Malware

Vxer is offering Cobian RAT in the underground, but it is backdooredVxer is offering Cobian RAT in the underground, but it is backdoored

Vxer is offering Cobian RAT in the underground, but it is backdoored

Malware writer is offering for free a malware dubbed Cobian RAT in the underground, but the malicious code hides an…

8 years ago

Android Banking Trojan MoqHao targets South Korea users

Security researchers from McAfee have spotted a new Android banking Trojan dubbed MoqHao, targeting South Korean users via SMS phishing messages. Attackers…

8 years ago
India and Pakistan hit by state-sponsored cyber espionage campaignIndia and Pakistan hit by state-sponsored cyber espionage campaign

India and Pakistan hit by state-sponsored cyber espionage campaign

The security firm Symantec has discovered another cyber espionage campaign against India and Pakistan which is likely to be state-sponsored.…

8 years ago
Chinese APT17 group leverages fake Game of Thrones leaks as luresChinese APT17 group leverages fake Game of Thrones leaks as lures

Chinese APT17 group leverages fake Game of Thrones leaks as lures

Researchers at Proofpoint spotted a cyber espionage campaign leveraging recent Game of Thrones episode leaks and attribute it to Chinese APT17…

8 years ago
Defray Ransomware used in targeted attacks on Education and Healthcare verticalsDefray Ransomware used in targeted attacks on Education and Healthcare verticals

Defray Ransomware used in targeted attacks on Education and Healthcare verticals

Researchers at Proofpoint spotted Defray Ransomware, a new ransomware used in a targeted campaign against education and healthcare organizations. Earlier…

8 years ago
Watch out! Adware spreading via Facebook MessengerWatch out! Adware spreading via Facebook Messenger

Watch out! Adware spreading via Facebook Messenger

Security experts from Kaspersky Lab have spotted an ongoing cross-platform malware campaign that leverages Facebook Messenger. Security experts from Kaspersky Lab have spotted an…

8 years ago
Mobile Trojan Development Kits allow creating ransomware without the need to write codeMobile Trojan Development Kits allow creating ransomware without the need to write code

Mobile Trojan Development Kits allow creating ransomware without the need to write code

Researchers at Symantec have discovered Trojan Development Kits that allow creating Android ransomware without the need to write code. Ransomware…

8 years ago
Neptune exploit kit used to deliver Monero cryptocurrency miners via malvertisingNeptune exploit kit used to deliver Monero cryptocurrency miners via malvertising

Neptune exploit kit used to deliver Monero cryptocurrency miners via malvertising

According to a new report published by FireEye, crooks have been using the Neptune exploit kit to deliver cryptocurrency miners…

8 years ago
Fileless cryptocurrency miner CoinMiner uses NSA EternalBlue exploit to spreadFileless cryptocurrency miner CoinMiner uses NSA EternalBlue exploit to spread

Fileless cryptocurrency miner CoinMiner uses NSA EternalBlue exploit to spread

A new fileless miner dubbed CoinMiner appeared in the wild, it uses NSA EternalBlue exploit and WMI tool to spread. A…

8 years ago
SyncCrypt Ransomware hides its components in image filesSyncCrypt Ransomware hides its components in image files

SyncCrypt Ransomware hides its components in image files

A new strain of ransomware distributed through spam emails, dubbed SyncCrypt, hides its components inside harmless-looking images. A new strain of ransomware recently discovered, dubbed SyncCrypt, hides its…

8 years ago