Malware
HAFNIUM APT Unleashes the Tarrask Malware
An Advanced Persistent Threat (APT) actor tracked under the alias HAFNIUM is operating with a new piece of malware dubbed Tarrask. The Tarrask Malware appears to be a customly developed implant, which is being... Read more
PIPEDREAM Malware Targets a Wide Range of Industrial Control Systems
Industrial Control Systems (ICS) is a term used to describe the collection of systems, networks, and devices used to automate certain industrial processes. Typically, ICS use highly specialized software and tooling,... Read more
Enemybot Botnet Goes After Routers and IoT Devices
The Mirai Botnet might just be one of the most impactful malware families to be released ever. The infamous threat was responsible for one of the largest botnets engaging in distributed-denial-of-service attacks, and... Read more
FFDroider Malware Steals Social Media and eCommerce Credentials
The FFDroider Malware, despite its name, is not a threat targeting Android devices. Instead, it is entirely focused on infiltrating Windows machines, and then concealing its malicious activities in the background. The... Read more
Beastmode Botnet Follows in Mirai's Footsteps
Spin-offs of the Mirai Botnet continue to be a worldwide threat. These malware families infect a wide range of Internet-connected devices, and then harvest their network capabilities to execute... Read more
AcidRain Malware Wipes Routers and Modems in Ukraine
A new data wiping malware has been unleashed, and this time Ukraine is not its only target. While we have seen multiple wiper malware samples targeting Ukraine systems in the past month, the one we are talking about... Read more
The ZingoStealer Malware was Given for Free to Hacking Group Followers
We are used to seeing cybercriminals offering their latest malware to other hackers on hacking forums. However, it seems that some of these criminals have resorted to building their own communities on platforms like... Read more
Indestroyer2 Malware Targets Ukrainian Industrial Control Systems
Indestroyer2 Malware is a malicious piece of software, which has been employed in attacks against Ukraine-based Industrial Control Systems (ICS.) The goal of the attackers is to take down important targets operating... Read more
META Infostealer is a New Stealer for Rent
Cybercriminals are always on the lookout for openings in a specific field of malware. Recently, such a place was opened when the developers of the Raccoon Stealer ceased their operations due to the conflict in... Read more
Denonia Malware Targets Poorly Secured Lambda AWS Instances
Cybercriminals have unleashed a new malware family called Denonia. It engages in highly-targeted attacks, which go after a specific network – the Lambda AWS service. This service is associated with Amazon Web... Read more
How to Get Around the "macOS Cannot Verify That This App Is Free From Malware" Alert
Sometimes you happen to have an application you downloaded from a trusted online source that you want to install on your Mac. However, in a lot of cases, the application will fail to install smoothly and will bring up... Read more
Fire Chili Rootkit Aids Deep Panda APT Operations
A rootkit is a type of malware, which is meant to conceal itself as an integral part of the operating system. It may often pose as a driver, which grants it elevated permissions, including the ability to prevent... Read more
Steadily Growing Fodcha Botnet Specializes in DDoS Attacks
The Fodcha Botnet is a new malicious project that appears to be growing steadily, adding a little over 100 infected devices per day. This botnet is not affiliated with the infamous Mirai Botnet family, but it does... Read more
Remove ColdStealer Malware
Cybercriminals are using a new piece of malware, which is called the ColdStealer Malware. This threat is able to steal information related to a dozen Web browsers, but its primary target are cryptocurrency wallets... Read more
Remove Sapphire Miner
A multi-purpose Trojan cryptocurrency miner is being sold and actively promoted on multiple hacker forums. The threat, called Sapphire Miner, claims to be undetectable by antivirus engines, but we assure you that it... Read more
Phishing Email Documents Deliver the MetaStealer Malware
MetaStealer Malware is a dangerous threat, which is being distributed through fake phishing emails that contain malicious attachments. The attached files might look like documents and archives but, in reality, they... Read more
Remove Lightning Stealer
Lightning Stealer is a dangerous malware family, which could steal sensitive information from your PC if it manages to sneak through your defenses. The best way to make sure that an infostealer like this one never... Read more
Trojanized Muse Miner Promoted on Hacking Forums
Muse Miner is a malicious application, which can hijack your system's hardware resources in order to mine for Monero, Ethereum, Ravencoin, and other cryptocurrencies. The creators of this Trojanized cryptocurrency... Read more