Malware 2024 2026() 2025() 2024() 2023() 2022() OTHER()
DATE |
NAME |
INFO |
CATEGORY |
SUBCATE |
|
28.12.24 |
OtterCookie, a new malware used by Contagious Interview |
MALWARE |
JavaScript |
|
|
26.12.24 |
BellaCPP: Discovering a new BellaCiao variant written in C++ |
MALWARE |
Malware |
|
|
22.12.24 |
HeartCrypt was originally discovered through underground forums and reported by security researchers in February and March 2024. |
MALWARE |
Crypto |
|
|
22.12.24 |
The latest version of WezRat was recently distributed to multiple Israeli organizations in a wave of emails impersonating the Israeli National Cyber Directorate (INCD). |
MALWARE |
RAT |
|
|
21.12.24 |
Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware |
MALWARE |
Backdoor |
|
|
18.12.24 |
Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion |
MALWARE |
RAT |
|
|
18.12.24 |
Analyzing FLUX#CONSOLE: Using Tax-Themed Lures, Threat Actors Exploit Windows Management Console to Deliver Backdoor Payloads |
MALWARE |
Backdoor |
|
|
17.12.24 |
Until 2016, the foreign security manufacturer Forcepoint disclosed the existence of the Manlinghua organization for the first time [1] ,.. |
MALWARE |
RAT |
|
|
17.12.24 |
Bitter Group Launches New Trojan Miyarat, Domestic Users Become Primary Ttargets |
MALWARE |
RAT |
|
|
17.12.24 |
CoinLurker: The Stealer Powering the Next Generation of Fake Updates |
MALWARE |
STEALER |
|
|
16.12.24 |
“A Digital Prison”: Surveillance and the suppression of civil society in Serbia |
MALWARE |
ANDROID |
|
|
16.12.24 |
Glutton: A New Zero-Detection PHP Backdoor from Winnti Targets Cybercrimals |
MALWARE |
BACKDOOR |
|
|
16.12.24 |
New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9 |
MALWARE |
BACKDOOR |
|
|
14.12.24 |
New Yokai Side-loaded Backdoor Targets Thai Officials |
MALWARE |
BACKDOOR |
|
|
14.12.24 |
NodeLoader Exposed: The Node.js Malware Evading Detection |
MALWARE |
LOADER |
|
|
13.12.24 |
Team82 obtained a sample of a custom-built IoT/OT malware called IOCONTROL used by Iran-affiliated attackers to attack Israel- and U.S.-based OT/IoT devices. |
MALWARE |
IoT |
|
|
13.12.24 |
PUMAKIT is a sophisticated loadable kernel module (LKM) rootkit that employs advanced stealth mechanisms to hide its presence and maintain... |
MALWARE |
ROOTKIT |
|
|
12.12.24 |
Lookout Discovers Two Russian Android Spyware Families from Gamaredon APT |
MALWARE |
ANDROID |
|
|
12.12.24 |
Lookout Discovers Two Russian Android Spyware Families from Gamaredon APT |
MALWARE |
ANDROID |
|
|
11.12.24 |
Upgraded Kazuar Backdoor Offers Stealthy Power |
MALWARE |
BACKDOOR |
|
|
11.12.24 |
Inside Zloader’s Latest Trick: DNS Tunneling |
MALWARE |
TROJAN |
|
|
11.12.24 |
Lookout Discovers New Chinese Surveillance Tool Used by Public Security Bureaus |
MALWARE |
SPYWARE |
|
|
10.12.24 |
AppLite: A New AntiDot Variant Targeting Mobile Employee Devices |
MALWARE |
BANKING |
|
|
07.12.24 |
Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows |
MALWARE |
STEALER |
|
|
06.12.24 |
iVerify Mobile Threat Investigation Uncovers New Pegasus Samples |
MALWARE |
MOBILE |
|
|
06.12.24 |
Unveiling RevC2 and Venom Loader |
MALWARE |
LOADER |
|
|
06.12.24 |
BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging Infrastructure |
MALWARE |
DROPPER |
|
|
06.12.24 |
DroidBot: Insights from a new Turkish MaaS fraud operation |
MALWARE |
ANDROID |
|
|
03.12.24 |
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT |
MALWARE |
RAT |
|
|
03.12.24 |
