Malware
Horabot Malware Targets Latin American Victims
Since late 2020, Spanish-speaking individuals in Latin America have faced a new form of malware known as Horabot. This botnet malware allows a threat actor to take control of a victim's Outlook mailbox, extract email... Read more
COSMICENERGY Malware Targets Industries
A recently discovered strain of malicious software has been uncovered, specifically designed to infiltrate and disrupt critical systems within industrial environments. Referred to as COSMICENERGY by Mandiant, a threat... Read more
Why TurkoRat Remote Access Tool is Extremely Dangerous on Your Computer
In the realm of cybersecurity, new threats emerge regularly, targeting unsuspecting users and organizations alike. One such threat is TurkoRat, a versatile malware that functions as a Trojan horse, password-stealing... Read more
DownEx Malware Used in Espionage Campaign
A new type of malware called DownEx has been discovered by Romanian cybersecurity researchers. It is being used in a sophisticated espionage campaign that is targeting government organizations in Central Asia, with... Read more
LOBSHOT Malware Used in Malvertising Campaign
Earlier this year, Elastic Security Labs, in collaboration with the research community, detected a significant rise in the use of malvertising. Attackers utilized a sophisticated strategy of creating phony websites... Read more
SnowyAmber Malware Leveraged by Russian Cyberspies To Attack NATO & EU Organizations
In recent cybersecurity news sources, it was reported that Russian cyberspies had launched a new malware toolset, which they used to target NATO and European Union (EU) organizations. The malware toolset has been... Read more
SeroXen RAT - a Fileless Threat That Evades Detection
Security analysts are currently monitoring an emerging fileless remote access trojan (RAT) called SeroXen, designed to outsmart numerous EDR systems. SeroXen is actually a modified version of a legitimate remote... Read more
PowerExchange Malware Targets UAE Government Bodies
A new form of malicious software has been identified, dubbed PowerExchange, which is believed to have been used by the Iranian state-backed hacking group APT34, also known as Oilrig. This PowerShell-based malware was... Read more
Minas is a Multi-Stage Cryptominer Malware
Minas, a malicious software designed for cryptocurrency mining, is an insidious threat that exploits the XMRIG application, originally intended for legitimate Monero mining. This particular type of malware exerts... Read more
RoarBAT Malware Spotted by Ukrainian CERT
The Computer Emergency Response Team of Ukraine (CERT-UA) has reported an ongoing phishing campaign that uses invoice-themed lures to spread the SmokeLoader malware. The emails are sent from compromised accounts and... Read more
RustBucket Mac Malware Attributed to BlueNoroff Threat Actor
Jamf, a mobile device management company, has identified a new malware called RustBucket that is being used to target Apple devices. The malware is believed to be associated with the BlueNoroff advanced persistent... Read more
Balada Injector Malware Targets Websites Using WordPress
According to GoDaddy's Sucuri, a massive campaign named Balada Injector has infected more than one million WordPress websites with malware since 2017. The attackers use various methods and vulnerabilities to breach... Read more
Beware of Bandit Stealer Targets Crypto Wallets
Cybersecurity researchers have picked apart a newly discovered stealthy malware named Bandit Stealer, which possesses the ability to target a wide range of web browsers and cryptocurrency wallets. This malware has... Read more
Beware! Jackal Malware Becomes a Master at Manipulation
A notorious Advanced Persistent Threat (APT) group named GoldenJackal has recently developed a potent collection of .NET malware tools known as Jackal. This malicious toolset, comprising various components like... Read more
Horse Shell Malware Targets Wide Range of Routers
Check Point Research, a group of cybersecurity researchers, has discovered a hazardous Chinese malware capable of infecting your home or office router. Referred to as "Horse Shell," this backdoor enables malicious... Read more
What is Acwzmain.accde Malware?
Acwzmain.accde is a genuine file developed by Microsoft for Windows systems and is usually located in C:\Program Files (x86)\Microsoft Office\root\Office16\ACCWIZ\ACWZMAIN.ACCDE. However, certain trojans can... Read more
EvilExtractor Malware Seeks to Steal Data
EvilExtractor is a malicious tool that targets Windows operating systems to extract data and files from endpoint devices. Its modules operate through an FTP service and were developed by a company named Kodex, which... Read more
Beware of 'Estimate Speed Up' Rogue Optimization App
Estimate Speed Up is a program that falls under the category of potentially unwanted programs. This software claims to optimize your computer by scanning it for invalid entries, broken links, and other issues that... Read more