Malware

Crime ring linked to Luminosity RAT dismantled by an international law enforcement operationCrime ring linked to Luminosity RAT dismantled by an international law enforcement operation

Crime ring linked to Luminosity RAT dismantled by an international law enforcement operation

The Europol’s European Cybercrime Centre along with the UK NSA disclosed the details of an international law enforcement operation that dismantled a…

7 years ago
ADB.Miner, the Android mining botnet that targets devices with ADB interface openADB.Miner, the Android mining botnet that targets devices with ADB interface open

ADB.Miner, the Android mining botnet that targets devices with ADB interface open

Security researchers at Qihoo 360's Netlab have spotted a new Android mining botnet that targets devices with ADB interface open. Security…

7 years ago
Cisco and FireEye Pointing Finger at North Korea Hacking Group For Adobe Flash 0-Day In The WildCisco and FireEye Pointing Finger at North Korea Hacking Group For Adobe Flash 0-Day In The Wild

Cisco and FireEye Pointing Finger at North Korea Hacking Group For Adobe Flash 0-Day In The Wild

According to security researchers at Cisco and FireEye a North Korea Hacking Group is behind the attacks that exploited the…

7 years ago
GandCrab, a new ransomware-as-a-service emerges from Russian crime undergroundGandCrab, a new ransomware-as-a-service emerges from Russian crime underground

GandCrab, a new ransomware-as-a-service emerges from Russian crime underground

Experts at cyber security firm LMNTRIX have discovered a new ransomware-as-a-service dubbed GandCrab. advertised in Russian hacking community on the dark web. Experts…

7 years ago
JenX botnet leverages Grand Theft Auto videogame community to infect devicesJenX botnet leverages Grand Theft Auto videogame community to infect devices

JenX botnet leverages Grand Theft Auto videogame community to infect devices

Researchers at security firm Radware have spotted a new IoT botnet, dubbed JenX, the leverages the Grand Theft Auto videogame community…

7 years ago
Chinese Iron Tiger APT is back, a close look at the Operation PZChaoChinese Iron Tiger APT is back, a close look at the Operation PZChao

Chinese Iron Tiger APT is back, a close look at the Operation PZChao

Chinese Iron Tiger APT is back, the new campaign, dubbed by Operation PZChao is targeting government, technology, education, and telecommunications…

7 years ago
DDG, the second largest mining botnet targets Redis and OrientDB serversDDG, the second largest mining botnet targets Redis and OrientDB servers

DDG, the second largest mining botnet targets Redis and OrientDB servers

Researchers at Qihoo 360's Netlab analyzed a new campaign powered by the DDG botnet, the second largest mining botnet of…

7 years ago
WannaMine, the sophisticated crypto miner that spreads via NSA EternalBlue exploitWannaMine, the sophisticated crypto miner that spreads via NSA EternalBlue exploit

WannaMine, the sophisticated crypto miner that spreads via NSA EternalBlue exploit

Researchers from security firm CrowdStrike spotted a new Monero crypto-mining worm dubbed WannaMine that spreads leveraging the NSA-linked EternalBlue exploit. This morning…

7 years ago
Mining Smominru botnet used NSA exploit to infect more than 526,000 systemsMining Smominru botnet used NSA exploit to infect more than 526,000 systems

Mining Smominru botnet used NSA exploit to infect more than 526,000 systems

Researchers from Proofpoint discovered a huge botnet dubbed 'Smominru' that is using the EternalBlue exploit to infect Windows computers and recruit them…

7 years ago
Malware exploiting Spectre and Meltdown flaws are currently based on available PoCMalware exploiting Spectre and Meltdown flaws are currently based on available PoC

Malware exploiting Spectre and Meltdown flaws are currently based on available PoC

Malware Exploiting Spectre, Meltdown Flaws Emerges Researchers at the antivirus testing firm AV-TEST have discovered more than 130 samples of…

7 years ago