Malware
Owowa Malware Discovered on Microsoft Exchange IIS Servers
Microsoft Servers have been the target of multiple, large-scale cybercrime attacks in 2021. One of the latest campaigns involves the deployment of a malicious IIS add-on, which is classified as malware called Owowa.... Read more
oom_reaper Malware Discovered on QNAP NAS Devices
Malware has gone a long way in the past decade. Before, most malware was focused on harvesting information, spying users, or damaging their files. And while many modern malware families still do this, there are also... Read more
Clipgrab App and Malware Suspicions
Clipgrab is the name of an application available both for Windows and macOS. The intended purpose of Clipgrab is to allow users to download videos from online streaming sites. This functionality alone goes against the... Read more
Chinotto Spyware Targets North Korean Defectors
The Chinotto Spyware is a malicious implant that is being used by the North Korean Advanced Persistent Threat (APT) group known as ScarCruft. This state-sponsored group works in the interest of the North Korean... Read more
ESpecter Bootkit Has Been Planting Backdoors Since 2012
ESpecter is a malicious implant, which has been identified as a bootkit. Although this malware was identified just recently, it has been active since 2012 – this shows how stealthy it has the ability to be. Of course,... Read more
'linux_avp' Malware Used to Plant Web Skimmers
The 'linux_avp' Malware is a very specific malicious implant that has been discovered on e-commerce servers. The primary goal of the malicious threat is to modify the contents of specific e-commerce files in order to... Read more
Cryptbot Infostealer Spreads Through Pirated Software
Pirated software and games are one of the most popular tricks that malware creators use to spread their payloads. Recently, malware researchers identified a new campaign of this type. It focuses on spreading the... Read more
CoinHelper Malware Hijacks Your CPU
Malware that targets cryptocurrency users has certainly been on the rise in recent years, especially because of the booming cryptocurrency markets. Unfortunately, many users have still not taken enough measures to... Read more
EwDoor Botnet Focuses on DDoS Attacks
The EwDoor Botnet is a relatively new project, which appears to be active in the United States. Although the project appears to have been online for just a few months, its creators are taking advantage of a very old... Read more
Babadeda Crypter Obfuscates RATs Targeting Cryptocurrency Communities
Crypter may sound like a synonym of ransomware, but these two words mean entirely different things in the world of cybercrime. Crypters are tools that hackers use to obfuscate and mask malicious files. These crypters... Read more
Remove Uwamson
Uwamson is a detection names that appears to often be used by Windows Defender. But what is Uwamson, and is it really a virus? According to user reports, the file that the security feature detects might often turn out... Read more
Remove Grakate Stealer
Rentable malware is certainly not a new concept. Many malware developers prefer to rent out their software to the highest bidders instead of using it by themselves. This not only makes it easy for them to monetize... Read more
Dark Mirai Botnet Targets TP-LINK TL-24840N Routers
The Dark Mirai Botnet is one of the many variations of the Mirai Botnet, which has been a threat to IoT devices for the past five years. While the original project has been dead for a long time, the publicly available... Read more
Tor2Mine Harvests CPU Resources to Mine Monero
Cryptocurrency mining malware continues to be one of the hottest trends among cybercriminals. This type of malware works silently on infected devices, and exploits their hardware to mine for cryptocurrency. One of the... Read more
botaa3 Malware Resides in Fake PyPi Python Packages
Lately, more and more cybercriminals have been planting their malicious software inside repositories for scripts, browser add-ons, or other sort of content. One of the recent examples of this is the botaa3 Malware,... Read more
'Noblox.js' NPM Malware Targets Roblox Players
Cybercriminals often exploit innovative methods to deliver their payloads to victims. In recent years, many of them have tried abusing fake NPM packages to achieve this. But before we go into more details, let's... Read more
HackTool:Win32/Keygen - What Is It and How Dangerous?
HackTool:Win32/Keygen is the detection handle assigned to a potentially malicious file by the Microsoft Windows Defender software. HackTool:Win32/Keygen is not the name of the actual threat, the container, or the... Read more
BotenaGo Botnet: Actively Infecting IoT Devices, Its Goal is Unknown
A new large-scale attack against Internet-of-Things (IoT) devices has been identified by cybersecurity vendors. The attack appears to enslave devices in order to make them a part of the new BotenaGo Botnet. This... Read more