Malware

The bateleur backdoor is the new weapon in the Carbank gang’s arsenalThe bateleur backdoor is the new weapon in the Carbank gang’s arsenal

The bateleur backdoor is the new weapon in the Carbank gang’s arsenal

Experts at Proofpoint noticed the infamous cyber crime gang Carbanak has added a new JScript backdoor dubbed Bateleur Backdoor to its…

8 years ago
The Svpeng Trojan continues to evolve, the last variant includes keylogger capabilitiesThe Svpeng Trojan continues to evolve, the last variant includes keylogger capabilities

The Svpeng Trojan continues to evolve, the last variant includes keylogger capabilities

Security experts at Kaspersky discovered the dreaded Svpeng Trojan has been recently modified to implement keylogger features. Cyber criminals are…

8 years ago

Pharmaceutical giant Merck confirmed NotPetya attack disrupted operations worldwide

The US pharmaceutical company Merck revealed that the massive NotPetya cyberattack has disrupted its worldwide operations. The US pharmaceutical company…

8 years ago
CopyFish Extension for Chrome Stolen And Updated With Trojan AdwareCopyFish Extension for Chrome Stolen And Updated With Trojan Adware

CopyFish Extension for Chrome Stolen And Updated With Trojan Adware

Crooks recently hacked the popular Google Chrome extension Copyfish after compromising the Chrome Web Store account of German developer team…

8 years ago
Experts spotted Triada Trojan in firmware of low-cost Android smartphonesExperts spotted Triada Trojan in firmware of low-cost Android smartphones

Experts spotted Triada Trojan in firmware of low-cost Android smartphones

Malware researchers at the Russian anti-virus firm Dr.Web have spotted the Triada Trojan in the firmware of several low-cost Android smartphones.…

8 years ago
Malware experts at ESET released a free tool for ICS Malware analysisMalware experts at ESET released a free tool for ICS Malware analysis

Malware experts at ESET released a free tool for ICS Malware analysis

Security experts from ESET that spotted the Industroyer malware used against Ukraine's power grid released a free tool for ICS…

8 years ago
Wikileaks Vault 7 – Imperial projects revealed the 3 hacking tools Achilles, SeaPea and AerisWikileaks Vault 7 – Imperial projects revealed the 3 hacking tools Achilles, SeaPea and Aeris

Wikileaks Vault 7 – Imperial projects revealed the 3 hacking tools Achilles, SeaPea and Aeris

Wikileaks published another batch of classified documents from the CIA Vault 7 leak, it includes details of the Imperial project.…

8 years ago
Google experts blocked a new targeted malware family, the Lipizzan spywareGoogle experts blocked a new targeted malware family, the Lipizzan spyware

Google experts blocked a new targeted malware family, the Lipizzan spyware

Google has identified a new strain of Android malware, the Lipizzan spyware, that could be used as a powerful surveillance tool.…

8 years ago
Chinese Police dismantled the behind the Fireball adware campaign that infected more than 250 Million PCsChinese Police dismantled the behind the Fireball adware campaign that infected more than 250 Million PCs

Chinese Police dismantled the behind the Fireball adware campaign that infected more than 250 Million PCs

Chinese authorities arrested eleven members of the gang behind the Fireball adware campaign that infected more than 250 Million PCs. Chinese…

8 years ago
New CowerSnail Windows Backdoor linked to SHELLBIND SambaCry Linux MalwareNew CowerSnail Windows Backdoor linked to SHELLBIND SambaCry Linux Malware

New CowerSnail Windows Backdoor linked to SHELLBIND SambaCry Linux Malware

Malware researchers at Kaspersky Lab have found a new Windows Backdoor dubbed CowerSnail linked to the recently discovered SHELLBIND SambaCry Linux malware. Security experts…

8 years ago