Virus List -  H  2023  2021  2020  2019  2018  2017

DATE

NAME

CATEGORY

WEB

30.12.23

Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accountsVirus

BleepingComputer

30.12.23

Steam game mod breached to push password-stealing malwareVirus

BleepingComputer

29.12.23

Game mod on Steam breached to push password-stealing malwareVirus

BleepingComputer

29.12.23

Microsoft disables MSIX protocol handler abused in malware attacksVirus

BleepingComputer

29.12.23

CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOKVirusThe Hacker News

29.12.23

Microsoft Disables MSIX App Installer Protocol Widely Used in Malware AttacksVirusThe Hacker News

28.12.23

New Rugmi Malware Loader Surges with Hundreds of Daily DetectionsVirusThe Hacker News

26.12.23

Carbanak Banking Malware Resurfaces with New Ransomware TacticsVirusThe Hacker News

24.12.23

Microsoft: Hackers target defense firms with new FalseFont malwareVirus

BleepingComputer

23.12.23

Operation RusticWeb: Rust-Based Malware Targets Indian Government EntitiesVirusThe Hacker News

23.12.23

Decoy Microsoft Word Documents Used to Deliver Nim-Based MalwareVirusThe Hacker News

23.12.23

UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE MalwareVirusThe Hacker News

23.12.23

Microsoft Warns of New 'FalseFont' Backdoor Targeting the Defense SectorVirusThe Hacker News

23.12.23

Experts Detail Multi-Million Dollar Licensing Model of Predator SpywareVirusThe Hacker News

23.12.23

New JavaScript Malware Targeted 50,000+ Users at Dozens of Banks WorldwideVirusThe Hacker News

21.12.23

New Go-Based JaskaGO Malware Targeting Windows and macOS SystemsVirusThe Hacker News

19.12.23

Rhadamanthys Stealer malware evolves with more powerful featuresVirus

BleepingComputer

19.12.23

Qbot malware returns in campaign targeting hospitality industryVirus

BleepingComputer

19.12.23

8220 Gang Exploiting Oracle WebLogic Server Vulnerability to Spread MalwareVirusThe Hacker News

19.12.23

Rhadamanthys Malware: Swiss Army Knife of Information Stealers EmergesVirusThe Hacker News

19.12.23

QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality IndustryVirusThe Hacker News

16.12.23

New NKAbuse malware abuses NKN blockchain for stealthy commsVirus

BleepingComputer

15.12.23

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS AttacksVirusThe Hacker News

15.12.23

116 Malware Packages Found on PyPI Repository Infecting Windows and Linux SystemsVirusThe Hacker News

14.12.23

Lazarus hackers drop new RAT malware using 2-year-old Log4j bugVirus

BleepingComputer

12.12.23

New MrAnon Stealer Malware Targeting German Users via Booking-Themed ScamVirusThe Hacker News

9.12.23

Researchers Unveal GuLoader Malware's Latest Anti-Analysis TechniquesVirusThe Hacker News

9.12.23

N. Korea's Kimsuky Targeting South Korean Research Institutes with Backdoor AttacksVirus

The Hacker News

8.12.23

Krasue RAT malware hides on Linux servers using embedded rootkitsVirus

BleepingComputer

8.12.23

Stealthier version of P2Pinfect malware targets MIPS devicesVirus

BleepingComputer

8.12.23

Fake WordPress security advisory pushes backdoor pluginVirus

BleepingComputer

7.12.23

New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in ThailandVirusThe Hacker News

3.12.23

New proxy malware targets Mac users through pirated softwareVirus

BleepingComputer

2.12.23

Agent Racoon Backdoor Targets Organizations in Middle East, Africa, and U.S.Virus

The Hacker News

2.12.23

Russian Hacker Vladimir Dunaev Convicted for Creating TrickBot MalwareVirus

The Hacker News

2.12.23

TrickBot malware dev pleads guilty, faces 35 years in prisonVirus

BleepingComputer

2.12.23

Hackers use new Agent Raccoon malware to backdoor US targetsVirus

BleepingComputer

1.12.23

Qakbot Takedown Aftermath: Mitigations and Protecting Against Future ThreatsVirus

The Hacker News

1.12.23

Chinese Hackers Using SugarGh0st RAT to Target South Korea and UzbekistanVirus

The Hacker News

28.11.23

New Rust-based SysJoker backdoor linked to Hamas hackersVirus

BleepingComputer

28.11.23

Atomic Stealer malware strikes macOS via fake browser updatesVirus

BleepingComputer

24.11.23

Konni Group Using Russian-Language Malicious Word Docs in Latest AttacksVirusThe Hacker News

24.11.23

Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed EmailsVirus

The Hacker News

23.11.23

Malware dev says they can revive expired Google auth cookiesVirus

BleepingComputer

23.11.23

Citrix warns admins to kill NetScaler user sessions to block hackersVirus

BleepingComputer

23.11.23

DarkGate and Pikabot malware emerge as Qakbot’s successorsVirus

BleepingComputer

22.11.23

ClearFake Campaign Expands to Deliver Atomic Stealer on Macs SystemsVirusThe Hacker News

22.11.23

New Agent Tesla Malware Variant Using ZPAQ Compression in Email AttacksVirus

The Hacker News

22.11.23

Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux RootkitsVirus

The Hacker News

21.11.23

Gamaredon's LittleDrifter USB malware spreads beyond UkraineVirus

BleepingComputer

21.11.23

Lumma Stealer malware now uses trigonometry to evade detectionVirus

BleepingComputer

21.11.23

NetSupport RAT Infections on the Rise - Targeting Government and Business SectorsVirus