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT |
MALWARE |
RAT |
|
|
02.12.24 |
SmokeLoader Attack Targets Companies in Taiwan |
MALWARE |
LOADER |
|
|
02.12.24 |
SpyLoan: A Global Threat Exploiting Social Engineering |
MALWARE |
SPYWARE |
|
|
28.11.24 |
Gaming Engines: An Undetected Playground for Malware Loaders |
MALWARE |
LOADER |
|
|
27.11.24 |
Bootkitty: Analyzing the first UEFI bootkit for Linux |
MALWARE |
BOOTKIT |
|
|
26.11.24 |
Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries |
MALWARE |
RAT |
|
|
25.11.24 |
When Guardians Become Predators: How Malware Corrupts the Protectors |
MALWARE |
ROOTKIT |
|
|
22.11.24 |
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository. |
MALWARE |
STEALER |
|
|
21.11.24 |
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine |
MALWARE |
LINUX BACKDOOR |
|
|
21.11.24 |
Attacks on Ukraine’s Energy Infrastructure: Harm to the Civilian Population |
MALWARE |
MALWARE |
|
|
21.11.24 |
Python NodeStealer Targets Facebook Ads Manager with New Techniques |
MALWARE |
STEALER |
|
|
19.11.24 |
Babble Babble Babble Babble Babble Babble BabbleLoader |
MALWARE |
LOADER |
|
|
18.11.24 |
The Abuse of ITarian RMM by Dolphin Loader |
MALWARE |
LOADER |
|
|
18.11.24 |
LodaRAT: Established Malware, New Victim Patterns |
MALWARE |
RAT |
|
|
18.11.24 |
Mr.Skeleton RAT - new malware based on the njRAT code |
MALWARE |
RAT |
|
|
16.11.24 |
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA |
MALWARE |
STEALER |
|
|
15.11.24 |
Malware Spotlight: A Deep-Dive Analysis of WezRat |
MALWARE |
RAT |
|
|
15.11.24 |
New PXA Stealer targets government and education sectors for sensitive information |
MALWARE |
STEALER |
|
|
14.11.24 |
Stealthy Attributes of Lazarus APT Group: Evading Detection with Extended Attributes |
MALWARE |
DOWNLOADER |
|
|
12.11.24 |
APT Actors Embed Malware within macOS Flutter Applications |
MALWARE |
MacOS |
|
|
12.11.24 |
Ymir: new stealthy ransomware in the wild |
MALWARE |
STEALER |
|
|
11.11.24 |
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign |
MALWARE |
LOADER |
|
|
08.11.24 |
Cloudy With a Chance of RATs: Unveiling APT36 and the Evolution of ElizaRAT |
MALWARE |
RAT |
|
|
08.11.24 |
Roblox Developers Targeted with npm Packages Infected with Skuld Infostealer and Blank Grabber |
MALWARE |
STEALER |
|
|
08.11.24 |
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging |
MALWARE |
LINUX |
|
|
08.11.24 |
BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence |
MALWARE |
CRYPTO |
|
|
07.11.24 |
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency |
MALWARE |
TROJAN |
|
|
06.11.24 |
Threat Campaign Spreads Winos4.0 Through Game Application |
MALWARE |
TROJAN |
|
|
06.11.24 |
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM |
MALWARE |
BANKING |
|
|
04.11.24 |
As part of our ongoing mission to identify emerging threats to mobile security, ... |
MALWARE |
ANDROID |
|
|
1.11.24 |
In May 2024, ThreatFabric published a report about LightSpy for macOS. |
MALWARE |
iOS |
|
|
28.10.24 |
Tenacious Pungsan: A DPRK threat actor linked to Contagious Interview |
MALWARE |
PYTHON |
|
|
28.10.24 |
Grandoreiro, the global trojan with grandiose goals |
MALWARE |
BANKING |
|
|
28.10.24 |
Analyzing Latrodectus: The New Face of Malware Loaders |
MALWARE |
LOADER |
|
|
27.10.24 |
Analysis of a newly discovered Linux based variant of the DPRK attributed FASTCash malware along with background information on payment switches used in financial networks. |
