Malware

HAFNIUM APT Unleashes the Tarrask Malware screenshot

HAFNIUM APT Unleashes the Tarrask Malware

An Advanced Persistent Threat (APT) actor tracked under the alias HAFNIUM is operating with a new piece of malware dubbed Tarrask. The Tarrask Malware appears to be a customly developed implant, which is being... Read more

April 18, 2022
PIPEDREAM Malware Targets a Wide Range of Industrial Control Systems screenshot

PIPEDREAM Malware Targets a Wide Range of Industrial Control Systems

Industrial Control Systems (ICS) is a term used to describe the collection of systems, networks, and devices used to automate certain industrial processes. Typically, ICS use highly specialized software and tooling,... Read more

April 14, 2022
Enemybot Botnet Goes After Routers and IoT Devices screenshot

Enemybot Botnet Goes After Routers and IoT Devices

The Mirai Botnet might just be one of the most impactful malware families to be released ever. The infamous threat was responsible for one of the largest botnets engaging in distributed-denial-of-service attacks, and... Read more

April 13, 2022
FFDroider Malware Steals Social Media and eCommerce Credentials screenshot

FFDroider Malware Steals Social Media and eCommerce Credentials

The FFDroider Malware, despite its name, is not a threat targeting Android devices. Instead, it is entirely focused on infiltrating Windows machines, and then concealing its malicious activities in the background. The... Read more

April 7, 2022
Beastmode Botnet Follows in Mirai's Footsteps screenshot

Beastmode Botnet Follows in Mirai's Footsteps

Spin-offs of the Mirai Botnet continue to be a worldwide threat. These malware families infect a wide range of Internet-connected devices, and then harvest their network capabilities to execute... Read more

April 6, 2022
AcidRain Malware Wipes Routers and Modems in Ukraine screenshot

AcidRain Malware Wipes Routers and Modems in Ukraine

A new data wiping malware has been unleashed, and this time Ukraine is not its only target. While we have seen multiple wiper malware samples targeting Ukraine systems in the past month, the one we are talking about... Read more

April 1, 2022
The ZingoStealer Malware was Given for Free to Hacking Group Followers screenshot

The ZingoStealer Malware was Given for Free to Hacking Group Followers

We are used to seeing cybercriminals offering their latest malware to other hackers on hacking forums. However, it seems that some of these criminals have resorted to building their own communities on platforms like... Read more

April 15, 2022
Indestroyer2 Malware Targets Ukrainian Industrial Control Systems screenshot

Indestroyer2 Malware Targets Ukrainian Industrial Control Systems

Indestroyer2 Malware is a malicious piece of software, which has been employed in attacks against Ukraine-based Industrial Control Systems (ICS.) The goal of the attackers is to take down important targets operating... Read more

April 13, 2022
META Infostealer is a New Stealer for Rent screenshot

META Infostealer is a New Stealer for Rent

Cybercriminals are always on the lookout for openings in a specific field of malware. Recently, such a place was opened when the developers of the Raccoon Stealer ceased their operations due to the conflict in... Read more

April 12, 2022
Denonia Malware Targets Poorly Secured Lambda AWS Instances screenshot

Denonia Malware Targets Poorly Secured Lambda AWS Instances

Cybercriminals have unleashed a new malware family called Denonia. It engages in highly-targeted attacks, which go after a specific network – the Lambda AWS service. This service is associated with Amazon Web... Read more

April 7, 2022
How to Get Around the

How to Get Around the "macOS Cannot Verify That This App Is Free From Malware" Alert

Sometimes you happen to have an application you downloaded from a trusted online source that you want to install on your Mac. However, in a lot of cases, the application will fail to install smoothly and will bring up... Read more

April 5, 2022
Fire Chili Rootkit Aids Deep Panda APT Operations screenshot

Fire Chili Rootkit Aids Deep Panda APT Operations

A rootkit is a type of malware, which is meant to conceal itself as an integral part of the operating system. It may often pose as a driver, which grants it elevated permissions, including the ability to prevent... Read more

April 1, 2022
Steadily Growing Fodcha Botnet Specializes in DDoS Attacks screenshot

Steadily Growing Fodcha Botnet Specializes in DDoS Attacks

The Fodcha Botnet is a new malicious project that appears to be growing steadily, adding a little over 100 infected devices per day. This botnet is not affiliated with the infamous Mirai Botnet family, but it does... Read more

April 15, 2022
Remove ColdStealer Malware screenshot

Remove ColdStealer Malware

Cybercriminals are using a new piece of malware, which is called the ColdStealer Malware. This threat is able to steal information related to a dozen Web browsers, but its primary target are cryptocurrency wallets... Read more

April 13, 2022
Remove Sapphire Miner screenshot

Remove Sapphire Miner

A multi-purpose Trojan cryptocurrency miner is being sold and actively promoted on multiple hacker forums. The threat, called Sapphire Miner, claims to be undetectable by antivirus engines, but we assure you that it... Read more

April 12, 2022
Phishing Email Documents Deliver the MetaStealer Malware screenshot

Phishing Email Documents Deliver the MetaStealer Malware

MetaStealer Malware is a dangerous threat, which is being distributed through fake phishing emails that contain malicious attachments. The attached files might look like documents and archives but, in reality, they... Read more

April 7, 2022
Remove Lightning Stealer screenshot

Remove Lightning Stealer

Lightning Stealer is a dangerous malware family, which could steal sensitive information from your PC if it manages to sneak through your defenses. The best way to make sure that an infostealer like this one never... Read more

April 4, 2022
Trojanized Muse Miner Promoted on Hacking Forums screenshot

Trojanized Muse Miner Promoted on Hacking Forums

Muse Miner is a malicious application, which can hijack your system's hardware resources in order to mine for Monero, Ethereum, Ravencoin, and other cryptocurrencies. The creators of this Trojanized cryptocurrency... Read more

April 1, 2022
Loading...