The Hacker News

21.11.23

DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing AttacksVirus

The Hacker News

20.11.23

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox TechniqueVirus

The Hacker News

18.11.23

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoaderVirus

The Hacker News

18.11.23

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted AttacksVirus

The Hacker News

17.11.23

Beware: Malicious Google Ads Trick WinSCP Users into Installing MalwareVirus

The Hacker News

17.11.23

27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT ExpertsVirus

The Hacker News

14.11.23

Israel warns of BiBi wiper attacks targeting Linux and WindowsVirus

BleepingComputer

14.11.23

Iranian hackers launch malware attacks on Israel’s tech sectorVirusBleepingComputer

14.11.23

New Campaign Targets Middle East Governments with IronWind MalwareVirus

The Hacker News

14.11.23

Vietnamese Hackers Using New Delphi-Powered Malware to Target Indian MarketersVirus

The Hacker News

13.11.23

New BiBi-Windows Wiper Targets Windows Systems in Pro-Hamas AttacksVirus

The Hacker News

12.11.23

Google ads push malicious CPU-Z app from fake Windows news siteVirus

BleepingComputer

11.11.23

Alert: 'Effluence' Backdoor Persists Despite Patching Atlassian Confluence ServersVirus

The Hacker News

10.11.23BlueNoroff hackers backdoor Macs with new ObjCShellz malwareVirusBleepingComputer
10.11.23Stealthy Kamran Spyware Targeting Urdu-speaking Users in Gilgit-BaltistanVirusThe Hacker News
10.11.23New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious InstallersVirusThe Hacker News
9.11.23Beware, Developers: BlazeStealer Malware Discovered in Python Packages on PyPIVirusThe Hacker News
8.11.23N. Korea's BlueNoroff Blamed for Hacking macOS Machines with ObjCShellz MalwareVirusThe Hacker News
8.11.23New GootLoader Malware Variant Evades Detection and Spreads RapidlyVirusThe Hacker News
8.11.23SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government EntitiesVirusThe Hacker News
7.11.23New Jupyter Infostealer Version Emerges with Sophisticated Stealth TacticsVirusThe Hacker News
6.11.23Discord will switch to temporary file links to block malware deliveryVirusBleepingComputer
4.11.23StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million DevicesVirusThe Hacker News
3.11.23Malicious NuGet packages abuse MSBuild to install malwareVirusBleepingComputer
3.11.23NodeStealer Malware Hijacking Facebook Business Accounts for Malicious AdsVirusThe Hacker News
3.11.23CanesSpy Spyware Discovered in Modified WhatsApp VersionsVirusThe Hacker News
3.11.2348 Malicious npm Packages Found Deploying Reverse Shells on Developer SystemsVirusThe Hacker News
31.10.23New BiBi-Linux wiper malware targets Israeli orgs in destructive attacksVirusBleepingComputer
31.10.23Malicious NuGet Packages Caught Distributing SeroXen RAT MalwareVirusThe Hacker News
31.10.23Trojanized PyCharm Software Version Delivered via Google Search AdsVirusThe Hacker News
31.10.23Pro-Hamas Hacktivists Targeting Israeli Entities with Wiper MalwareVirusThe Hacker News
30.10.23Hackers Using MSIX App Packages to Infect Windows PCs with GHOSTPULSE MalwareVirusThe Hacker News
27.10.23StripedFly malware framework infects 1 million Windows, Linux hostsVirusBleepingComputer
26.10.23Iranian Group Tortoiseshell Launches New Wave of IMAPLoader Malware AttacksVirusThe Hacker News
26.10.23Malvertising Campaign Targets Brazil's PIX Payment System with GoPIX MalwareVirusThe Hacker News
25.10.23Hackers update Cisco IOS XE backdoor to hide infected devicesVirusBleepingComputer
24.10.23Backdoor Implant on Hacked Cisco Devices Modified to Evade DetectionVirusThe Hacker News
24.10.23DoNot Team's New Firebird Backdoor Hits Pakistan and AfghanistanVirusThe Hacker News
23.10.23Quasar RAT Leverages DLL Side-Loading to Fly Under the RadarVirusThe Hacker News
21.10.23Fake Corsair job offers on LinkedIn push DarkGate malwareVirusBleepingComputer
21.10.23Over 40,000 Cisco IOS XE devices infected with backdoor using zero-dayVirus

BleepingComputer

21.10.23Fake KeePass site uses Google Ads and Punycode to push malwareVirusBleepingComputer
21.10.23Malvertisers Using Google Ads to Target Users Searching for Popular SoftwareVirusThe Hacker News
21.10.23Vietnamese Hackers Target U.K., U.S., and India with DarkGate MalwareVirusThe Hacker News
20.10.23ExelaStealer: A New Low-Cost Cybercrime Weapon EmergesVirusThe Hacker News

19.10.23

MATA malware framework exploits EDR in attacks on defense firmsVirusBleepingComputer

19.10.23

Qubitstrike attacks rootkit Jupyter Linux servers to steal credentialsVirusBleepingComputer

19.10.23

Malicious Notepad++ Google ads evade detection for monthsVirus

BleepingComputer

19.10.23

Steam enforces SMS verification to curb malware-ridden updatesVirus

BleepingComputer

19.10.23

DarkGate malware spreads through compromised Skype accountsVirusBleepingComputer
14.10.23Hackers use Binance Smart Chain contracts to store malicious scriptsVirusBleepingComputer
14.10.23Malicious Solana, Kucoin packages infect NuGet devs with SeroXen RATVirusBleepingComputer
14.10.23ToddyCat hackers use 'disposable' malware to target Asian telecomsVirus

