Malware
Keona Clipper
Keona clipper is the name of a newly discovered strain of malware that affects Windows systems. As the name suggests, Keona is a clipper, which is the name broadly applies to clipboard monitoring and hijacking... Read more
FakeCrack Malware Spread Using Crack Sites
Cracked software is used as a lure to spread cryptostealers in a new malicious campaign dubbed FakeCrack. The malicious payloads used in the campaign comprise infostealer malware strains that are capable of stealing... Read more
New SVCReady Spread Through Malspam Campaign
Security experts with the threat research branch of HP published their findings on a new strain of malware, dubbed SVCReady. The malware is being spread using malicious spam email campaigns. The first sighting of... Read more
Remove Redox Stealer Malware
Redox stealer is the name of a piece of malware that is focused on scraping and exfiltrating information from infected systems. The malware is being sold on the dark web, using hacker forums as its marketing platform.... Read more
TeamBot Dropper Delivers Additional Malware
TeamBot is the name of a malware dropper that is used to deliver a number of additional threats. The way malware droppers operate is usually connecting to the command and control server controller by the hackers and... Read more
Growtopia Stealer Scrapes Info from Victims
Growtopia stealer is the name of a malicious tool distributed online and coded and compiled using the C# language. The file is disguised as an automatic farming tool for the online game Growtopia and is even named... Read more
SysWin.exe Malware
SysWin.exe is the name of a file that is detected as several different types of malware by different anti-malware suites. While there is no consensus on what type of malware exactly SysWin.exe is, being detected as... Read more
Symbiote Linux Malware Flies Under the Radar
Security experts with BlackBerry Threat Research published a joint research post on a new strain of Linux malware, dubbed Symbiote. The malware was first discovered in early 2022. Its main highlight is just how hard... Read more
What is CryptoWallet Clipper Malware?
Crypto is all the rage lately, that much is obvious, both from the amounts of money that crypto moves and from the empty GPU shelves in computer part stores. Of course, with that popularity comes an increased volume... Read more
EnemyBot Takes Aim at CMS Servers and Mobile Devices
Researchers with AT&T Alien Labs have picked apart a new botnet called EnemyBot. The malware is allegedly developed and used by the threat actor that goes by the name Keksec, also known as Kek Security and... Read more
Saitama Backdoor
Saitama backdoor is the name of a newly discovered piece of malware, coded and compiled in .Net. As the name suggests, Saitama operates like a backdoor. The malware is distributed as an executable file, named... Read more
KurayStealer Malware Steals Credentials
Security researchers issued alerts and coverage concerning a new malware that is making the rounds. The threat is a credentials stealer that uses modified code from a malware builder. The new stealer has been dubbed... Read more
Rundll32.exe
The file name Rundll32.exe has cropped up numerous times in relation to security concerns and threats. Before we go any further, however, we should make one thing very clear. Rundll32.exe is a legitimate Windows file.... Read more
Prime.exe Cryptominer Malware File Could Be Lurking on Your Computer Ready To Mine Cryptocurrency
Prime.exe is the file name of a newly discovered cryptomining malware. A cryptominer or coin miner malware is a type of malicious software that abuses the victim system's resources to mine cryptocurrency for the... Read more
'WinDealer' is Malware That Cannot Be Trusted
Several new malware families have been identified by security researchers. One of them is called WinDealer and is associated with a threat actor named LuoYu. LuoYu has been around for over a decade, executing attacks... Read more
ArguePatch Malware Used in Cyber Attacks on Ukraine
Security researchers have spotted more activity from the Sandworm advanced persistent threat actor. Sandworm is now using an updated version of the ArguePatch malware loader to attack more targets located in Ukraine.... Read more
Sysrv-K Botnet Tries to Mine Crypto on Victim Devices
The Sysrv botnet has been around for a while now, but security researchers have identified a new, updated strain of the malicious tool. The new version has been dubbed Sysrv-K and it is targeting both Windows and... Read more
IceApple Malware Targets MS Exchange Servers
Security researchers have published a detailed report on a new strain of malware dubbed IceApple. IceApple is described as a post-exploitation framework giving threat actors prolonged under-the-radar access to... Read more