MALWARE |
LINUX |
|
|
27.10.24 |
Expanding the Investigation: Deep Dive into Latest TrickMo Samples |
MALWARE |
BANKING |
|
|
27.10.24 |
DarkVision RAT is a highly customizable remote access trojan (RAT) that first surfaced in 2020,... |
MALWARE |
RAT |
|
27.9.24 |
DCRat Targets Users with HTML Smuggling |
MALWARE |
RAT |
|
27.9.24 |
Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy |
MALWARE |
BACKDOOR |
|
27.9.24 |
Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy |
MALWARE |
KEYLOGGER |
|
25.9.24 |
Cyfirma researchers have discovered a website promoting a tool called 'Taliban Stealer'. |
MALWARE |
Stealer |
|
25.9.24 |
A Comprehensive Analysis of Angry Stealer : Rage Stealer in a New Disguise |
MALWARE |
Stealer |
|
25.9.24 |
X-FILES Stealer: Advanced malware with sophisticated features and ongoing enhancements |
MALWARE |
Stealer |
|
25.9.24 |
QWERTY is a newly discovered infostealer variant observed being hosted on a Linux-based virtual private server located in Germany with limited service exposure. |
MALWARE |
Stealer |
|
25.9.24 |
There's Something About CryptBot: Yet Another Silly Stealer (YASS) |
MALWARE |
Stealer |
|
25.9.24 |
At CYFIRMA, we are dedicated to delivering timely insights into emerging threats and malicious tactics that pose risks to both organizations and individuals. |
MALWARE |
Keylogger |
|
25.9.24 |
Poseidon Stealer Uses Sora AI Lure to Infect macOS |
MALWARE |
Stealer |
|
25.9.24 |
Luxy: A Stealer and a Ransomware in one |
MALWARE |
Stealer |
|
25.9.24 |
Gomorrah Stealer v5.1: An In-Depth Analysis of a .NET-Based Malware |
MALWARE |
Stealer |
|
25.9.24 |
In August 2024, FortiGuard Labs observed a python infostealer we call Emansrepo that is distributed via emails that include fake purchase orders and invoices. |
MALWARE |
Stealer |
|
25.9.24 |
BLX Stealer known also as XLABB Stealer is a malware variant initially discovered back last year. New activity attributed to this infostealer has been observed in the wild. |
MALWARE |
Stealer |
|
25.9.24 |
Security Brief: Actor Uses Compromised Accounts, Customized Social Engineering to Target Transport and Logistics Firms with Malware |
MALWARE |
RAT |
|
25.9.24 |
Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool |
MALWARE |
Tool Exploit |
|
25.9.24 |
Spyware Injection Into Your ChatGPT's Long-Term Memory (SpAIware) |
MALWARE |
Spyware AI |
|
24.9.24 |
Octo2: European Banks Already Under Attack by New Malware Variant |
MALWARE |
Android |
|
24.9.24 |
How the Necro Trojan infiltrated Google Play, again |
MALWARE |
TROJAN |
|
23.9.24 |
Gleaming Pisces Poisoned Python Packages Campaign Delivers PondRAT Linux and MacOS Backdoors |
MALWARE |
RAT |
|
19.9.24 |
Exotic SambaSpy is now dancing with Italian users |
MALWARE |
RAT |
|
18.9.24 |
An Offer You Can Refuse: UNC2970 Backdoor Deployment Using Trojanized PDF Reader |
MALWARE |
Backdoor |
|
17.9.24 |
North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware |
MALWARE |
CRYPTOCURRENCY |
|
14.9.24 |
A new TrickMo saga: from Banking Trojan to Victim's Data Leak |
MALWARE |
Banking |
|
14.9.24 |
Hadooken Malware Targets Weblogic Applications |
MALWARE |
Linux |
|
13.9.24 |
Ajina attacks Central Asia: Story of an Uzbek Android Pandemic |
MALWARE |
Banking |
|
13.9.24 |
Void captures over a million Android TV boxes |
MALWARE |
TV |
|
13.9.24 |
Targeted Iranian Attacks Against Iraqi Government Infrastructure |
MALWARE |
ISS Backdoor |
|
13.9.24 |
