Malware
Understanding OneLaunch: Is It a Malware?
OneLaunch has been in the news for a while. Since many users find this tool on their PC without their explicit knowledge, it is gaining a bad…
Evil Extractor, Data Theft Tool Causing Havoc in US & Europe
Evil Extractor: The Data Theft Tool Sold on Kodex for $59/month, Witnessing a Surge in Malicious Attacks in US & Europe as Reported by Security Firms and…
Phishing Scams Targeting US Taxpayers with Remote Access Malware
Tax Season Brings Increased Risk of Phishing Attacks as Microsoft Warns of Remote Access Malware Targeting US Taxpayers and Accountants.
Checkpoint Security Researchers Discover Fast Ransomware ‘Rorschach’ with Unique Features
Fastest Ransomware Yet? CheckPoint Discovers Rorschach with Unique Encryption, Anti-Analysis Features, and and DLL Side Loading Distribution.
Attackers Sending IRS Phishing Emails to Install Emotett Malware
Emotet Malware Targets Users with Fake Tax Forms in New Phishing Campaign Discovered by Security Researchers at Malwarebytes and Palo Alto Networks Unit 42
Common Magic & Power Magic Malware Used in Advanced Surveillance Attacks
Common Magic and Power Magic Malware Used in Targeted Surveillance Attacks on Agriculture and Transportation Sectors, Reveals Kaspersky
Threat Actors Exploit OpenAI’s ChatGPT Popularity to Distribute Malware
As you may have been already familiar with the Open Ai’s ChatGPT. Well, ChatGPT is a chatbox, built on GPT family 3 of the large language model.…
ProxyShellMiner Malware Exploits Vulnerabilities for Cryptocurrency Mining
In a new malware discovery named ProxyShellMiner, the malware exploits the ProxyShell vulnerabilities to install cryptocurrency miners all around the Windows domain to make a profit for…
W4SP Stealer Found on PyPi Index, Threatening Crypto Wallets & Browser Passwords
A threat actor uploaded five malicious packages containing ‘W4SP Stealer’ information-stealing malware to Python Package Index (PyPi Index) from January 27 to January 29, 2023. The security…
Russian Threat Actors Target Cryptocurrency with Enigma Malware
Threat Actors from Russia are running a campaign that targets East Europeans working in the cryptocurrency industry by using fake job offers and aiming to infect the…
Mimic Ransomware Uses ‘Everything’ API to Target English and Russian Windows Users
Security researchers at Trend Micro are back with the discovery of a new ransomware which the researchers named Mimic, that takes advantage of APIs of the Everything…
Attackers Abusing OneNote Attachments to Spread RAT Malware
Over the years, Threat actors have been deploying malware in emails via malicious Microsoft Word and Excel attachments, which then launch macros to download & install the…
Cybercriminals Selling ‘Hook’ Android Malware for Remote Control of Smartphones
In a report by ThreatFabric, An Android Malware by the name of ‘Hook’ is being sold by cybercriminals who brag that it can remotely take control of…
Hackers Breach CircleCi’s Systems via Engineer’s Infected 2FA-Backed SSO
CircleCi, a popular CI/CD (Continuous Integration & Continuous Development) platform used for DevOps practices revealed that it suffered a security exploit. In December last year, an engineer…
6 Malicious PyPi Packages Installing RAT Malware via Cloudflare Tunneling
A team of researchers at Phylum security firm discovered six malicious packages on the Python Package Index, which were found installing Information stealing and Remote access trojan…
Attackers Copying Legit Software Sites to Spread Malware via Google Ads Platform
There has been an increase in the number of threat actors abusing the Google Ads platform to distribute malware to unaware users who are looking to download…
End of content
No more pages to load