Malware

Owowa Malware Discovered on Microsoft Exchange IIS Servers screenshot

Owowa Malware Discovered on Microsoft Exchange IIS Servers

Microsoft Servers have been the target of multiple, large-scale cybercrime attacks in 2021. One of the latest campaigns involves the deployment of a malicious IIS add-on, which is classified as malware called Owowa.... Read more

December 15, 2021
oom_reaper Malware Discovered on QNAP NAS Devices screenshot

oom_reaper Malware Discovered on QNAP NAS Devices

Malware has gone a long way in the past decade. Before, most malware was focused on harvesting information, spying users, or damaging their files. And while many modern malware families still do this, there are also... Read more

December 9, 2021
Clipgrab App and Malware Suspicions screenshot

Clipgrab App and Malware Suspicions

Clipgrab is the name of an application available both for Windows and macOS. The intended purpose of Clipgrab is to allow users to download videos from online streaming sites. This functionality alone goes against the... Read more

December 2, 2021
Chinotto Spyware Targets North Korean Defectors screenshot

Chinotto Spyware Targets North Korean Defectors

The Chinotto Spyware is a malicious implant that is being used by the North Korean Advanced Persistent Threat (APT) group known as ScarCruft. This state-sponsored group works in the interest of the North Korean... Read more

November 30, 2021
ESpecter Bootkit Has Been Planting Backdoors Since 2012 screenshot

ESpecter Bootkit Has Been Planting Backdoors Since 2012

ESpecter is a malicious implant, which has been identified as a bootkit. Although this malware was identified just recently, it has been active since 2012 – this shows how stealthy it has the ability to be. Of course,... Read more

November 24, 2021
'linux_avp' Malware Used to Plant Web Skimmers screenshot

'linux_avp' Malware Used to Plant Web Skimmers

The 'linux_avp' Malware is a very specific malicious implant that has been discovered on e-commerce servers. The primary goal of the malicious threat is to modify the contents of specific e-commerce files in order to... Read more

November 19, 2021
Cryptbot Infostealer Spreads Through Pirated Software screenshot

Cryptbot Infostealer Spreads Through Pirated Software

Pirated software and games are one of the most popular tricks that malware creators use to spread their payloads. Recently, malware researchers identified a new campaign of this type. It focuses on spreading the... Read more

December 10, 2021
CoinHelper Malware Hijacks Your CPU screenshot

CoinHelper Malware Hijacks Your CPU

Malware that targets cryptocurrency users has certainly been on the rise in recent years, especially because of the booming cryptocurrency markets. Unfortunately, many users have still not taken enough measures to... Read more

December 6, 2021
EwDoor Botnet Focuses on DDoS Attacks screenshot

EwDoor Botnet Focuses on DDoS Attacks

The EwDoor Botnet is a relatively new project, which appears to be active in the United States. Although the project appears to have been online for just a few months, its creators are taking advantage of a very old... Read more

December 1, 2021
Babadeda Crypter Obfuscates RATs Targeting Cryptocurrency Communities screenshot

Babadeda Crypter Obfuscates RATs Targeting Cryptocurrency Communities

Crypter may sound like a synonym of ransomware, but these two words mean entirely different things in the world of cybercrime. Crypters are tools that hackers use to obfuscate and mask malicious files. These crypters... Read more

November 29, 2021
Remove Uwamson screenshot

Remove Uwamson

Uwamson is a detection names that appears to often be used by Windows Defender. But what is Uwamson, and is it really a virus? According to user reports, the file that the security feature detects might often turn out... Read more

November 22, 2021
Remove Grakate Stealer screenshot

Remove Grakate Stealer

Rentable malware is certainly not a new concept. Many malware developers prefer to rent out their software to the highest bidders instead of using it by themselves. This not only makes it easy for them to monetize... Read more

November 19, 2021
Dark Mirai Botnet Targets TP-LINK TL-24840N Routers screenshot

Dark Mirai Botnet Targets TP-LINK TL-24840N Routers

The Dark Mirai Botnet is one of the many variations of the Mirai Botnet, which has been a threat to IoT devices for the past five years. While the original project has been dead for a long time, the publicly available... Read more

December 10, 2021
Tor2Mine Harvests CPU Resources to Mine Monero screenshot

Tor2Mine Harvests CPU Resources to Mine Monero

Cryptocurrency mining malware continues to be one of the hottest trends among cybercriminals. This type of malware works silently on infected devices, and exploits their hardware to mine for cryptocurrency. One of the... Read more

December 3, 2021
botaa3 Malware Resides in Fake PyPi Python Packages screenshot

botaa3 Malware Resides in Fake PyPi Python Packages

Lately, more and more cybercriminals have been planting their malicious software inside repositories for scripts, browser add-ons, or other sort of content. One of the recent examples of this is the botaa3 Malware,... Read more

November 30, 2021
'Noblox.js' NPM Malware Targets Roblox Players screenshot

'Noblox.js' NPM Malware Targets Roblox Players

Cybercriminals often exploit innovative methods to deliver their payloads to victims. In recent years, many of them have tried abusing fake NPM packages to achieve this. But before we go into more details, let's... Read more

November 29, 2021
HackTool:Win32/Keygen - What Is It and How Dangerous? screenshot

HackTool:Win32/Keygen - What Is It and How Dangerous?

HackTool:Win32/Keygen is the detection handle assigned to a potentially malicious file by the Microsoft Windows Defender software. HackTool:Win32/Keygen is not the name of the actual threat, the container, or the... Read more

November 22, 2021
BotenaGo Botnet: Actively Infecting IoT Devices, Its Goal is Unknown screenshot

BotenaGo Botnet: Actively Infecting IoT Devices, Its Goal is Unknown

A new large-scale attack against Internet-of-Things (IoT) devices has been identified by cybersecurity vendors. The attack appears to enslave devices in order to make them a part of the new BotenaGo Botnet. This... Read more

November 12, 2021
Loading...