Trojan

How Malicious is ArrowRAT Malware? screenshot

How Malicious is ArrowRAT Malware?

A new malicious tool was recently discovered and detailed by security researchers, called ArrowRAT. As the name suggests, ArrowRAT is a remote access trojan with a wide array of malicious capabilities. The trojan is... Read more

October 13, 2022
What Harm Viewndow May Cause screenshot

What Harm Viewndow May Cause

Trojan infections, such as Viewndow are the most feared kind of computer bug. Even if you’re computer illiterate and can’t remember any other computer infections by name, the word 'Trojan' is sure to set off red flags... Read more

September 22, 2022
MagicRAT Possibly Linked to Lazarus Group APT screenshot

MagicRAT Possibly Linked to Lazarus Group APT

MagicRAT is a newly discovered remote access trojan malware. Researchers have discovered signs and markers that link the new RAT to the North Korean advanced persistent threat actor known as Lazarus Group. MagicRAT is... Read more

September 12, 2022
Woody RAT Can Exfiltrate Data screenshot

Woody RAT Can Exfiltrate Data

Woody RAT is the name of a newly discovered piece of malware that exhibits a wide range of malicious capabilities. As the name suggests, Woody is a remote access Trojan or a RAT. This sort of malicious tool is usually... Read more

August 8, 2022
What is the Xlm.trojan.abracadabra.8.gen Trojan? screenshot

What is the Xlm.trojan.abracadabra.8.gen Trojan?

The name Xlm.trojan.abracadabra.8.gen is the designator and detection name given to a version of the Abracadabra Trojan. This particular strain has been around for a few years now, first detected in mid-2020. The... Read more

July 6, 2022
Altruistics Trojan screenshot

Altruistics Trojan

Altruistics is the unusual name of a piece of malware that exhibits the features and functionality of a Trojan horse. Altruistics is distributed through several methods, including malicious spam emails containing a... Read more

June 14, 2022
CryptInject Detection is Associated With a Trojan Horse Threat screenshot

CryptInject Detection is Associated With a Trojan Horse Threat

CryptInject is a detection provided by anti-virus solutions. What should be noted about CryptInject is that it is a heuristic detection. Unlike most traditional methods of flagging and identifying malware on home user... Read more

October 5, 2022
ModernLoader Used to Deliver More Malware screenshot

ModernLoader Used to Deliver More Malware

ModernLoader is the name of a newly discovered malicious tool. The malware acts as a remote access trojan or a RAT. ModernLoader is associated with a multi-payload, multi-stage attack conducted by threat actors over... Read more

September 14, 2022
VanillaRAT Scrapes System Info, Keystrokes screenshot

VanillaRAT Scrapes System Info, Keystrokes

VanillaRAT is the name of a newly discovered piece of malware. As the name suggests, it is a remote access trojan. VanillaRAT is written and compiled using the C++ programming language. The malware has a broad range... Read more

September 2, 2022
Health.exe Acts as a Cryptomining Trojan screenshot

Health.exe Acts as a Cryptomining Trojan

Health.exe is the name of a file that has been identified as malicious. The malware acts as a cryptocurrency mining Trojan. Cryptomining Trojans or cryptojacking malware, as they are sometimes called, are malicious... Read more

July 27, 2022
Themida Trojan screenshot

Themida Trojan

Themida is the name of a generic Trojan detection, used by a number of security suites. The file analyzed in this specific instance is called "Disclosing.exe" and can be distributed using all the usual methods used to... Read more

June 17, 2022
Beware! New ZxxZ Trojan Used by Bitter APT screenshot

Beware! New ZxxZ Trojan Used by Bitter APT

Security researchers have been tracking an ongoing malicious campaign targeting entities located in Bangladesh. The campaign has been in progress since the second half of last year and makes use of a new Trojan dubbed... Read more

May 18, 2022
Deed RAT Logs New Activity Spike screenshot

Deed RAT Logs New Activity Spike

Deed RAT, a piece of remote access trojan malware, has seen a resurgence in use over the recent weeks. Deed RAT, as the name suggests, is a remote access trojan or a RAT in short. This sort of malware usually attempts... Read more

September 23, 2022
TigerRAT - a Lazarus Group Tool screenshot

TigerRAT - a Lazarus Group Tool

TigerRAT is a new malicious tool that researchers believe is linked to the advanced persistent threat actor known as Lazarus Group. Lazarus Group is a threat actor believed to be comprised of North Korean individuals,... Read more

September 13, 2022
nccTrojan Used by TA428 Threat Actor screenshot

nccTrojan Used by TA428 Threat Actor

A recent report published by security researchers with Kaspersky ICS CERT details a series of attacks against military sector entities located in Eastern Europe and Afghanistan. The report was published in August 2022... Read more

August 9, 2022
ApolloRAT Uses Multiple Tricks to Evade Detection screenshot

ApolloRAT Uses Multiple Tricks to Evade Detection

ApolloRAT is the name of a newly discovered remote access trojan. ApolloRAT is originally written in Python, but it also uses several tricks to make detection more difficult. ApolloRAT makes use of a source-to-source... Read more

July 19, 2022
PingPull Malware screenshot

PingPull Malware

Security researchers with Palo Alto's Unit 42 discovered and analyzed a new strain of malware called PingPull. The new malware has RAT capabilities and is particularly difficult to detect. PingPull is the newest tool... Read more

June 16, 2022
What is PowerShell RAT and How To Remove It screenshot

What is PowerShell RAT and How To Remove It

PowerShell RAT is the rather generic name for a newly discovered remote access trojan. The malicious tool can execute PowerShell commands that can compromise the target system. The PowerShell RAT is primarily... Read more

May 18, 2022
Loading...