Malware

NoaBot - a New Malware Based on Mirai Code screenshot

NoaBot - a New Malware Based on Mirai Code

A recently emerged botnet named NoaBot, which is based on Mirai, has been employed by threat actors in a crypto mining campaign since the beginning of 2023. According to a report from security researcher Stiv Kupchik,... Read more

January 11, 2024
Rose Grabber Comes With Rich Malicious Toolkit screenshot

Rose Grabber Comes With Rich Malicious Toolkit

Rose is a type of malicious software known as a grabber, designed with the intent to pilfer sensitive information from a targeted system. This updated version of the Phorcy stealer exhibits the capability to extract... Read more

January 9, 2024
Prime Stealer Malware screenshot

Prime Stealer Malware

Prime, a malicious software, specializes in stealing sensitive information from Windows users. This crafty threat is adept at extracting a wide range of data, encompassing browser details, cryptocurrency information,... Read more

January 3, 2024
DLRAT Malware Proves to be a Dual-Threat To Vulnerable Systems screenshot

DLRAT Malware Proves to be a Dual-Threat To Vulnerable Systems

DLRAT, a potent malware crafted using the DLang programming language, serves a dual role as both a Remote Access Trojan (RAT) and a downloader. This malicious software is notably associated with the cybercrime group... Read more

December 13, 2023
Trojan-Proxy Malware May Target Multiple Operating Systems screenshot

Trojan-Proxy Malware May Target Multiple Operating Systems

Unauthorized websites distributing tampered versions of cracked software have been identified as sources of infection for Apple macOS users with a novel Trojan-Proxy malware. Researchers explained that perpetrators... Read more

December 8, 2023
Puamson Potentially Unwanted App screenshot

Puamson Potentially Unwanted App

PUA:Win32/Puamson.A!ml is a detection indicating the presence of a potentially unwanted application, often introduced to the computer through the installation of freeware bundles. Instances of infection may also... Read more

November 28, 2023
Atrioc Trojan Malware screenshot

Atrioc Trojan Malware

The Atrioc Virus App is a Trojan that silently enters systems, employing advanced techniques to acquire sensitive data. It evades standard security measures, discreetly gathering personal information and login... Read more

January 10, 2024
Atructis Malware screenshot

Atructis Malware

The Atructis malicious app is a cunning Trojan that seeks to quietly infiltrate systems, utilizing sophisticated methods to exfiltrate sensitive data. It may evade conventional security measures, clandestinely... Read more

January 5, 2024
Unicom Malware Might Contain Infostealing Features screenshot

Unicom Malware Might Contain Infostealing Features

Our researchers determined that Unicom is a malicious application, distinct and unrelated to UNICOM Global, which is a legitimate corporate entity. The Unicom malware is distributed through a malicious installer found... Read more

January 2, 2024
NineRAT Malware Targets Systems Uses Tactics of Lazarus Hacker Group screenshot

NineRAT Malware Targets Systems Uses Tactics of Lazarus Hacker Group

Cisco Talos recently uncovered a new cyber campaign orchestrated by the Lazarus Group, named "Operation Blacksmith." This operation employs three novel DLang-based malware families, with two identified as remote... Read more

December 13, 2023
Atuct Application Malicious File Detection screenshot

Atuct Application Malicious File Detection

The designated name "Atuct Application" is a general handle for potentially any executable file found on a Windows computer, and it may either be a legitimate file associated with the applications installed, or it... Read more

December 8, 2023
IMAPLoader Malware Linked to Iranian Threat Actor screenshot

IMAPLoader Malware Linked to Iranian Threat Actor

The Iranian threat actor known as Tortoiseshell, also tracked by names such as Crimson Sandstorm, Imperial Kitten, TA456, and Yellow Liderc, has been attributed to a new wave of watering hole attacks involving the... Read more

November 14, 2023
Silver RAT Linked to Syrian Threat Actor screenshot

Silver RAT Linked to Syrian Threat Actor

A hacking group known as Anonymous Arabic has recently unleashed a new remote access trojan (RAT) named Silver RAT. This malware is designed to circumvent security software and discreetly initiate concealed... Read more

January 10, 2024
Epsilon Stealer Spread Though Malicious Game Mod screenshot

Epsilon Stealer Spread Though Malicious Game Mod

Epsilon is a malicious software designed with the intent to pilfer sensitive data. This malicious program specifically targets information stored in browsers, gaming applications, and various other software, including... Read more

January 5, 2024
How to Stop and Remove the DevExpress Malware screenshot

How to Stop and Remove the DevExpress Malware

DevExpress, a type of rogue software often embedded with adware functionalities, poses significant risks to users' devices. This malware displays intrusive ads, promotes online scams, and can even lead to the... Read more

December 14, 2023

What is MrAnon Stealer and Does It Affect Your Computer?

MrAnon Stealer is a potent information-stealing malware that has recently emerged as a threat in the cybersecurity landscape. This malicious software is distributed through a phishing campaign that employs PDF lures... Read more

December 12, 2023
NSudo Malware screenshot

NSudo Malware

NSudo has been reported as an instance of malware, detected as Win64/NSudo!MSR bt Windows Defender. What sets this apart is that NSudo itself is not inherently malicious; rather, it is a legitimate Windows component.... Read more

November 28, 2023
Serpent Stealer Malware screenshot

Serpent Stealer Malware

Serpent is a lightweight malware classified as a stealer, designed to target log-in credentials and sensitive information from browsers and various applications. Upon successful infiltration, Serpent initiates the... Read more

November 14, 2023
Loading...