Malware

Several apps on the Play Store used to spread Joker, Facestealer and Coper malware

Google blocked dozens of malicious apps from the official Play Store that were spreading Joker, Facestealer, and Coper malware families.…

4 years ago

MLNK Builder 4.2 released in Dark Web – malicious shortcut-based attacks are on the rise

Cybercriminals released a new MLNK Builder 4.2 tool for malicious shortcuts (LNK) generation with an improved Powershell and VBS Obfuscator…

4 years ago

Graff paid a $7.5M ransom and sued its insurance firm for refusing to cover this payment

The high-end British jeweler Graff paid a £6 million ransom after the ransomware attack it suffered in 2021. In September…

4 years ago

APT groups target journalists and media organizations since 2021

Researchers from Proofpoint warn that various APT groups are targeting journalists and media organizations since 2021. Proofpoint researchers warn that…

4 years ago

Tainted password-cracking software for industrial systems used to spread P2P Sality bot

Dragos researchers uncovered a small-scale campaign targeting industrial engineers and operators with Sality malware. During a routine vulnerability assessment, Dragos…

4 years ago

Holy Ghost ransomware operation is linked to North Korea

Microsoft researchers linked the Holy Ghost ransomware (H0lyGh0st) operation to North Korea-linked threat actors. The Microsoft Threat Intelligence Center (MSTIC)…

4 years ago

RedAlert, LILITH, and 0mega, 3 new ransomware in the wild

Cyble researchers warn of three new ransomware operations named Lilith, RedAlert and 0mega targeting organizations worldwide. Researchers from threat intelligence…

4 years ago

Qakbot operations continue to evolve to avoid detection

Experts warn that operators behind the Qakbot malware operation are improving their attack chain in an attempt to avoid detection.…

4 years ago

Cloud-Based Cryptocurrency mining attacks abuse GitHub Actions and Azure VM

Researchers investigated cloud-based cryptocurrency mining attacks targeting GitHub Actions and Azure VMs. Researchers from Trend Micro published a report that…

4 years ago

Anubis Networks is back with new C2 server

A large-scale phishing campaign leveraging the Anubis Network is targeting Brazil and Portugal since March 2022. A large-scale phishing campaign…

4 years ago

This website uses cookies.