RAT

Diving in the Illegal Underground Hacking Markets

Experts at Dell Secure Works Counter Threat Unit (CTU) published a new report on the evolution of the hacking underground…

11 years ago

The millionaire business behind the use of Limitless and Predator Pain Keylogger/RATs in the criminal ecosystems

Trend Micro issued a research paper on operations behind Predator Pain and Limitless keyloggers, both of which are easily obtainable…

11 years ago

Bad actors are using Gmail Drafts to control their bots

Security company Shape Security discovered a new strain of malware which is exploiting Gmail service as a communication channel with…

11 years ago

Chinese criminal underground is doubled between 2012 and 2013

Expert at TrendMicro published a new chapter of the Cybercriminal Underground Economy Series in which analyzed the Chinese underground. Chinese…

11 years ago

New malware based attacks hit opponents in Syria and all over the world

Security Experts at Kaspersky Global Research & Analysis Team have discovered several malware based attacks targeting opponents of the Regime…

12 years ago

IcoScript rat controlled via email services, including Yahoo and Gmail

Experts at the German security firm G-Data discovered a RAT dubbed IcoScript which receives commands from C&C via email services…

12 years ago

Kaspersky report on Energetic Bear – Crouching Yeti APT campaign

The Kaspersky Lab Team has issued a report which includes details of the investigation related to the Energetic Bear –…

12 years ago

Nigeria 419 scam targeting business world with RATs

Experts at Palo Alto Networks uncovered a new Nigeria 419 scam scheme which is targeting businesses in a malicous campaign…

12 years ago

Discovered a new Havex variant which hit SCADA via OPC

Researchers at FireEye have detected a new variant of Havex RAT, which scans SCADA network via Object linking and embedding…

12 years ago

Implications of the crisis in Iraq in the cyberspace

Security Experts at Intelligence firm InterCrawler have analyzed the effect of the crisis in Iraq on the malicious activities in…

12 years ago

This website uses cookies.