Targeted Iranian Attacks Against Iraqi Government Infrastructure |
MALWARE |
ISS Backdoor |
|
9.9.24 |
WhisperGate is a multi-stage wiper designed to look like ransomware that has been used against multiple government, non-profit, ... |
MALWARE |
Wrapper |
|
9.9.24 |
New Android SpyAgent Campaign Steals Crypto Credentials via Image Recognition |
MALWARE |
Android |
|
9.9.24 |
Loki: a new private agent for the popular Mythic framework |
MALWARE |
Backdoor |
|
9.9.24 |
TIDRONE Targets Military and Satellite Industries in Taiwan |
MALWARE |
Military Malware |
|
8.9.24 |
North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job Scams |
MALWARE |
Python |
|
5.9.24 |
Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion |
MALWARE |
Backdoor |
|
5.9.24 |
Spoofed GlobalProtect Used to Deliver Unique WikiLoader Variant |
MALWARE |
Loader |
|
5.9.24 |
Rocinante: The trojan horse that wanted to fly |
MALWARE |
Trojan |
|
30.8.24 |
Threat Actors Target the Middle East Using Fake Palo Alto GlobalProtect Tool |
MALWARE |
Backdoor |
|
30.8.24 |
APT Attack Case Analysis Report Using noMu Backdoor |
MALWARE |
Backdoor |
|
28.8.24 |
HZ Rat backdoor for macOS attacks users of China’s DingTalk and WeChat |
MALWARE |
MacOS |
|
26.8.24 |
NGate Android malware relays NFC traffic to steal cash |
MALWARE |
Android |
|
25.8.24 |
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules |
MALWARE |
Linux |
|
24.8.24 |
PEAKLIGHT: Decoding the Stealthy Memory-Only Malware |
MALWARE |
Downloader |
|
23.8.24 |
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS |
MALWARE |
MacOS |
|
23.8.24 |
MIFARE Classic: exposing the static encrypted nonce variant... and a few hardware backdoors |
MALWARE |
Backdoor |
|
22.8.24 |
PG_MEM: A Malware Hidden in the Postgres Processes |
MALWARE |
CRYPTOCURRENCY |
|
21.8.24 |
MoonPeak malware from North Korean actors unveils new details on attacker infrastructure |
MALWARE |
RAT |
|
21.8.24 |
Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove |
MALWARE |
Stealer |
|
21.8.24 |
TodoSwift Disguises Malware Download Behind Bitcoin PDF |
MALWARE |
MacOS |
|
21.8.24 |
CharmingCypress: Innovating Persistence |
MALWARE |
Families |
|
21.8.24 |
Meet UULoader: An Emerging and Evasive Malicious Installer. |
MALWARE |
Loader |
|
21.8.24 |
Finding Malware: Unveiling NUMOZYLOD with Google Security Operations |
MALWARE |
Maas |
|
16.8.24 |
SharpRhino – New Hunters International RAT Identified by Quorum Cyber |
MALWARE |
RAT |
|
16.8.24 |
A Deep Dive into a New ValleyRAT Campaign Targeting Chinese Speakers |
MALWARE |
RAT |
|
16.8.24 |
Update: Cuckoo Malware Evolves |
MALWARE |
MacOS |
|
16.8.24 |
Beyond the wail: deconstructing the BANSHEE infostealer |
MALWARE |
MacOS |
|
7.8.24 |
Cloud Cover: How Malicious Actors Are Leveraging Cloud Services |
MALWARE |
Backdoor |
|
7.8.24 |
Chameleon is back in Canada and Europe |
MALWARE |
Mobil Trojan |
|
|
6.8.24 |
LianSpy: new Android spyware targeting Russian users |
MALWARE |
Android |
|
5.8.24 |
Bloody Wolf strikes organizations in Kazakhstan with STRRAT commercial malware |
MALWARE |
RAT |
|
5.8.24 |
BlankBot - a new Android banking trojan with screen recording, keylogging and remote control capabilities |
MALWARE |
Android Banking |
|
5.8.24 |
StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms |
MALWARE |
Backdoor |
|
3.8.24 |
BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor |
MALWARE |
Backdoor |
|
2.8.24 |
