Trojan

Crooks start exploiting Coronavirus as bait to spread malwareCrooks start exploiting Coronavirus as bait to spread malware

Crooks start exploiting Coronavirus as bait to spread malware

Security researchers warn of malspam campaigns aimed at spreading malware that exploits media attention on the coronavirus epidemic. Unscrupulous cybercriminal…

5 years ago
Arcane Stealer V, a threat for lower-skilled adversaries that scares expertsArcane Stealer V, a threat for lower-skilled adversaries that scares experts

Arcane Stealer V, a threat for lower-skilled adversaries that scares experts

Experts recently analyzed an information-stealing malware tracked as Arcane Stealer V that is very cheap and easy to buy in…

6 years ago
Astaroth Trojan leverages Facebook and YouTube to avoid detectionAstaroth Trojan leverages Facebook and YouTube to avoid detection

Astaroth Trojan leverages Facebook and YouTube to avoid detection

Cofense experts uncovered a new variant of the Astaroth Trojan that uses Facebook and YouTube in the infection process. Researchers…

6 years ago
New Russian Language Malspam is delivering Redaman Banking MalwareNew Russian Language Malspam is delivering Redaman Banking Malware

New Russian Language Malspam is delivering Redaman Banking Malware

A still ongoing spam campaign that has been active during the last months has been distributing the Redaman banking malware.…

6 years ago
QRecorder app in the Play Store was hiding a Banking Trojan that targets European banksQRecorder app in the Play Store was hiding a Banking Trojan that targets European banks

QRecorder app in the Play Store was hiding a Banking Trojan that targets European banks

The QRecorder app in the Play Store impersonating a phone call and voice recording utility embedded a banking malware used…

7 years ago
Red Alert 2.0 Android Trojan available for rent in the underground at $500 per MonthRed Alert 2.0 Android Trojan available for rent in the underground at $500 per Month

Red Alert 2.0 Android Trojan available for rent in the underground at $500 per Month

According to researchers at Trustwave, the source code of the Red Alert 2.0 Android Trojan is now available for rent on cybercrime underground…

7 years ago
Experts noticed an ongoing activity involving the RIG Exploit Kit to deliver the Grobios TrojanExperts noticed an ongoing activity involving the RIG Exploit Kit to deliver the Grobios Trojan

Experts noticed an ongoing activity involving the RIG Exploit Kit to deliver the Grobios Trojan

Malware researchers from FireEye recently noticed an interesting ongoing activity involving the infamous RIG Exploit Kit (EK) to deliver the…

7 years ago
KevDroid Android RAT can steal private data and record phone callsKevDroid Android RAT can steal private data and record phone calls

KevDroid Android RAT can steal private data and record phone calls

  Security researchers discovered a new Android Remote Access Trojan (RAT) dubbed KevDroid that can steal private data and record…

7 years ago
A new EMOTET Trojan variant improves evasion techniquesA new EMOTET Trojan variant improves evasion techniques

A new EMOTET Trojan variant improves evasion techniques

Security experts at Trend Micro had recently observed a new variant of the EMOTET banking Trojan that implements new evasion…

8 years ago
Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once againMulti-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once again

Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once again

Researchers from security firm ESET, discovered a multi-stage Malware dubbed Android/TrojanDropper.Agent.BKY that evaded Google Play detection. Security experts at ESET have discovered…

8 years ago