BleepingComputer

14.10.23New WordPress backdoor creates rogue admin to hijack websitesVirus

BleepingComputer

13.10.23DarkGate Malware Spreading via Messaging Services Posing as PDF FilesVirusThe Hacker News
13.10.23Malicious NuGet Package Targeting .NET Developers with SeroXen RATVirusThe Hacker News
12.10.23Researchers Uncover Malware Posing as WordPress Caching PluginVirusThe Hacker News
7.10.23China-linked cyberspies backdoor semiconductor firms with Cobalt StrikeVirus

BleepingComputer

7.10.23Hundreds of malicious Python packages found stealing sensitive dataVirusBleepingComputer
7.10.23Microsoft Defender no longer flags Tor Browser as malwareVirus

BleepingComputer

7.10.23New BunnyLoader threat emerges as a feature-rich malware-as-a-serviceVirus

BleepingComputer

6.10.23QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest AttacksVirusThe Hacker News
5.10.23Analysis and Config Extraction of Lu0Bot, a Node.js Malware with Considerable CapabilitiesVirusThe Hacker News
5.10.23Rogue npm Package Deploys Open-Source Rootkit in New Supply Chain AttackVirusThe Hacker News
4.10.23Over 3 Dozen Data-Stealing Malicious npm Packages Found Targeting DevelopersVirusThe Hacker News
3.10.23BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime UndergroundVirusThe Hacker News
1.10.23Lazarus hackers breach aerospace firm with new LightlessCan malwareVirus

BleepingComputer

1.10.23Bing Chat responses infiltrated by ads pushing malwareVirusBleepingComputer
1.10.23Budworm hackers target telcos and govt orgs with custom malwareVirus

BleepingComputer

1.10.23SSH keys stolen by stream of malicious PyPI and npm packagesVirusBleepingComputer
1.10.23Fake Bitwarden sites push new ZenRAT password-stealing malwareVirus

BleepingComputer

1.10.23GitHub repos bombarded by info-stealing commits masked as DependabotVirusBleepingComputer
30.9.23Cybercriminals Using New ASMCrypt Malware Loader to Fly Under the RadarVirusThe Hacker News
30.9.23GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot ContributionsVirusThe Hacker News
30.9.23Red Cross-Themed Phishing Attacks Distributing DangerAds and AtlasAgent BackdoorsVirusThe Hacker News
30.9.23New ZenRAT Malware Targeting Windows Users via Fake Password Manager SoftwareVirusThe Hacker News
30.9.23Xenomorph Banking Trojan: A New Variant Targeting 35+ U.S. Financial InstitutionsVirusThe Hacker News

24.9.23

New stealthy and modular Deadglyph malware used in govt attacksVirusBleepingComputer

24.9.23

Deadglyph: New Advanced Backdoor with Distinctive Malware TacticsVirusThe Hacker News

23.9.23

New Variant of Banking Trojan BBTok Targets Over 40 Latin American BanksVirusThe Hacker News

23.9.23

Experts warn of a 600X increase in P2Pinfect trafficVirusSecurityaffairs

23.9.23

ShroudedSnooper threat actors target telecom companies in the Middle EastVirusSecurityaffairs

23.9.23

‘Sandman’ hackers backdoor telcos with new LuaDream malwareVirus

BleepingComputer

23.9.23

P2PInfect botnet activity surges 600x with stealthier malware variantsVirus

BleepingComputer

23.9.23

Free Download Manager releases script to check for Linux malwareVirus

BleepingComputer

23.9.23

Fake WinRAR proof-of-concept exploit drops VenomRAT malwareVirusBleepingComputer

21.9.23

Researchers Raise Red Flag on P2PInfect Malware with 600x Activity SurgeVirusThe Hacker News

21.9.23

Ukrainian Hacker Suspected to be Behind "Free Download Manager" Malware AttackVirusThe Hacker News

21.9.23

Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with Venom RATVirusThe Hacker News

20.9.23

Fresh Wave of Malicious npm Packages Threaten Kubernetes Configs and SSH Keys

VirusThe Hacker News

20.9.23

Sophisticated Phishing Campaign Targeting Chinese Users with ValleyRAT and Gh0st RAT

VirusThe Hacker News

20.9.23

Hackers backdoor telecom providers with new HTTPSnoop malwareVirus

BleepingComputer

20.9.23

Bumblebee malware returns in new attacks abusing WebDAV foldersVirus

BleepingComputer

20.9.23

New SprySOCKS Linux malware used in cyber espionage attacksVirus

BleepingComputer

19.9.23

ShroudedSnooper's HTTPSnoop Backdoor Targets Middle East Telecom CompaniesVirusThe Hacker News

19.9.23

Operation Rusty Flag: Azerbaijan Targeted in New Rust-Based Malware CampaignVirusThe Hacker News

19.9.23

Inside the Code of a New XWorm VariantVirusThe Hacker News

19.9.23

Earth Lusca's New SprySOCKS Linux Backdoor Targets Government EntitiesVirusThe Hacker News

19.9.23

Transparent Tribe Uses Fake YouTube Android Apps to Spread CapraRAT MalwareVirusThe Hacker News

17.9.23

Free Download Manager backdoored to serve Linux malware for more than 3 yearsVirusSecurityaffairs

16.9.23

Fake Cisco Webex Google Ads abuse tracking templates to push malwareVirus

BleepingComputer

16.9.23

NodeStealer Malware Now Targets Facebook Business Accounts on Multiple BrowsersVirusThe Hacker News

15.9.23

Free Download Manager Site Compromised to Distribute Linux Malware to Users for 3+ YearsVirusThe Hacker News

