Malware
Moserpass Malware Spread Through Supply-chain Attack Involving Popular Password Manager
Supply-chain attack campaigns are one of the most difficult and dangerous methods that cybercriminals use to propagate malware. These attacks are executed by compromising a legitimate software vendor's network, and... Read more
Pareto Botnet Targets Internet-of-Things Devices
Modern botnet creators rarely go after computers and, instead, they are looking into exploiting a far more widely spread piece of technology – Internet-of-things (IoT) devices. In short, IoT devices are pretty much... Read more
How to Remove Lime RAT
Lime RAT is a simple Remote Access Trojan (RAT,) which used to be spread with the use of maliciously modified Microsoft Excel documents. While the largest Lime RAT campaign took place in 2020, it is likely that the... Read more
HackBoss Malware Spread Through Telegram
A group of cybercriminals is abusing the Telegram messaging service to propagate fake software, which poses as hacking tools meant to serve a wide range of purposes. It appears that the 'mastermind' behind the... Read more
How to Remove the Vyveva Backdoor Trojan
The Vyveva Backdoor Trojan is a malicious piece of software whose development and usage is attributed to the Advanced Persistent Threat (APT) actor known as Lazarus. The Lazarus APT is behind some of the most... Read more
How to Remove FoundCore Malware
FoundCore Malware is an old, but newly identified malware family, which is being used and developed by an Advanced Persistent Threat (APT) group tracked under the alias APT27 (also known as Cycldek or Goblin Panda.)... Read more
Sysrv-hello Botnet
The Sysrv-hello Botnet is a malicious project, which has been tracked closely by cybersecurity researchers since December 2020. The criminals behind this campaign are aiming to install a cryptocurrency miner on... Read more
ToxicEye Malware Hides in Fake Hacking Tools Promoted via Telegram
ToxicEye is a newly identified malware strain, which has the ability to take over compromised computers and provide attackers with access to features typical for Remote Access Trojans (RATs.) Instead of using a... Read more
How to Remove the DarkStealer Malware
The DarkStealer Malware is a malicious application being actively promoted on hacking forums by its original creators. However, they do not intend to use the infostealer as a private hacking tool and, instead, they... Read more
LinkedIn-oriented Spam Campaign Spreads the More_eggs Malware
More_eggs is the name of a unique piece of malware developed by a cybercrime organization known under the name Golden Chickens. This group specializes in providing other threat actors with access to their uniquely... Read more
How to Remove FlixOnline Malware
Cybercriminals are using a fake promotional offer for Netflix, to propagate a new piece of Android malware. The corrupted Android application, dubbed FlixOnline, is promoted through emails, advertisements, and... Read more
How to Remove Janeleiro
Banking Trojans are the preferred malware by cybercriminals in Latin America. Typically, these threats are very active in Brazil and the surrounding countries, and Janeleiro fits this exact profile. This banking... Read more
TEARDROP Malware
The TEARDROP Malware is identified as a basic Trojan Dropper, which was used by the cybercriminals behind the recent supply-chain attack linked to the SolarWinds software vendor. This campaign involved the use of a... Read more
How to Remove HabitsRAT
HabitsRAT is a Remote Access Trojan (RAT,) which was first detected when it was carrying out attacks against compromised Microsoft Exchange Servers. However, the threat's creators appear to have expanded their... Read more
Beware of the WhatsApp Pink Malware
Cybercriminals often shill their latest piece of mobile malware by promoting it as an enhanced version of a popular piece of software like Instagram, WhatsApp, Telegram, Snapchat, etc. One of the latest malware... Read more
How to Remove the Saint Bot Malware
The Saint Bot Malware is a small piece of malware, which was first spotted in an email spam campaign, which piggybacked on the popularity of the COVID-19 statistics. This campaign took place near the end of 2020, and... Read more
Removal Process for SBIDIOT Malware
The SBIDIOT Malware is a new threat, which has a relatively low infection rate and targets Internet-of-Things (IoT) devices exclusively. The threat supports several types of commands, which allow it to execute... Read more
How To Remove Google Chrome Redirect Virus
In its essence a Chrome redirect threat is a class of potentially unwanted software which would infiltrate your computer and change your search page usually without your knowledge. This sort of threat has existed for... Read more