities,... Read more
Remote Access Trojan 'HiatusRAT' Targets Router Firmware
Researchers with Lumen Black Lotus Labs discovered a new malware campaign that they have named "Hiatus". This campaign targets business-grade routers, mainly the DrayTek Vigor models 2960 and 3900, which can support... Read more
Phonzy Trojan Could Load on Vulnerable PCs To Steal Data
The Phonzy trojan is a type of banking trojan that belongs to the family of trojan-stealers. This type of trojan has become increasingly common with the rise of online banking worldwide. As the name suggests, banking... Read more
Ekipa RAT Sold on Dark Web
Ekipa RAT is the name of a remote-access Trojan malicious tool. The malware was spotted when it was put up for sale on hacker forums. According to researchers, Ekipa has a scary range of possibilities, likely to match... Read more
Schoolyard Bully Trojan Steals Facebook Account Info
Researchers with Zimperium zLabs have uncovered an Android malware campaign referred to as the Schoolyard Bully Trojan, which has affected over 300,000 victims since 2018. The malicious apps making up the... Read more
Trojan.Win32.SEPEH.gen Detection & Removal
Trojan.Win32.SEPEH.gen is a detection designator assigned by antivirus applications to a suspicious file. There is a possibility that the file flagged as Trojan.Win32.SEPEH.gen is indeed a Trojan horse. Trojans are a... Read more
Trojan.Malware.300983.Susgen Detection
Trojan.Malware.300983.Susgen is the name and designator of a heuristic detection. Trojan.Malware.300983.Susgen is intended as a designator for an unspecified Trojan horse malware detection. The detection does not... Read more
Colour-Blind RAT Wriggles Its Way Onto PyPI
A Python package named "colourfool" that was uploaded to PyPI has been discovered to contain a malicious information stealer and remote access trojan. Kroll's Cyber Threat Intelligence team identified the malware,... Read more
PY#RATION RAT Uses Unique C2 Approach - PC Users Beware!
Security researchers have identified a new cyber attack using a Python-based Remote Access Trojan (RAT) back in August 2022. According to Securonix, the malware, referred to as PY#RATION, is unique with its usage of... Read more
Demon Stealer Seeks Your Personal Information
Demon Stealer is a malicious Trojan horse infection that may present itself after it has performed many malevolent activates on an infected PC. The Demon Stealer threat may load without notifying the computer user and... Read more
What is Woreflint Trojan?
Woreflint is the detection name assigned to a malicious program that functions as a trojan horse. Detection names are not always the same thing as the actual payload and the Woreflint detection can signify a number of... Read more
Android Clicker Malware Installed 20 Million Times
Security researchers are warning Android users about a clicker Trojan that has managed to invade 16 applications on Google Play and had around 20 million installations. A clicker is a Trojan that stays in the... Read more
Nexus Banking Trojan Linked to Older Sova Malware
The Android banking trojan, known as Nexus, has been identified by researchers at Cyble. The malware was found to be a rebranded version of the S.O.V.A. banking trojan and targets primarily banking and finance-related... Read more
MQsTTang Backdoor Targets IoT Devices Exploiting System Vulnerabilities
MQTTang Backdoor is a Trojan horse threat that targets Internet of Things (IoT) devices and uses the MQTT (Message Queuing Telemetry Transport) protocol as a means of communication with its command and control... Read more
What Does Ursu Trojan Do To Your Computer?
Ursu is a malicious Trojan that can be installed on your computer without your knowledge or permission. It often takes advantage of system vulnerabilities and security flaws, such as downloading software from... Read more
BreeZip Trojan Horse is Malware That Could Severely Damage Your PC
BreeZip is a Trojan horse malware that can severely damage computers, devices, and networks. BreeZip appears to be designed to infiltrate a system, steal data or take control of the device without the user's... Read more
KEYSTEAL Trojan Targets Macs To Steal Data
KEYSTEAL is the name of a Trojan malicious application. As the name suggests, KEYSTEAL is developed to steal information contained in a Mac's Keychain password storage. Keychain is a proprietary Apple password... Read more
Spyder Loader Malware Tool Used in Attacks on Hong Kong Entities
Spyder Loader is the name of a malicious tool that was first spotted early last year. The same malware is now used in attack campaigns targeting entities located in Hong Kong. Security researchers are tracking an... Read more