14.9.23

Free Download Manager site redirected Linux users to malware for yearsVirus

BleepingComputer

14.9.23

Iranian hackers backdoor 34 orgs with new Sponsor malwareVirus

BleepingComputer

13.9.23

Sophisticated Phishing Campaign Deploying Agent Tesla, OriginBotnet, and RedLine ClipperVirusThe Hacker News

13.9.23

Beware: MetaStealer Malware Targets Apple macOS in Recent AttacksVirusThe Hacker News

12.9.23

Vietnamese Hackers Deploy Python-Based Stealer via Facebook MessengerVirusThe Hacker News

12.9.23

Charming Kitten's New Backdoor 'Sponsor' Targets Brazil, Israel, and U.A.E.VirusThe Hacker News

11.9.23

New HijackLoader Modular Malware Loader Making Waves in the Cybercrime WorldVirusThe Hacker News

10.9.23

Microsoft Teams phishing attack pushes DarkGate malwareVirus

BleepingComputer

6.9.23

Chaes malware now uses Google Chrome DevTools Protocol to steal dataVirus

BleepingComputer

5.9.23

New BLISTER Malware Update Fuelling Stealthy Network Infiltration

Virus

The Hacker News

5.9.23

New Python Variant of Chaes Malware Targets Banking and Logistics Industries

Virus

The Hacker News

4.9.23

Beware of MalDoc in PDF: A New Polyglot Attack Allowing Attackers to Evade Antivirus

Virus

The Hacker News
2.9.23Talos wars of customizations of the open-source info stealer SapphireStealerVirusSecurityaffairs
2.9.23UNRAVELING EternalBlue: inside the WannaCry’s enablerVirusSecurityaffairs
2.9.23New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean ActivistsVirusThe Hacker News
1.9.23North Korean hackers behind malicious VMConnect PyPI campaignVirusBleepingComputer
1.9.23SapphireStealer Malware: A Gateway to Espionage and Ransomware OperationsVirusThe Hacker News
1.9.23North Korean Hackers Deploy New Malicious Python Packages in PyPI RepositoryVirusThe Hacker News
30.8.23How the FBI nuked Qakbot malware from infected Windows PCsVirusBleepingComputer
30.8.23DreamBus malware exploits RocketMQ flaw to infect serversVirusBleepingComputer
30.8.23Malicious npm Packages Aim to Target Developers for Source Code TheftVirusThe Hacker News
30.8.23DarkGate Malware Activity Spikes as Developer Rents Out Malware to AffiliatesVirusThe Hacker News
29.8.23MalDoc in PDFs: Hiding malicious Word docs in PDF filesVirusBleepingComputer
28.8.23Developers Beware: Malicious Rust Libraries Caught Transmitting OS Info to Telegram ChannelVirusThe Hacker News
28.8.23KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced CapabilitiesVirusThe Hacker News
26.8.23Whiffy Recon malware triangulates the position of infected systems via Wi-FiVirusSecurityaffairs
25.8.23New Whiffy Recon malware uses WiFi to triangulate your locationVirusBleepingComputer
25.8.23Lazarus Group Exploits Critical Zoho ManageEngine Flaw to Deploy Stealthy QuiteRATVirusThe Hacker News
24.8.23New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every MinuteVirusThe Hacker News
23.8.23New HiatusRAT malware attacks target US Defense DepartmentVirusBleepingComputer
23.8.23Syrian Threat Actor EVLF Unmasked as Creator of CypherRAT and CraxsRAT Android MalwareVirusThe Hacker News
23.8.23Over a Dozen Malicious npm Packages Target Roblox Game DevelopersVirusThe Hacker News
22.8.23New HiatusRAT campaign targets Taiwan and U.S. military procurement systemVirusSecurityaffairs
22.8.23Google Chrome to warn when installed extensions are malwareVirusBleepingComputer
22.8.23Carderbee Attacks: Hong Kong Organizations Targeted via Malicious Software UpdatesVirusThe Hacker News
22.8.23New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity AppVirusThe Hacker News
22.8.23New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity AppVirusThe Hacker News
21.8.23HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under AttackVirusThe Hacker News
20.8.23Approximately 2000 Citrix NetScaler servers were backdoored in a massive campaignVirusSecurityaffairs
20.8.23Credentials for cybercrime forums found on roughly 120K computers infected with info stealersVirusSecurityaffairs
20.8.23QwixxRAT, a new Windows RAT appears in the threat landscapeVirusSecurityaffairs
20.8.23Hackers use VPN provider's code certificate to sign malwareVirusBleepingComputer
20.8.23Rust devs push back as Serde project ships precompiled binariesVirusBleepingComputer
16.8.23Raccoon Stealer malware returns with new stealthier versionVirusSecurityaffairs
16.8.23Over 100K hacking forums accounts exposed by info-stealing malwareVirusSecurityaffairs
16.8.23Malware Unleashed: Public Sector Hit in Sudden Surge, Reveals New ReportVirusThe Hacker News
14.8.23Focus on DroxiDat/SystemBCVirusSecurelist
14.8.23QwixxRAT: New Remote Access Trojan Emerges via Telegram and DiscordVirusThe Hacker News
14.8.23New Financial Malware 'JanelaRAT' Targets Latin American UsersVirusThe Hacker News
12.8.23Power Generator in South Africa hit with DroxiDat and Cobalt StrikeVirusSecurityaffairs
12.8.23Statc Stealer, a new sophisticated info-stealing malwareVirusSecurityaffairs
12.8.23Balada Injector still at large – new domains discoveredVirusSecurityaffairs
12.8.23EvilProxy used in massive cloud account takeover schemeVirusSecurityaffairs
11.8.23Police seize LOLEK bulletproof service for hosting malwareVirusBleepingComputer
11.8.23Gafgyt malware exploits five-years-old flaw in EoL Zyxel routerVirusBleepingComputer
11.8.23CISA: New Whirlpool backdoor used in Barracuda ESG hacksVirusBleepingComputer
11.8.23New SystemBC Malware Variant Targets Southern African Power CompanyVirusThe Hacker News
11.8.23New Statc Stealer Malware Emerges: Your Sensitive Data at RiskVirusThe Hacker News
8.8.23QakBot Malware Operators Expand C2 Network with 15 New ServersVirusThe Hacker News
8.8.23

