Malware

Vawtrak v2, a close look at the cybercriminal groups behind the threat

Security experts from the cyber threat intelligence firm Blueliv have published a report on the banking Trojan Vawtrak v2 its…

8 years ago

Hacking industrial processes with and undetectable PLC Rootkit

Two security researchers have developed an undetectable PLC rootkit that will present at the upcoming Black Hat Europe 2016. The…

8 years ago

Mamba: The new Full Disk Encryption Ransomware Family Member

A Brazilian Infosec research group, Morphus Labs, just discovered a new Full Disk Encryption (FDE) Ransomware this week, dubbed Mamba.…

8 years ago

GovRAT 2.0 continues to target US companies and Government

Vxers developed a new version of GovRAT, called GovRAT, that has been used to target government and many other organizations…

8 years ago

Motherboard shows us how surveillance software works

Surveillance is a profitable business, Motherboard has published a never-before-seen 10-minute video showing a live demo of a surveillance software.…

8 years ago

Mal/Miner-C mining malware leverages NAS devices to spread itself

Experts from Sophos discovered Mal/Miner-C, a malware designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency.…

8 years ago

LuaBot is the first Linux DDoS botnet written in Lua Language

The researcher MalwareMustDie discovered LuaBot, a trojan completely coded in Lua language that is targeting Linux platforms to recruit them…

8 years ago

Doctor Web discovers the first Linux Trojan that is written in Rust language

Experts from Dr Web discovered a new Linux Trojan called Linux.BackDoor.Irc.16 that is written in the Rust programming language. It…

8 years ago

Cross-platform Mokes backdoor OS X exists and is spreading in the wild

Malware researchers from Kaspersky Lab confirmed the existence of an OS X variant of the Mokes backdoor discovered in January…

8 years ago

CSTO Ransomware, a malware that uses UDP and Google Maps

CSTO ransomware it is able to query the Google Maps API to discover the victim's location and connects to the…

8 years ago

This website uses cookies.