Malware

Experts spotted Industroyer ICS Malware and linked it to Ukraine Power Outage

Researchers at antivirus firm ESET have discovered a new strain of malware, dubbed Industroyer, that appears to have been designed…

8 years ago

MacRansom: The first Mac ransomware offered as a RaaS Service

Malware researchers at security firm Fortinet have spotted MacRansom, it is the first Mac ransomware offered as a RaaS Service. Malware…

8 years ago

Police seized two Tor relays investigating WannaCry attack, others disappeared in the same period

France’s cyber-crime investigation unit OCLCTIC seized one server running two Tor Relays Investigating the WannaCry attack. A few days after…

8 years ago

Mouseover PowerPoint attack exploited to deliver the Gootkit Trojan

Experts at Trend Micro observed a spam campaign leveraging the PowerPoint 'Mouseover' attack to deliver the Gootkit banking Trojan. Earlier…

8 years ago

Hundred of thousands of IP Cameras Hijacked by Persirai and other thingbots

Thousands of IP cameras have been hijacked by the Persirai IoT botnet that targets more than 1,000 IP camera models,…

8 years ago

A new Linux Malware targets Raspberry Pi devices to mine Cryptocurrency

Security researchers at Dr. Web discovered two new Linux Malware, one of them mines for cryptocurrency using Raspberry Pi Devices.…

8 years ago

Turla APT malware now retrieves C&C address from Instagram comments

A malicious code used by Turla APT in a recent campaign leverages comments posted to Instagram to obtain the address…

8 years ago

Experts shut down tens of thousands of subdomains set up with a domain shadowing campaign

Experts killed tens of thousands of subdomains used by crooks to host the RIG Exploit Kit that were set up…

8 years ago

QakBot Banking malware causes massive Active Directory lockouts

Security experts at IBM noticed that hundreds to thousands of Active Directory users were locked out of their company’s domain…

8 years ago

Jaff Ransomware campaigns linked to a black marketplace

Security researchers linked Jaff ransomware campaigns to the backend infrastructure used by operators behind a black market. Security researchers at…

8 years ago

This website uses cookies.