A new sophisticated SkidMap variant targets unsecured Redis servers

VirusSecurityaffairs
8.8.23LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious PurposesVirusThe Hacker News
8.8.23New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet ConfigsVirusThe Hacker News
7.8.23Reptile Rootkit employed in attacks against Linux systems in South KoreaVirusSecurityaffairs
7.8.23

New SkidMap Redis Malware Variant Targeting Vulnerable Redis Servers

VirusThe Hacker News
5.8.23Reptile Rootkit: Advanced Linux Malware Targeting South Korean SystemsVirusThe Hacker News
5.8.23Malicious packages in the NPM designed for highly-targeted attacksVirusSecurityaffairs
4.8.23Malicious npm Packages Found Exfiltrating Sensitive Data from DevelopersVirusThe Hacker News
4.8.23Hackers can abuse Microsoft Office executables to download malwareVirusBleepingComputer
4.8.23Chrome malware Rilide targets enterprise users via PowerPoint guidesVirusBleepingComputer
4.8.23What’s happening in the world of crimeware: Emotet, DarkGate and LokiBotVirusSecurelist
3.8.23New Version of Rilide Data Theft Malware Adapts to Chrome Extension Manifest V3VirusThe Hacker News
3.8.23Amazon's AWS SSM agent can be used as post-exploitation RAT malwareVirusBleepingComputer
2.8.23Researchers Uncover AWS SSM Agent Misuse as a Covert Remote Access TrojanVirusThe Hacker News
2.8.23NodeStealer 2.0 takes over Facebook Business accounts and targets crypto walletsVirusSecurityaffairs
2.8.23WikiLoader malware-as-a-service targets Italian organizationsVirusSecurityaffairs
2.8.23Experts discovered a previously undocumented initial access vector used by P2PInfect wormVirusSecurityaffairs
2.8.23New NodeStealer Variant Targeting Facebook Business Accounts and Crypto WalletsVirusThe Hacker News
1.8.23Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking TrojanVirusThe Hacker News
31.7.23New P2PInfect Worm Targets Redis Servers with Undocumented Breach MethodsVirusThe Hacker News
31.7.23Patchwork Hackers Target Chinese Research Organizations Using EyeShell BackdoorVirusThe Hacker News
31.7.23Fruity Trojan Uses Deceptive Software Installers to Spread Remcos RATVirusThe Hacker News
30.7.23CISA warns about SUBMARINE Backdoor employed in Barracuda ESG attacksVirusSecurityaffairs
30.7.23CISA: New Submarine malware found on hacked Barracuda ESG appliancesVirus

BleepingComputer

29.7.23Hackers Deploy "SUBMARINE" Backdoor in Barracuda Email Security Gateway AttacksVirusThe Hacker News
29.7.23IcedID Malware Adapts and Expands Threat with Updated BackConnect ModuleVirusThe Hacker News
28.7.23Hackers Abusing Windows Search Feature to Install Remote Access TrojansVirusThe Hacker News
28.7.23BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic EntitiesVirusThe Hacker News
27.7.23New Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search AdsVirusThe Hacker News
26.7.23Decoy Dog: New Breed of Malware Posing Serious Threats to Enterprise NetworksVirusThe Hacker News
26.7.23Lazarus hackers hijack Microsoft IIS servers to spread malwareVirus

BleepingComputer

25.7.23Casbaneiro Banking Malware Goes Under the Radar with UAC Bypass TechniqueVirusThe Hacker News
22.7.23HotRat: New Variant of AsyncRAT Malware Spreading Through Pirated SoftwareVirusThe Hacker News
21.7.23P2PInfect, a Rusty P2P worm targets Redis Servers on Linux and Windows systemsVirus

Securityaffairs

21.7.23GitHub warns of Lazarus hackers targeting devs with malicious projectsVirus

BleepingComputer

21.7.23New P2PInfect worm malware targets Linux and Windows Redis serversVirus

BleepingComputer

21.7.23Turla's New DeliveryCheck Backdoor Breaches Ukrainian Defense SectorVirusThe Hacker News
20.7.23Microsoft: Hackers turn Exchange servers into malware control centersVirusBleepingComputer
20.7.23New P2PInfect Worm Targeting Redis Servers on Linux and Windows SystemsVirusThe Hacker News
18.7.23Pakistani Entities Targeted in Sophisticated Attack Deploying ShadowPad MalwareVirus

The Hacker News

18.7.23FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware AttacksVirus

The Hacker News

17.7.23WormGPT, the generative AI tool to launch sophisticated BEC attacksVirus

Securityaffairs

17.7.23Malicious USB Drives Targetinging Global Targets with SOGU and SNOWYDRIVE MalwareVirusThe Hacker News
17.7.23WormGPT: New AI Tool Allows Cybercriminals to Launch Sophisticated Cyber AttacksVirus

The Hacker News

15.7.23The source code of the BlackLotus UEFI Bootkit was leaked on GitHubVirus

Securityaffairs

15.7.23RomCom RAT attackers target groups supporting NATO membership of UkraineVirus

