Malware

Moserpass Malware Spread Through Supply-chain Attack Involving Popular Password Manager screenshot

Moserpass Malware Spread Through Supply-chain Attack Involving Popular Password Manager

Supply-chain attack campaigns are one of the most difficult and dangerous methods that cybercriminals use to propagate malware. These attacks are executed by compromising a legitimate software vendor's network, and... Read more

April 28, 2021
Pareto Botnet Targets Internet-of-Things Devices screenshot

Pareto Botnet Targets Internet-of-Things Devices

Modern botnet creators rarely go after computers and, instead, they are looking into exploiting a far more widely spread piece of technology – Internet-of-things (IoT) devices. In short, IoT devices are pretty much... Read more

April 23, 2021
How to Remove Lime RAT screenshot

How to Remove Lime RAT

Lime RAT is a simple Remote Access Trojan (RAT,) which used to be spread with the use of maliciously modified Microsoft Excel documents. While the largest Lime RAT campaign took place in 2020, it is likely that the... Read more

April 21, 2021
HackBoss Malware Spread Through Telegram screenshot

HackBoss Malware Spread Through Telegram

A group of cybercriminals is abusing the Telegram messaging service to propagate fake software, which poses as hacking tools meant to serve a wide range of purposes. It appears that the 'mastermind' behind the... Read more

April 19, 2021
How to Remove the Vyveva Backdoor Trojan screenshot

How to Remove the Vyveva Backdoor Trojan

The Vyveva Backdoor Trojan is a malicious piece of software whose development and usage is attributed to the Advanced Persistent Threat (APT) actor known as Lazarus. The Lazarus APT is behind some of the most... Read more

April 9, 2021
How to Remove FoundCore Malware screenshot

How to Remove FoundCore Malware

FoundCore Malware is an old, but newly identified malware family, which is being used and developed by an Advanced Persistent Threat (APT) group tracked under the alias APT27 (also known as Cycldek or Goblin Panda.)... Read more

April 7, 2021
Sysrv-hello Botnet screenshot

Sysrv-hello Botnet

The Sysrv-hello Botnet is a malicious project, which has been tracked closely by cybersecurity researchers since December 2020. The criminals behind this campaign are aiming to install a cryptocurrency miner on... Read more

April 26, 2021
ToxicEye Malware Hides in Fake Hacking Tools Promoted via Telegram screenshot

ToxicEye Malware Hides in Fake Hacking Tools Promoted via Telegram

ToxicEye is a newly identified malware strain, which has the ability to take over compromised computers and provide attackers with access to features typical for Remote Access Trojans (RATs.) Instead of using a... Read more

April 23, 2021
How to Remove the DarkStealer Malware screenshot

How to Remove the DarkStealer Malware

The DarkStealer Malware is a malicious application being actively promoted on hacking forums by its original creators. However, they do not intend to use the infostealer as a private hacking tool and, instead, they... Read more

April 20, 2021
LinkedIn-oriented Spam Campaign Spreads the More_eggs Malware screenshot

LinkedIn-oriented Spam Campaign Spreads the More_eggs Malware

More_eggs is the name of a unique piece of malware developed by a cybercrime organization known under the name Golden Chickens. This group specializes in providing other threat actors with access to their uniquely... Read more

April 13, 2021
How to Remove FlixOnline Malware screenshot

How to Remove FlixOnline Malware

Cybercriminals are using a fake promotional offer for Netflix, to propagate a new piece of Android malware. The corrupted Android application, dubbed FlixOnline, is promoted through emails, advertisements, and... Read more

April 8, 2021
How to Remove Janeleiro screenshot

How to Remove Janeleiro

Banking Trojans are the preferred malware by cybercriminals in Latin America. Typically, these threats are very active in Brazil and the surrounding countries, and Janeleiro fits this exact profile. This banking... Read more

April 7, 2021
TEARDROP Malware screenshot

TEARDROP Malware

The TEARDROP Malware is identified as a basic Trojan Dropper, which was used by the cybercriminals behind the recent supply-chain attack linked to the SolarWinds software vendor. This campaign involved the use of a... Read more

April 26, 2021
How to Remove HabitsRAT screenshot

How to Remove HabitsRAT

HabitsRAT is a Remote Access Trojan (RAT,) which was first detected when it was carrying out attacks against compromised Microsoft Exchange Servers. However, the threat's creators appear to have expanded their... Read more

April 21, 2021
Beware of the WhatsApp Pink Malware screenshot

Beware of the WhatsApp Pink Malware

Cybercriminals often shill their latest piece of mobile malware by promoting it as an enhanced version of a popular piece of software like Instagram, WhatsApp, Telegram, Snapchat, etc. One of the latest malware... Read more

April 20, 2021
How to Remove the Saint Bot Malware screenshot

How to Remove the Saint Bot Malware

The Saint Bot Malware is a small piece of malware, which was first spotted in an email spam campaign, which piggybacked on the popularity of the COVID-19 statistics. This campaign took place near the end of 2020, and... Read more

April 12, 2021
Removal Process for SBIDIOT Malware screenshot

Removal Process for SBIDIOT Malware

The SBIDIOT Malware is a new threat, which has a relatively low infection rate and targets Internet-of-Things (IoT) devices exclusively. The threat supports several types of commands, which allow it to execute... Read more

April 8, 2021
How To Remove Google Chrome Redirect Virus screenshot

How To Remove Google Chrome Redirect Virus

In its essence a Chrome redirect threat is a class of potentially unwanted software which would infiltrate your computer and change your search page usually without your knowledge. This sort of threat has existed for... Read more

February 28, 2021
Loading...