Malware

AHK RAT Loader Delivers a Plethora of RATs screenshot

AHK RAT Loader Delivers a Plethora of RATs

AutoHotKey (AHK) scripts are meant to help users automated certain tasks with the use of pre-made scripts. These scripts come in the form of an '.ahk' file, and they are executed with the use of an interpreter called... Read more

May 18, 2021
KilllSomeOne Malware Uses DLL Side-loading to Deliver Malicious Implants screenshot

KilllSomeOne Malware Uses DLL Side-loading to Deliver Malicious Implants

Cybersecurity experts have identified a new piece of malware dubbed KilllSomeOne. It was employed in attacks against government-affiliated entities and organizations in Myanmar. Delving deep into the infrastructure... Read more

May 12, 2021
Chinese APT May be Behind the Newly Discovered Moriya Rootkit screenshot

Chinese APT May be Behind the Newly Discovered Moriya Rootkit

The Moriya Rootkit is a newly identified threat that, however, might have been working for a long time before it was finally discovered. Rootkits like this one are designed to plant themselves deep into the operating... Read more

May 7, 2021
How to Remove DOUBLEDROP screenshot

How to Remove DOUBLEDROP

Advanced cybercrime groups rarely rely on a single malware family to carry out their attack – typically, they develop a set of hacking tools that would eventually support each other to ensure a swift, silent, and... Read more

May 5, 2021
How to Remove the Zenar Miner screenshot

How to Remove the Zenar Miner

The Zenar Miner is a piece of commodity malware currently being sold on hacking forums. Despite its name, it is not exactly a miner that cybercriminals can use out-of-the-box – instead, it is meant to help them run a... Read more

May 3, 2021
WeSteal Infostealer Sold Online by Inexperienced Malware Developers screenshot

WeSteal Infostealer Sold Online by Inexperienced Malware Developers

Public and private hacking forums are the favorite spot of both novice and experienced cybercriminals. Newbies over there can often spend around $50-$100 to get their hands on a personalized piece of malware, which... Read more

April 30, 2021
Campo Loader Delivers Additional Malware to Japanese Victims screenshot

Campo Loader Delivers Additional Malware to Japanese Victims

Yet another cybercrime campaign is targeting users and organizations in Japan. Experts suspect that the malicious attacks have been taking place since October 2020, but they were only identified and analyzed around... Read more

May 14, 2021
Snip3 Loader Empowers Large-scale RAT Attack Campaigns screenshot

Snip3 Loader Empowers Large-scale RAT Attack Campaigns

Snip3 is a hacking tool that cybercriminals use to load additional payloads on the compromised computer, as well as to help conceal the malicious files from the security scanners and firewalls. The good news is that... Read more

May 10, 2021
Panda Stealer Targets Cryptocurrency Wallets and Web Browsers screenshot

Panda Stealer Targets Cryptocurrency Wallets and Web Browsers

The potential profits that cryptocurrency investments can bring have attracted millions of investors from around the world, and, unfortunately, many of them are likely to become the targets of scammers and... Read more

May 6, 2021
How to Remove DOUBLEBACK screenshot

How to Remove DOUBLEBACK

DOUBLEBACK is a dangerous backdoor Trojan used and developed by an uncategorized threat actor tracked under the alias UNC2529. The criminals were involved in a large-scale cybercrime campaign that took place in... Read more

May 5, 2021
Unknown Chinese APT Targets Russia with the PortDoor Malware screenshot

Unknown Chinese APT Targets Russia with the PortDoor Malware

Advanced Persistent Threat (APT) actors continue with their attacks against high-profile targets. This time, the news headlines mention a new piece of malware identified as PortDoor. It is believed to be used and... Read more

May 3, 2021
WeControl RAT is a Commodity Malware Linked to WeSteal Infostealer screenshot

WeControl RAT is a Commodity Malware Linked to WeSteal Infostealer

The WeControl RAT is a Remote Access Trojan (RAT,) which is being sold online via the official website of the developers, as well as through ads posted on various hacking forums. The good news is that WeControl RAT is... Read more

April 30, 2021
Smilodon Webshell Powers a Magecart-like Skimming Campaign screenshot

Smilodon Webshell Powers a Magecart-like Skimming Campaign

The Magecart gang inspired hundreds of cybercriminals to employ Web-based skimmers in their malicious attacks. The good news is that these campaigns are not that widely spread – attackers who want to get involved need... Read more

May 14, 2021
Remove Lohodf Ransomware screenshot

Remove Lohodf Ransomware

File-encryption Trojans are a type of computer threat, which can cause long-lasting damage to the system and, in particular, your files. Unfortunately, once ransomware has attacked your computer, removing it might not... Read more

May 7, 2021
How to Remove DOUBLEDRAG screenshot

How to Remove DOUBLEDRAG

The DOUBLEDRAG Malware was first spotted in a large-scale attack campaign, which targeted multiple industries, spread around the entire world. While the majority of the attacks were concentrated in the United States,... Read more

May 5, 2021
Pingback Malware Uses the IMCP Windows Service for Sneaky C2 Communication screenshot

Pingback Malware Uses the IMCP Windows Service for Sneaky C2 Communication

Malware researchers have identified a peculiar new malware family that targets Windows systems. It uses a popular trick known as DLL hijacking to fool the Windows operating system into running a maliciously modified... Read more

May 5, 2021
FakeChat Malware Steals Financial Data from Android Devices screenshot

FakeChat Malware Steals Financial Data from Android Devices

The FakeChat Malware is a dangerous banking Trojan seeking to compromise Android mobile devices. The malware was initially spread throughout Spain, but recent attack campaigns have reached other European countries... Read more

April 30, 2021
'web-browserify' Malware Mimics a Legitimate npm Package screenshot

'web-browserify' Malware Mimics a Legitimate npm Package

Cybercriminals often exploit legitimate resources in an attempt to amplify their attacks or the reach of their operations. One recent campaign has seen the use of this exact strategy. This time, the criminals targeted... Read more

April 30, 2021
Loading...