Securityaffairs

15.7.23AVrecon malware infects 70,000 Linux routers to build botnetVirus

BleepingComputer

15.7.23Fake Linux vulnerability exploit drops data-stealing malwareVirus

BleepingComputer

15.7.23Source code for BlackLotus Windows UEFI malware leaked on GitHubVirus

BleepingComputer

14.7.23TeamTNT's Cloud Credential Stealing Campaign Now Targets Azure and Google CloudVirusThe Hacker News
14.7.23PicassoLoader Malware Used in Ongoing Attacks on Ukraine and PolandVirus

The Hacker News

13.7.23USB drive malware attacks spiking again in first half of 2023Virus

BleepingComputer

13.7.23New PyLoose Linux malware mines crypto directly from memoryVirus

BleepingComputer

12.7.23Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming SectorVirusThe Hacker News
10.7.23New TOITOIN Banking Trojan Targeting Latin American BusinessesVirus

The Hacker News

8.7.23Vishing Goes High-Tech: New 'Letscall' Malware Employs Voice Traffic RoutingVirusThe Hacker News
7.7.23CISA: Netwrix Auditor RCE bug exploited in Truebot malware attacksVirus

BleepingComputer

7.7.23Cybersecurity Agencies Sound Alarm on Rising TrueBot Malware AttacksVirus

The Hacker News

6.7.23

New tool exploits Microsoft Teams bug to send malware to users

Virus

BleepingComputer

5.7.23Node.js Users Beware: Manifest Confusion Attack Opens Door to MalwareVirusThe Hacker News
4.7.23New Python tool checks NPM packages for manifest confusion issuesVirusBleepingComputer
4.7.23Chinese Hackers Use HTML Smuggling to Infiltrate European Ministries with PlugXVirusThe Hacker News
3.7.23New Windows Meduza Stealer targets tens of crypto wallets and password managersVirusSecurityaffairs
3.7.23Evasive Meduza Stealer Targets 19 Password Managers and 76 Crypto WalletsVirusThe Hacker News
1.7.23North Korea-linked Andariel APT used a new malware named EarlyRat last yearVirusSecurityaffairs
1.7.23Previously undetected ThirdEye malware appears in the threat landscapeVirusSecurityaffairs
30.6.23New EarlyRAT malware linked to North Korean Andariel hacking groupVirusBleepingComputer
30.6.23NPM ecosystem at risk from “Manifest Confusion” attacksVirusBleepingComputer
29.6.23North Korean Hacker Group Andariel Strikes with New EarlyRat MalwareVirusThe Hacker News
29.6.23Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive DataVirusThe Hacker News
27.6.23Anatsa Android trojan now steals banking info from users in US, UKVirusBleepingComputer
27.6.23New PindOS JavaScript dropper deploys Bumblebee, IcedID malwareVirusBleepingComputer
27.6.23Anatsa Banking Trojan Targeting Users in US, UK, Germany, Austria, and SwitzerlandVirusThe Hacker News
26.6.23Trojanized Super Mario Bros game spreads malwareVirusSecurityaffairs
26.6.23Trojanized Super Mario game used to install Windows malwareVirusBleepingComputer
24.6.23Powerful JavaScript Dropper PindOS Distributes Bumblebee and IcedID MalwareVirusThe Hacker News
23.6.23Microsoft Teams bug allows malware delivery from external accountsVirusBleepingComputer
23.6.23Microsoft: Hackers hijack Linux systems using trojanized OpenSSH versionVirusBleepingComputer
23.6.23MULTI#STORM Campaign Targets India and U.S. with Remote Access TrojansVirusThe Hacker News
23.6.23Camaro Dragon Hackers Strike with USB-Driven Self-Propagating MalwareVirusThe Hacker News
22.6.23LockBit Green and phishing that targets organizationsVirusSecurelist
22.6.23New Tsunami botnet targets Linux SSH serversVirusSecurityaffairs
22.6.23New Condi malware builds DDoS botnet out of TP-Link AX21 routersVirusBleepingComputer
22.6.23Hackers infect Linux SSH servers with Tsunami botnet malwareVirusBleepingComputer
22.6.23New RDStealer malware steals from drives shared over Remote DesktopVirusBleepingComputer
22.6.23Over 100,000 ChatGPT accounts stolen via info-stealing malwareVirusBleepingComputer
22.6.23Dissecting TriangleDB, a Triangulation spyware implantVirusSecurelist
21.6.23Experts Uncover Year-Long Cyber Attack on IT Firm Utilizing Custom Malware RDStealerVirusThe Hacker News
20.6.23Hackers use fake OnlyFans pics to drop info-stealing malwareVirusBleepingComputer

19.6.23

New Information Stealer ‘Mystic Stealer’ Rising to FameVirus

Securityweek

19.6.23

New Mystic Stealer malware increasingly used in attacksVirus

BleepingComputer

19.6.23

New Mystic Stealer Malware Targets 40 Web Browsers and 70 Browser ExtensionsVirusThe Hacker News