BingoMod: The new android RAT that steals money and wipes data |
MALWARE |
RAT |
|
2.8.24 | A trojan for Linux with a wide range of functions and the ability to be remotely controlled via a Telegram bot. The source code is written in Go and encrypted with RSA. |
MALWARE | RAT |
|
2.8.24 | At the first stage, the dropper checks the parameters (arguments) used for its launch: this impacts the intermediate persistence stage. |
MALWARE | RAT |
|
2.8.24 | Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps |
MALWARE | SMS |
|
2.8.24 | Mandrake spyware sneaks onto Google Play again, flying under the radar for two years |
MALWARE | Spyware |
|
2.8.24 | Phishing targeting Polish SMBs continues via ModiLoader |
MALWARE | Loader |
|
27.7.24 |
Some simple PowerShell scripts might deliver nasty content if executed by the target. I found a very simple one (with a low VT score of 8/65): |
MALWARE |
Stealer |
|
27.7.24 |
CrowdStrike’s Falcon agent caused downtime for millions of computers across the globe beginning July 19. |
MALWARE |
Wipper |
|
25.7.24 |
ACR Stealer is an information stealer advertised by a threat actor operating under the pseudonym SheldIO, on Russian-speaking cybercrime forums. |
MALWARE |
Stealer |
|
24.7.24 | Infect If Needed | A Deeper Dive Into Targeted Backdoor macOS.Macma |
MALWARE | macOS |
|
24.7.24 |
Impact of FrostyGoop ICS Malware on Connected OT Systems |
MALWARE |
ICS |
|
23.7.24 |
Fake Browser Updates Lead to BOINC Volunteer Computing Software |
MALWARE |
Malware |
|
20.7.24 |
‘AuKill’ EDR killer malware abuses Process Explorer driver |
MALWARE |
Tool |
|
20.7.24 |
BugSleep is a backdoor designed to execute the threat actors’ commands and transfer files between the compromised machine and the C&C server. |
MALWARE |
Backdoor |
|
19.7.24 |
A Comprehensive Look at the Updated Infection Chain of Ghost Emperor’s Demodex Rootkit. |
MALWARE |
Rootkit |
|
19.7.24 |
OilAlpha Malicious Applications Target Humanitarian Aid Groups Operating in Yemen |
MALWARE |
Mobil App |
|
18.7.24 |
HotPage: Story of a signed, vulnerable, ad-injecting driver |
MALWARE |
Adware |
|
18.7.24 |
North Korean Hackers Update BeaverTail Malware to Target MacOS Users |
MALWARE |
Stealer |
|
16.7.24 |
NEW BUGSLEEP BACKDOOR DEPLOYED IN RECENT MUDDYWATER CAMPAIGNS |
MALWARE |
Backdoor |
|
15.7.24 |
How SYS01 Stealer Will Get Your Sensitive Facebook Info |
MALWARE |
Stealer |
|
13.7.24 |
DarkGate: Dancing the Samba With Alluring Excel Files |
MALWARE |
RAT |
|
11.7.24 |
DodgeBox: A deep dive into the updated arsenal of APT41 | Part 1 |
MALWARE |
Loader |
|
11.7.24 |
New Malware Campaign Targeting Spanish Language Victims |
MALWARE |
RAT |
|
10.7.24 |
The Mechanics of ViperSoftX: Exploiting AutoIt and CLR for Stealthy PowerShell Execution |
MALWARE |
Malware |
|
9.7.24 |
Lookout Discovers Houthi Surveillanceware Targeting Middle Eastern Militaries |
MALWARE |
Android |
|
8.7.24 |
StrelaStealer Resurgence: Tracking a JavaScript-Driven Credential Stealer Targeting Europe |
MALWARE |
Stealer |
|
8.7.24 |
Satanstealer is a new open source infostealing malware shared on GitHub. |
MALWARE |
Stealer |
|
8.7.24 |
‘Poseidon’ Mac stealer distributed via Google ads |
MALWARE |
Stealer |
|
8.7.24 |
0bj3ctivity is an infostealer variant first observed last year in campaigns targeting Italy. |
MALWARE |
Stealer |
|
8.7.24 |
A new malware strain dubbed Neptune Stealer has been uncovered by researchers. |
MALWARE |
Stealer |
|
8.7.24 |
