Malware

Keona Clipper screenshot

Keona Clipper

Keona clipper is the name of a newly discovered strain of malware that affects Windows systems. As the name suggests, Keona is a clipper, which is the name broadly applies to clipboard monitoring and hijacking... Read more

June 16, 2022
FakeCrack Malware Spread Using Crack Sites screenshot

FakeCrack Malware Spread Using Crack Sites

Cracked software is used as a lure to spread cryptostealers in a new malicious campaign dubbed FakeCrack. The malicious payloads used in the campaign comprise infostealer malware strains that are capable of stealing... Read more

June 13, 2022
New SVCReady Spread Through Malspam Campaign screenshot

New SVCReady Spread Through Malspam Campaign

Security experts with the threat research branch of HP published their findings on a new strain of malware, dubbed SVCReady. The malware is being spread using malicious spam email campaigns. The first sighting of... Read more

June 8, 2022
Remove Redox Stealer Malware screenshot

Remove Redox Stealer Malware

Redox stealer is the name of a piece of malware that is focused on scraping and exfiltrating information from infected systems. The malware is being sold on the dark web, using hacker forums as its marketing platform.... Read more

June 3, 2022
TeamBot Dropper Delivers Additional Malware screenshot

TeamBot Dropper Delivers Additional Malware

TeamBot is the name of a malware dropper that is used to deliver a number of additional threats. The way malware droppers operate is usually connecting to the command and control server controller by the hackers and... Read more

May 23, 2022
Growtopia Stealer Scrapes Info from Victims screenshot

Growtopia Stealer Scrapes Info from Victims

Growtopia stealer is the name of a malicious tool distributed online and coded and compiled using the C# language. The file is disguised as an automatic farming tool for the online game Growtopia and is even named... Read more

May 19, 2022
SysWin.exe Malware screenshot

SysWin.exe Malware

SysWin.exe is the name of a file that is detected as several different types of malware by different anti-malware suites. While there is no consensus on what type of malware exactly SysWin.exe is, being detected as... Read more

June 15, 2022
Symbiote Linux Malware Flies Under the Radar screenshot

Symbiote Linux Malware Flies Under the Radar

Security experts with BlackBerry Threat Research published a joint research post on a new strain of Linux malware, dubbed Symbiote. The malware was first discovered in early 2022. Its main highlight is just how hard... Read more

June 10, 2022
What is CryptoWallet Clipper Malware? screenshot

What is CryptoWallet Clipper Malware?

Crypto is all the rage lately, that much is obvious, both from the amounts of money that crypto moves and from the empty GPU shelves in computer part stores. Of course, with that popularity comes an increased volume... Read more

June 8, 2022
EnemyBot Takes Aim at CMS Servers and Mobile Devices screenshot

EnemyBot Takes Aim at CMS Servers and Mobile Devices

Researchers with AT&T Alien Labs have picked apart a new botnet called EnemyBot. The malware is allegedly developed and used by the threat actor that goes by the name Keksec, also known as Kek Security and... Read more

May 30, 2022
Saitama Backdoor screenshot

Saitama Backdoor

Saitama backdoor is the name of a newly discovered piece of malware, coded and compiled in .Net. As the name suggests, Saitama operates like a backdoor. The malware is distributed as an executable file, named... Read more

May 20, 2022
KurayStealer Malware Steals Credentials screenshot

KurayStealer Malware Steals Credentials

Security researchers issued alerts and coverage concerning a new malware that is making the rounds. The threat is a credentials stealer that uses modified code from a malware builder. The new stealer has been dubbed... Read more

May 17, 2022
Rundll32.exe screenshot

Rundll32.exe

The file name Rundll32.exe has cropped up numerous times in relation to security concerns and threats. Before we go any further, however, we should make one thing very clear. Rundll32.exe is a legitimate Windows file.... Read more

June 15, 2022
Prime.exe Cryptominer Malware File Could Be Lurking on Your Computer Ready To Mine Cryptocurrency screenshot

Prime.exe Cryptominer Malware File Could Be Lurking on Your Computer Ready To Mine Cryptocurrency

Prime.exe is the file name of a newly discovered cryptomining malware. A cryptominer or coin miner malware is a type of malicious software that abuses the victim system's resources to mine cryptocurrency for the... Read more

June 9, 2022
'WinDealer' is Malware That Cannot Be Trusted screenshot

'WinDealer' is Malware That Cannot Be Trusted

Several new malware families have been identified by security researchers. One of them is called WinDealer and is associated with a threat actor named LuoYu. LuoYu has been around for over a decade, executing attacks... Read more

June 3, 2022
ArguePatch Malware Used in Cyber Attacks on Ukraine screenshot

ArguePatch Malware Used in Cyber Attacks on Ukraine

Security researchers have spotted more activity from the Sandworm advanced persistent threat actor. Sandworm is now using an updated version of the ArguePatch malware loader to attack more targets located in Ukraine.... Read more

May 23, 2022
Sysrv-K Botnet Tries to Mine Crypto on Victim Devices screenshot

Sysrv-K Botnet Tries to Mine Crypto on Victim Devices

The Sysrv botnet has been around for a while now, but security researchers have identified a new, updated strain of the malicious tool. The new version has been dubbed Sysrv-K and it is targeting both Windows and... Read more

May 19, 2022
IceApple Malware Targets MS Exchange Servers screenshot

IceApple Malware Targets MS Exchange Servers

Security researchers have published a detailed report on a new strain of malware dubbed IceApple. IceApple is described as a post-exploitation framework giving threat actors prolonged under-the-radar access to... Read more

May 16, 2022
Loading...