17.6.23

ChamelDoH: New Linux Backdoor Utilizing DNS-over-HTTPS Tunneling for Covert CnC

Virus

The Hacker News

17.6.23

Understanding Malware-as-a-Service

Virus

Securelist

5.5.23Hackers Targeting Italian Corporate Banking Clients with New Web-Inject Toolkit DrIBANVirusThe Hacker News
5.5.23N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest CyberattacksVirusThe Hacker News
4.5.23Meta Takes Down Malware Campaign That Used ChatGPT as a Lure to Steal AccountsVirusThe Hacker News
3.5.23Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware TacticsVirusThe Hacker News
2.5.23LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google AdsVirusThe Hacker News
2.5.23North Korea's ScarCruft Deploys RokRAT Malware via LNK File Infection ChainsVirusThe Hacker News
1.5.23New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise NetworksVirusThe Hacker News
1.5.23Vietnamese Threat Actor Infects 500,000 Devices Using 'Malverposting' TacticsVirusThe Hacker News
28.4.23ViperSoftX InfoStealer Adopts Sophisticated Techniques to Avoid DetectionVirusThe Hacker News
27.4.23Google Gets Court Order to Take Down CryptBot That Infected Over 670,000 ComputersVirusThe Hacker News
27.4.23LimeRAT Malware Analysis: Extracting the ConfigVirusThe Hacker News
26.4.23Charming Kitten's New BellaCiao Malware Discovered in Multi-Country AttacksVirusThe Hacker News
26.4.23Chinese Hackers Using MgBot Malware to Target International NGOs in Mainland ChinaVirusThe Hacker News
24.4.23New All-in-One "EvilExtractor" Stealer for Windows Systems Surfaces on the Dark WebVirusThe Hacker News
21.4.23GhostToken Flaw Could Let Attackers Hide Malicious Apps in Google Cloud PlatformVirusThe Hacker News
20.4.23Lazarus Group Adds Linux Malware to Arsenal in Operation Dream JobVirusThe Hacker News
18.4.23YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive LoaderVirusThe Hacker News
17.4.23Israeli Spyware Vendor QuaDream to Shut Down Following Citizen Lab and Microsoft ExposeVirusThe Hacker News
17.4.23New QBot Banking Trojan Campaign Hijacks Business Emails to Spread MalwareVirusThe Hacker News
17.4.23FIN7 and Ex-Conti Cybercrime Gangs Join Forces in Domino Malware AttacksVirusThe Hacker News
12.4.23Israel-based Spyware Firm QuaDream Targets High-Risk iPhones with Zero-Click ExploitVirusThe Hacker News
10.4.23Over 1 Million WordPress Sites Infected by Balada Injector Malware CampaignVirusThe Hacker News
5.4.23Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion TechniquesVirusThe Hacker News
4.4.23New Rilide Malware Targeting Chromium-Based Browsers to Steal CryptocurrencyVirusThe Hacker News

31.3.23

Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

Virus

The Hacker News

31.3.23

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

Virus

The Hacker News

30.3.23

Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

Virus

The Hacker News

30.3.23

Mélofée: Researchers Uncover New Linux Malware Linked to Chinese APT Groups

Virus

The Hacker News

30.3.23

Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware

Virus

The Hacker News

29.3.23

IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery

Virus

The Hacker News

29.3.23

Stealthy DBatLoader Malware Loader Spreading Remcos RAT and Formbook in Europe

Virus

The Hacker News

25.3.23Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal DataVirus

The Hacker News

22.3.23ScarCruft's Evolving Arsenal: Researchers Reveal New Malware Distribution TechniquesVirus

The Hacker News

22.3.23Rogue NuGet Packages Infect .NET Developers with Crypto-Stealing MalwareVirus

The Hacker News

22.3.23NAPLISTENER: New Malware in REF2924 Group's Arsenal for Bypassing DetectionVirus

The Hacker News

22.3.23New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux ServersVirus

The Hacker News

21.3.23New DotRunpeX Malware Delivers Multiple Malware Families via Malicious AdsVirus

The Hacker News

21.3.23Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials StolenVirus

The Hacker News

21.3.23Emotet Rises Again: Evades Macro Security via OneNote AttachmentsVirus

The Hacker News

18.3.23FakeCalls Vishing Malware Targets South Korean Users via Popular Financial AppsVirus

The Hacker News

16.3.23

YoroTrooper cyberspies target CIS energy orgs, EU embassiesVirus

Bleepingcomputer

15.3.23

YoroTrooper Stealing Credentials and Information from Government and Energy OrganizationsVirus

The Hacker News

14.3.23

GoBruteforcer: New Golang-Based Malware Breaches Web Servers Via Brute-Force AttacksVirus

The Hacker News

13.3.23

Warning: AI-generated YouTube Video Tutorials Spreading Infostealer MalwareVirus

The Hacker News

11.3.23

Microsoft OneNote to get enhanced security after recent malware abuseVirusBleepingcomputer

11.3.23

New GoBruteforcer malware targets phpMyAdmin, MySQL, FTP, PostgresVirusBleepingcomputer

11.3.23

Security researchers targeted with new malware via job offers on LinkedInVirusBleepingcomputer

11.3.23

BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif PayloadsVirusThe Hacker News

10.3.23

China-linked Hackers Targeting Unpatched SonicWall SMA Devices with MalwareVirusThe Hacker News

10.3.23

International Law Enforcement Takes Down Infamous NetWire Cross-Platform RATVirusThe Hacker News

10.3.23

North Korean UNC2970 Hackers Expands Operations with New Malware FamiliesVirusThe Hacker News

10.3.23

Police seize Netwire RAT malware infrastructure, arrest adminVirusBleepingcomputer

10.3.23

New malware variant has “radio silence” mode to evade detectionVirusBleepingcomputer

10.3.23

Emotet malware attacks return after three-month breakVirusBleepingcomputer

10.3.23

Hackers Exploiting Remote Desktop Software Flaws to Deploy PlugX MalwareVirusThe Hacker News

7.3.23

Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging AppsVirusThe Hacker News

6.3.23

New HiatusRAT Malware Targets Business-Grade Routers to Covertly Spy on VictimsVirusThe Hacker News

4.3.23

New FiXS ATM Malware Targeting Mexican BanksVirusThe Hacker News
2.3.23Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPIVirus

