Malware
Verblecon Malware Delivers Miners & Ransomware
The Verblecon Malware is designed to load other malicious payload onto the infected device, while managing to bypass various security measures and feature. The criminals are using the Verblecon Malware in combination... Read more
Hodur Malware Has Ties to the Mustang Panda Hackers
A new malware family has been identified by cybersecurity researchers and, unfortunately, it appears to have been active for a long time. The threat, dubbed the Hodur Malware, is a product of an Advanced Persistent... Read more
CaddyWiper Malware Unleashed against Ukrainian Networks
Russian cybercriminals continue to unleash new malware against Ukrainian systems and networks. Due to the nature of the current conflict, they are not focused on spying on their victims or stealing information.... Read more
FoxBlade Malware Botnet Targets Ukrainian Organizations
Russia's cyberattack against Ukrainian targets mobilizes all sorts of malware families. The hackers participating in these campaigns are focusing on destructive malware attacks that could take entire networks down. To... Read more
SoulSearcher Malware Hides in the Registry, Boasts Modular Structure
The SoulSearcher Malware is a relatively new threat to be discovered by cybersecurity experts. The first clues of its attack were recovered from infected systems in Southeast Asia, and it appears that this is the... Read more
Cyclops Blink Malware Targets WatchGuard Devices
An advanced piece of malware appears to be linked to Russian hacking groups that may be state-sponsored. The threat, dubbed the Cyclops Blink Malware, appears to have been around since 2019, and it has managed to... Read more
Remove CH Miner
CH Miner is a malicious application whose goal is to work in your computer without your knowledge. It is very small in size, and may often arrive via fake downloads, misleading ads, cracked games/software, and other... Read more
BlackGuard Stealer Promoted on Hacking Forums
The BlackGuard Stealer is a dangerous implant whose creators are promoting it by using a Malware-as-a-Service (MaaS) model. What does this mean? This is simply a term to describe malware, which can be used by any... Read more
Zhadnost Botnet Launches DDoS Campaigns Against Ukrainian Targets
The conflict between Russia and Ukraine is present online as well. It seems that Russian cybercriminals are using a previously unknown botnet in order to carry out distributed-denial-of-service (DDoS) attacks against... Read more
Hacking Forums Offer the Colibri Malware to Wannabe Criminals
The Colibri Malware is being rented out on hacking forums. This means that any cybercriminal from around the world can start using it, as long as they are prepared to pay some money to the original creators. Needless... Read more
Jester Stealer Malware Rented on Hacking Forums
Malware-as-a-service has been a popular concept among cybercriminals for a long time. There are plenty of malware developers who offer to rent out or even sell their products to likeminded crooks who are willing to... Read more
Kraken Botnet Utilizes a Wide Range of Payloads
Kraken Botnet is a major botnet project, which has been steadily growing over the past couple of months. What started as a relatively simple botnet with a low infection rate, has now turned into a large-scale campaign... Read more
Remove Ginzo Stealer
Ginzo Stealer is a dangerous piece of malware being promoted via Telegram groups and online hacking forums frequented by cybercriminals. The creators of Ginzo Stealer advertise is a free to use tool, which packs all... Read more
The Bitxor20 Botnet Abuses the Log4J Vulnerability
The Log4J vulnerability has enabled dozens of cybercriminals to rapidly expand their reach, and amplify the efficiency of their attacks. One of the malware families that flew under the radar so far, has been the... Read more
Pripyat Miner Sold on Hacking Forums
Russian malware creators are selling and renting out a new piece of malware, which has the ability to utilize a system's CPU resources in order to mine for Monero. While cryptocurrency mining malware is not novel, new... Read more
IsaacWiper Malware Destroys Systems of Ukrainian Institutions
The Russian invasion in Ukraine has prompted Russia-backed hacker groups to ramp up their attacks against Ukrainian companies & institutions. Of course, the goal of these attacks is immediate destruction, and this... Read more
Destructive HermeticWiper Malware Targets Ukrainian Entities
The Russian cyber division have unleashed a flurry of attacks or Ukrainian systems and network infrastructure. The ongoing military conflict is fought both in the real world, and on the Internet. One of the new... Read more
Is 'tone.exe' Dangerous?
Seeing weird names and applications in the Windows Task Manager is not something that you should ignore. While many of those are likely to turn out to be system processes and components of safe applications, there is... Read more