Trojan

A new EMOTET Trojan variant improves evasion techniques

Security experts at Trend Micro had recently observed a new variant of the EMOTET banking Trojan that implements new evasion…

8 years ago

Multi-Stage Android/TrojanDropper.Agent.BKY Malware bypasses Google Play detection once again

Researchers from security firm ESET, discovered a multi-stage Malware dubbed Android/TrojanDropper.Agent.BKY that evaded Google Play detection. Security experts at ESET have discovered…

8 years ago

Emerging Matrix Banker Trojan is targeting banks in Latin America

Security Experts at Arbor Networks have spotted a new banking trojan, initially called 'Matrix Banker', that is targeting Latin America.…

9 years ago

Experts warn of the rapid growth of the Marcher Android banking Trojan

Malware researchers at the security firm Securify have published a detailed analysis of the Marcher Android banking Trojan. Security experts…

9 years ago

A fake Super Mario Run for Android is serving the Marcher Banking Trojan

Zscaler experts have found in the wild a fake version of the Super Mario Run Android App that could install…

9 years ago

Android Switcher Trojan targets routers changing DNS settings

Security experts from Kaspersky Lab have spotted a new Android Trojan, dubbed Switcher, that targets routers in order to change…

9 years ago

Floki Bot rapidly evolves and targets also PoS data

Cisco Talos and Flashpoint have teamed up to analyze the Floki Bot, a Zeus-based banking Trojan that is rapidly evolving…

9 years ago

Linux.BackDoor.FakeFile.1, a new Linux backdoor in the wild

Security researchers at the security firm Doctor Web have spotted a new Linux backdoor dubbed Linux.BackDoor.FakeFile.1 in the wild. Security…

9 years ago

Linux.PNScan Trojan is back to compromise routers and install backdoors

The Linux Trojan Linux.PNScan is back and it is actively targeting routers based on x86 Linux in an attempt to…

9 years ago

Delilah, the first Trojan to recruit Insiders

Delilah is the first extortion trojan that spies on victims and collects information to force them in doing malicious activities…

10 years ago

This website uses cookies.