Malware

Sundown Exploit Kit now leverages on the steganographySundown Exploit Kit now leverages on the steganography

Sundown Exploit Kit now leverages on the steganography

A new variant of the Sundown exploit kit leverages on steganography to hide exploit code in harmless-looking image files. Security…

8 years ago
Dreaded KillDisk Malware now includes Ransomware abilitiesDreaded KillDisk Malware now includes Ransomware abilities

Dreaded KillDisk Malware now includes Ransomware abilities

Researchers at security firm CyberX have recently discovered a variant of the KillDisk malware that also implements ransomware features. KillDisk is…

8 years ago
Android Switcher Trojan targets routers changing DNS settingsAndroid Switcher Trojan targets routers changing DNS settings

Android Switcher Trojan targets routers changing DNS settings

Security experts from Kaspersky Lab have spotted a new Android Trojan, dubbed Switcher, that targets routers in order to change…

8 years ago
Lithuania government PCs infected by a Russian spywareLithuania government PCs infected by a Russian spyware

Lithuania government PCs infected by a Russian spyware

Lithuania said found Russian spyware on its government computers, the government blames Moscow for cyber espionage campaigns. Lithuania blames Russia…

8 years ago
New Alice ATM Malware, a lightweight and efficient threatNew Alice ATM Malware, a lightweight and efficient threat

New Alice ATM Malware, a lightweight and efficient threat

Alice ATM malware is a new threat targeting ATMs discovered by researchers at Trend Micro  as part of a joint…

8 years ago
Linux/Rakos, the new Linux malware threatening devices and serversLinux/Rakos, the new Linux malware threatening devices and servers

Linux/Rakos, the new Linux malware threatening devices and servers

A new Linux malware, dubbed Linux/Rakos is threatening devices and servers. The malware searches for victims via SSH scan. A…

9 years ago
Victims of the CryptXXX v.3 can now use a free tool to decrypt their filesVictims of the CryptXXX v.3 can now use a free tool to decrypt their files

Victims of the CryptXXX v.3 can now use a free tool to decrypt their files

Security researchers have released a decryption tool for unlocking files encrypted by the notorious CryptXXX v.3 ransomware. CryptXXX v.3 ransomware was…

9 years ago
Faketoken, the Android ransomware banker that encrypted filesFaketoken, the Android ransomware banker that encrypted files

Faketoken, the Android ransomware banker that encrypted files

The banker Android ransomware Faketoken that steals financial information and sensitive data now also implements file-encrypting abilities. Security experts from…

9 years ago
Odinaff Trojan behind financial attacks mostly in TurkeyOdinaff Trojan behind financial attacks mostly in Turkey

Odinaff Trojan behind financial attacks mostly in Turkey

Akbank, one of the largest Turkish banks seems to be the latest victim of the Odinaff trojan, a threat similar…

9 years ago
Infected firmware spotted in well-known low-cost Android devicesInfected firmware spotted in well-known low-cost Android devices

Infected firmware spotted in well-known low-cost Android devices

Experts from Doctor Web spotted new Trojans into the firmware of several dozens of low-cost Android smartphones and tablets. Again…

9 years ago