Malware

Victims of Jaff Ransomware now can decrypt their locked files for free thanks to KasperskyVictims of Jaff Ransomware now can decrypt their locked files for free thanks to Kaspersky

Victims of Jaff Ransomware now can decrypt their locked files for free thanks to Kaspersky

Victims of the Jaff ransomware can use an updated version of the Kaspersky Labs's RakhniDecryptor tool to decrypt their encrypted…

8 years ago
MACSPY – Remote Access Trojan as a service on Dark webMACSPY – Remote Access Trojan as a service on Dark web

MACSPY – Remote Access Trojan as a service on Dark web

Reporters for the online service "Bleeping Computer" have uncovered a new threat to Apple being offered on the dark web,…

8 years ago
Emerging Matrix Banker Trojan is targeting banks in Latin AmericaEmerging Matrix Banker Trojan is targeting banks in Latin America

Emerging Matrix Banker Trojan is targeting banks in Latin America

Security Experts at Arbor Networks have spotted a new banking trojan, initially called 'Matrix Banker', that is targeting Latin America.…

8 years ago
Experts spotted Industroyer ICS Malware and linked it to Ukraine Power OutageExperts spotted Industroyer ICS Malware and linked it to Ukraine Power Outage

Experts spotted Industroyer ICS Malware and linked it to Ukraine Power Outage

Researchers at antivirus firm ESET have discovered a new strain of malware, dubbed Industroyer, that appears to have been designed…

8 years ago
MacRansom: The first Mac ransomware offered as a RaaS ServiceMacRansom: The first Mac ransomware offered as a RaaS Service

MacRansom: The first Mac ransomware offered as a RaaS Service

Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware…

8 years ago
Police seized two Tor relays investigating WannaCry attack, others disappeared in the same periodPolice seized two Tor relays investigating WannaCry attack, others disappeared in the same period

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after…

8 years ago
Mouseover PowerPoint attack exploited to deliver the Gootkit TrojanMouseover PowerPoint attack exploited to deliver the Gootkit Trojan

Mouseover PowerPoint attack exploited to deliver the Gootkit Trojan

Experts at Trend Micro observed a spam campaign leveraging the PowerPoint 'Mouseover' attack to deliver the Gootkit banking Trojan. Earlier…

8 years ago
Hundred of thousands of IP Cameras Hijacked by Persirai and other thingbotsHundred of thousands of IP Cameras Hijacked by Persirai and other thingbots

Hundred of thousands of IP Cameras Hijacked by Persirai and other thingbots

Thousands of IP cameras have been hijacked by the Persirai IoT botnet that targets more than 1,000 IP camera models,…

8 years ago
A new Linux Malware targets Raspberry Pi devices to mine CryptocurrencyA new Linux Malware targets Raspberry Pi devices to mine Cryptocurrency

A new Linux Malware targets Raspberry Pi devices to mine Cryptocurrency

Security researchers at Dr. Web discovered two new Linux Malware, one of them mines for cryptocurrency using Raspberry Pi Devices.…

8 years ago
Turla APT malware now retrieves C&C address from Instagram commentsTurla APT malware now retrieves C&C address from Instagram comments

Turla APT malware now retrieves C&C address from Instagram comments

A malicious code used by Turla APT in a recent campaign leverages comments posted to Instagram to obtain the address…

8 years ago