Malware
SHurk Steal, an Infostealer, Rented Out by Malware Developers
SHurk Steal is a malicious application whose creators are renting it out to likeminded criminals. Unfortunately, it seems very likely that SHurk Steal may attract a lot of attention from the hacking community. Its... Read more
LemonCat Malware Executes Devastating Attacks, Carries the Ramnit Trojan
The Lemon Duck Malware has been around since 2019. It is still known for being part of one of the largest cryptojacking campaigns in recent years and, unfortunately, it seems like the criminals behind it are not... Read more
The dmechant Malware Preys on Cryptocurrency Wallets and Browser Data
A previously unknown cybercrime group is spreading a new piece of malware called dmechant. The criminals approach their victims through fake phishing emails, which urge them to download a file attachment. The bogus... Read more
Mirai_Ptea Botnet Compromises DVR Devices
The creators of the Mirai Botnet may have no idea what they unleashed on the Internet once they decided to publish the source code of the project. This move enables any cybercriminal with some programming experience... Read more
Vigilante Malware Stops 'Internet Pirates' from Accessing Pirated Content
Some cybercriminals do it for the money, while others are chasing glory in the underground world of hackers. But there are also some cybercriminals whose motivations are truly surprising. The creators of the so-called... Read more
Gelsevirine Malware
The Gelsevirine Malware is a threatening implant, which is a private piece of malware part of the arsenal of the Gelsemium APT. In the past, criminals have been involved in large-scale attacks against various entities... Read more
Meteor Wiper Malware Hits Iranian Railways
In recent years we have seen a massive change in the way cybercriminals operate. Instead of using destructive malware, they have focused on developing complicated extortion schemes or high-quality malware that steals... Read more
Activity of the Taurus Loader Continues to Increase, Delivers Other Malware
The cybercrime gang behind the Taurus Stealer is involved in the development and usage of other, less-known malware families. One of these is the Taurus Loader. It has been around for over a year, and it still... Read more
Remove Frost Clipper Malware
The Frost Clipper Malware is a new project, which is being promoted on underground hacking forums. While sometimes malware creators use their creations in their own campaigns, there also malware developers who opt to... Read more
Lu0bot Malware, an Intriguing Threat Built on Node.JS
Cybercriminals use different strategies to profit from the systems they compromise or from the data they manage to steal. Some of them use it to execute more elaborate attacks, while others try to cash out as soon as... Read more
Matanbuchus Malware-as-a-Service Rented Out on Hacking Forums
The Matanbuchus Malware is a newly identified piece of Loader malware. Typically, threats of this type are not the core of hacker attacks and, instead, they are used to deliver subsequent payloads, as well as to... Read more
Southeast Asia Government Entities Targeted by the Victory Backdoor
Cybersecurity specialists have identified a new cybercrime espionage campaign, which targets diplomatic and government entities in Southeast Asia. While the perpetrator of the attack is yet to be identified, experts... Read more
Remove Great Discover
Great Discover is a fake Windows application, which is typically installed without the user's approval. It is not the product of an official software publisher, and you will not find any official information regarding... Read more
The DevilsTongue Malware Comes Out of Israel, Targets High-profile Individuals
People often imagine malware developers and users as geeky hackers sitting in dark rooms, day and night. However, would you believe it if you were told that there is another type of malware developers – who, in fact,... Read more
Remove Extended Clipper Malware
Clipper Malware is a type of cyber threat, which works in a very simple way. It works in the background and monitors the Windows clipboard. It checks everything that the user stores there and only gets to work if it... Read more
Crackonosh Malware Enslaves Computers to Mine for Monero
Even though the prices of cryptocurrencies fell significantly over the past two months, cybercriminals are still relying on cryptojacking campaigns and malware to maximize their profits. Recently, a new report about... Read more
RedDelta Hackers Go After Religious and Political Entities
RedDelta is a name used to identify a new piece of malware, as well as the Advanced Persistent Threat (APT) group developing and operating it. According to cybersecurity experts, the RedDelta Malware shares many... Read more
Remove SteamHide Malware
Cybercriminals often abuse legitimate online services to aid them with their malicious campaigns. For example, it is not uncommon to see Dropbox being used as a makeshift server for data exfiltration or Telegram being... Read more