Malware

Verblecon Malware Delivers Miners & Ransomware screenshot

Verblecon Malware Delivers Miners & Ransomware

The Verblecon Malware is designed to load other malicious payload onto the infected device, while managing to bypass various security measures and feature. The criminals are using the Verblecon Malware in combination... Read more

March 30, 2022
Hodur Malware Has Ties to the Mustang Panda Hackers screenshot

Hodur Malware Has Ties to the Mustang Panda Hackers

A new malware family has been identified by cybersecurity researchers and, unfortunately, it appears to have been active for a long time. The threat, dubbed the Hodur Malware, is a product of an Advanced Persistent... Read more

March 24, 2022
CaddyWiper Malware Unleashed against Ukrainian Networks screenshot

CaddyWiper Malware Unleashed against Ukrainian Networks

Russian cybercriminals continue to unleash new malware against Ukrainian systems and networks. Due to the nature of the current conflict, they are not focused on spying on their victims or stealing information.... Read more

March 15, 2022
FoxBlade Malware Botnet Targets Ukrainian Organizations screenshot

FoxBlade Malware Botnet Targets Ukrainian Organizations

Russia's cyberattack against Ukrainian targets mobilizes all sorts of malware families. The hackers participating in these campaigns are focusing on destructive malware attacks that could take entire networks down. To... Read more

March 4, 2022
SoulSearcher Malware Hides in the Registry, Boasts Modular Structure screenshot

SoulSearcher Malware Hides in the Registry, Boasts Modular Structure

The SoulSearcher Malware is a relatively new threat to be discovered by cybersecurity experts. The first clues of its attack were recovered from infected systems in Southeast Asia, and it appears that this is the... Read more

March 1, 2022
Cyclops Blink Malware Targets WatchGuard Devices screenshot

Cyclops Blink Malware Targets WatchGuard Devices

An advanced piece of malware appears to be linked to Russian hacking groups that may be state-sponsored. The threat, dubbed the Cyclops Blink Malware, appears to have been around since 2019, and it has managed to... Read more

February 24, 2022
Remove CH Miner screenshot

Remove CH Miner

CH Miner is a malicious application whose goal is to work in your computer without your knowledge. It is very small in size, and may often arrive via fake downloads, misleading ads, cracked games/software, and other... Read more

March 29, 2022
BlackGuard Stealer Promoted on Hacking Forums screenshot

BlackGuard Stealer Promoted on Hacking Forums

The BlackGuard Stealer is a dangerous implant whose creators are promoting it by using a Malware-as-a-Service (MaaS) model. What does this mean? This is simply a term to describe malware, which can be used by any... Read more

March 17, 2022
Zhadnost Botnet Launches DDoS Campaigns Against Ukrainian Targets screenshot

Zhadnost Botnet Launches DDoS Campaigns Against Ukrainian Targets

The conflict between Russia and Ukraine is present online as well. It seems that Russian cybercriminals are using a previously unknown botnet in order to carry out distributed-denial-of-service (DDoS) attacks against... Read more

March 14, 2022
Hacking Forums Offer the Colibri Malware to Wannabe Criminals screenshot

Hacking Forums Offer the Colibri Malware to Wannabe Criminals

The Colibri Malware is being rented out on hacking forums. This means that any cybercriminal from around the world can start using it, as long as they are prepared to pay some money to the original creators. Needless... Read more

March 4, 2022
Jester Stealer Malware Rented on Hacking Forums screenshot

Jester Stealer Malware Rented on Hacking Forums

Malware-as-a-service has been a popular concept among cybercriminals for a long time. There are plenty of malware developers who offer to rent out or even sell their products to likeminded crooks who are willing to... Read more

February 28, 2022
Kraken Botnet Utilizes a Wide Range of Payloads screenshot

Kraken Botnet Utilizes a Wide Range of Payloads

Kraken Botnet is a major botnet project, which has been steadily growing over the past couple of months. What started as a relatively simple botnet with a low infection rate, has now turned into a large-scale campaign... Read more

February 18, 2022
Remove Ginzo Stealer screenshot

Remove Ginzo Stealer

Ginzo Stealer is a dangerous piece of malware being promoted via Telegram groups and online hacking forums frequented by cybercriminals. The creators of Ginzo Stealer advertise is a free to use tool, which packs all... Read more

March 28, 2022
The Bitxor20 Botnet Abuses the Log4J Vulnerability screenshot

The Bitxor20 Botnet Abuses the Log4J Vulnerability

The Log4J vulnerability has enabled dozens of cybercriminals to rapidly expand their reach, and amplify the efficiency of their attacks. One of the malware families that flew under the radar so far, has been the... Read more

March 16, 2022
Pripyat Miner Sold on Hacking Forums screenshot

Pripyat Miner Sold on Hacking Forums

Russian malware creators are selling and renting out a new piece of malware, which has the ability to utilize a system's CPU resources in order to mine for Monero. While cryptocurrency mining malware is not novel, new... Read more

March 10, 2022
IsaacWiper Malware Destroys Systems of Ukrainian Institutions screenshot

IsaacWiper Malware Destroys Systems of Ukrainian Institutions

The Russian invasion in Ukraine has prompted Russia-backed hacker groups to ramp up their attacks against Ukrainian companies & institutions. Of course, the goal of these attacks is immediate destruction, and this... Read more

March 2, 2022
Destructive HermeticWiper Malware Targets Ukrainian Entities screenshot

Destructive HermeticWiper Malware Targets Ukrainian Entities

The Russian cyber division have unleashed a flurry of attacks or Ukrainian systems and network infrastructure. The ongoing military conflict is fought both in the real world, and on the Internet. One of the new... Read more

February 25, 2022
Is 'tone.exe' Dangerous? screenshot

Is 'tone.exe' Dangerous?

Seeing weird names and applications in the Windows Task Manager is not something that you should ignore. While many of those are likely to turn out to be system processes and components of safe applications, there is... Read more

February 15, 2022
Loading...