Malware

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites<gwmw style="display:none;"></gwmw>

An international law enforcement operation seized the dark web data leak site of the BlackSuit ransomware group. A banner on…

7 months ago

Koske, a new AI-Generated Linux malware appears in the threat landscape

Koske is a new Linux malware designed for cryptomining, likely developed with the help of artificial intelligence. Koske is a…

7 months ago

Coyote malware is first-ever malware abusing Windows UI Automation

New Coyote malware uses Windows UI Automation to steal banking credentials, targeting Brazilian users across 75 banks and crypto platforms.…

7 months ago

Stealth backdoor found in WordPress mu-Plugins folder

A new stealth backdoor has been discovered in the WordPress mu-plugins folder, granting attackers persistent access and control over compromised…

7 months ago

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

Iran-linked APT MuddyWater is deploying new DCHSpy spyware variants to target Android users amid the ongoing conflict with Israel. Lookout…

7 months ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 54

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape KongTuke…

7 months ago

Authorities released free decryptor for Phobos and 8base ransomware<gwmw style="display:none;"></gwmw>

Japanese police released a free decryptor for Phobos and 8Base ransomware, letting victims recover files without paying ransom. Japanese authorities…

7 months ago

LameHug: first AI-Powered malware linked to Russia’s APT28

LameHug malware uses AI to create data-theft commands on infected Windows systems. Ukraine links it to the Russia-nexus APT28 group.…

7 months ago

<gwmw style="display: none; background-color: transparent;"></gwmw>UNC6148 deploys Overstep malware on SonicWall devices, possibly for ransomware operations<gwmw style="display: none; background-color: transparent;"></gwmw>

UNC6148 targets SonicWall devices with Overstep malware, using a backdoor and rootkit for data theft, extortion, or ransomware. Google’s Threat…

7 months ago

Android Malware Konfety evolves with ZIP manipulation and dynamic loading

A new Konfety Android malware variant uses a malformed ZIP and obfuscation to evade detection, posing as fake apps with…

7 months ago

This website uses cookies.