The Hacker News

2.3.23SysUpdate Malware Strikes Again with Linux Version and New Evasion TacticsVirus

The Hacker News

27.2.23

ChromeLoader Malware Targeting Gamers via Fake Nintendo and Steam Game HacksVirus

The Hacker News

27.2.23

PureCrypter Malware Targets Government Entities in Asia-Pacific and North AmericaVirusThe Hacker News

27.2.23

PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest AttacksVirus

The Hacker News

23.2.23

New S1deload Malware Hijacking Users' Social Media Accounts and Mining CryptocurrencyVirus

The Hacker News

23.2.23

Python Developers Warned of Trojanized PyPI Packages Mimicking Popular LibrariesVirusThe Hacker News

21.2.23

Researchers Discover Dozens Samples of Information Stealer 'Stealc' in the WildVirusThe Hacker News

21.2.23

Researchers Warn of ReverseRAT Backdoor Targeting Indian Government AgenciesVirusThe Hacker News

20.2.23

Samsung Introduces New Feature to Protect Users from Zero-Click Malware AttacksVirus

The Hacker News

17.2.23Researchers Hijack Popular NPM Package with Millions of DownloadsVirusThe Hacker News
16.2.23Hackers Using Google Ads to Spread FatalRAT Malware Disguised as Popular AppsVirusThe Hacker News
15.2.23Experts Warn of 'Beep' - A New Evasive Malware That Can Fly Under the RadarVirusThe Hacker News
14.2.23Python Developers Beware: Clipper Malware Found in 450+ PyPI Packages!VirusThe Hacker News
14.2.23Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players' SystemsVirusThe Hacker News
11.2.23Researchers Uncover Obfuscated Malicious Code in PyPI Python PackagesVirusThe Hacker News
9.2.23NewsPenguin Threat Actor Emerges with Malicious Campaign Targeting Pakistani EntitiesVirusThe Hacker News
9.2.23Gootkit Malware Adopts New Tactics to Attack Healthcare and Finance FirmsVirusThe Hacker News
6.2.23GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce IndustryVirusThe Hacker News
6.2.23FormBook Malware Spreads via Malvertising Using MalVirt Loader to Evade DetectionVirusThe Hacker News
6.2.23Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering MalwareVirusThe Hacker News
3.2.23The Pivot: How MSPs can Turn a Challenge Into a Once-in-a-Decade OpportunityVirusThe Hacker News
1.2.23

New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers

VirusThe Hacker News
1.2.23

Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards

VirusThe Hacker News
31.1.23

New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector

VirusThe Hacker News
31.1.23

Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years

VirusThe Hacker News
31.1.23

Titan Stealer: A New Golang-Based Information Stealer Malware Emerges

VirusThe Hacker News
31.1.23Gootkit Malware Continues to Evolve with New Components and ObfuscationsVirusThe Hacker News
27.1.23Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware ServiceVirusThe Hacker News
27.1.23Researchers Discover New PlugX Malware Variant Spreading via Removable USB DevicesVirusThe Hacker News
27.1.233 Lifehacks While Analyzing Orcus RAT in a Malware SandboxVirusThe Hacker News
26.1.23PY#RATION: New Python-based RAT Uses WebSocket for C2 and Data ExfiltrationVirusThe Hacker News
25.1.23Emotet Malware Makes a Comeback with New Evasion TechniquesVirusThe Hacker News
20.1.23Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers' DNS SettingsVirusThe Hacker News
19.1.23New Research Delves into the World of Malicious LNK Files and Hackers Behind ThemVirusThe Hacker News
19.1.23Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North AfricaVirusThe Hacker News
17.1.23Hackers Can Abuse Legitimate GitHub Codespaces Feature to Deliver MalwareVirusThe Hacker News
17.1.23Researchers Uncover 3 PyPI Packages Spreading Malware to Developer SystemsVirusThe Hacker News
16.1.23Raccoon and Vidar Stealers Spreading via Massive Network of Fake Cracked SoftwareVirusThe Hacker News
16.1.23New Backdoor Created Using Leaked CIA's Hive Malware Discovered in the WildVirusThe Hacker News
14.1.23Malware Attack on CircleCI Engineer's Laptop Leads to Recent Security IncidentVirusThe Hacker News
14.1.23IcedID Malware Strikes Again: Active Directory Domain Compromised in Under 24 HoursVirusThe Hacker News
12.1.23New Analysis Reveals Raspberry Robin Can be Repurposed by Other Threat ActorsVirusThe Hacker News
12.1.23Australian Healthcare Sector Targeted in Latest Gootkit Malware AttacksVirusThe Hacker News
12.1.23Italian Users Warned of Malware Attack Targeting Sensitive InformationVirusThe Hacker News
12.1.23Malicious PyPI Packages Using Cloudflare Tunnels to Sneak Through FirewallsVirusThe Hacker News
12.1.23Hackers Can Abuse Visual Studio Marketplace to Target Developers with Malicious ExtensionsVirusThe Hacker News
12.1.23Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New BackdoorsVirusThe Hacker News
12.1.23Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection ChainVirusThe Hacker News
12.1.23The Evolving Tactics of Vidar Stealer: From Phishing Emails to Social MediaVirusThe Hacker News
12.1.23Hackers Using Stolen Bank Information to Trick Victims into Downloading BitRAT MalwareVirusThe Hacker News
12.1.23Raspberry Robin Worm Evolves to Attack Financial and Insurance Sectors in EuropeVirusThe Hacker News
12.1.23PyTorch Machine Learning Framework Compromised with Malicious DependencyVirusThe Hacker News
Virus