Kematian-Stealer : A Deep Dive into a New Information Stealer |
MALWARE |
Stealer |
|
8.7.24 |
Mekotio Banking Trojan Threatens Financial Systems in Latin America |
MALWARE |
Banking |
|
5.7.24 |
GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks |
MALWARE |
Loader |
|
4.7.24 |
MerkSpy: Exploiting CVE-2021-40444 to Infiltrate Systems |
MALWARE |
Spyware |
|
3.7.24 |
A Brief History of SmokeLoader, Part 2 |
MALWARE |
Loader |
|
3.7.24 |
A Brief History of SmokeLoader, Part 1 |
MALWARE |
Loader |
|
3.7.24 |
Exposing FakeBat loader: distribution methods and adversary infrastructure |
MALWARE |
Loader |
|
3.7.24 |
Kimsuky Group's New Backdoor Appears (HappyDoor) |
MALWARE |
Backdoor |
|
3.7.24 |
Xctdoor Malware Used in Attacks Against Korean Companies (Andariel) |
MALWARE |
Backdoor |
|
1.7.24 |
CapraTube Remix | Transparent Tribe’s Android Spyware Targeting Gamers, Weapons Enthusiasts |
MALWARE |
Android |
|
1.7.24 |
Beware of Snowblind: A new Android malware |
MALWARE |
Android |
|
|
20.6.24 |
LevelBlue Labs Discovers Highly Evasive, New Loader Targeting Chinese Organizations |
MALWARE |
Loader |
|
|
18.6.24 |
Info Stealing Campaign Uses DLL Sideloading Through Legitimate Cisco Webex’s Binaries for Initial Execution and Defense Evasion |
MALWARE |
Loader |
|
|
17.6.24 |
Ministry of Defence of the Netherlands uncovers COATHANGER,a stealthy Chinese FortiGate RAT |
MALWARE |
RAT |
|
|
17.6.24 |
Backdoor BadSpace delivered by high-ranking infected websites |
MALWARE |
Backdoor |
|
|
17.6.24 |
Botnet Installing NiceRAT Malware |
MALWARE |
RAT |
|
|
15.6.24 |
DISGOMOJI Malware Used to Target Indian Government |
MALWARE |
Linux |
|
|
15.6.24 |
Smishing Triad Is Targeting Pakistan To Defraud Banking Customers At Scale |
MALWARE |
Banking |
|
|
14.6.24 |
In Bad Company: JScript RAT and CobaltStrike |
MALWARE |
RAT |
|
|
14.6.24 |
Dissecting SSLoad Malware: A Comprehensive Technical Analysis |
MALWARE |
Loader |
|
|
13.6.24 |
Noodle RAT: Reviewing the Backdoor Used by Chinese-Speaking Groups |
MALWARE |
RAT |
|
|
13.6.24 |
Dipping into Danger: The WARMCOOKIE backdoor |
MALWARE |
Backdoor |
|
|
12.6.24 |
Technical Analysis of the Latest Variant of ValleyRAT |
MALWARE |
RAT |
|
|
11.6.24 |
More_eggs Activity Persists Via Fake Job Applicant Lures |
MALWARE |
Backdoor |
|
7.6.24 | SPECTR Malware Targets Ukraine Defense Forces in SickSync Campaign |
MALWARE | Stealer |
|
7.6.24 | Muhstik Malware Targets Message Queuing Services Applications |
MALWARE | Trojan |
|
6.6.24 | BoxedApp products are general packers built on top of its SDK, which provides the ability to create Virtual Storage (Virtual File System, Virtual Registry),.. |
MALWARE | App |
|
6.6.24 | Russia-linked 'Lumma' crypto stealer now targets Python devs |
MALWARE | Stealer |
|
5.6.24 |
During 2023, DarkGate made a comeback with a version full of new features, becoming one of the most preferred Remote Access Trojans (RATs) by malicious actors. |
MALWARE | RAT |
|
3.6.24 | Fake Browser Updates delivering BitRAT and Lumma Stealer |
MALWARE | Stealer |
|
3.6.24 | Fake Browser Updates delivering BitRAT and Lumma Stealer |
MALWARE | RAT |
|
30.5.24 |
AhMyth is malware that spreads through a few different infection vectors and uses various means to collect and exfiltrate sensitive information from infected devices. |
MALWARE |
Android |
|
30.5.24 |
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit |
MALWARE |
Cryptocurrency |
|
30.5.24 |
PyPI crypto-stealer targets Windows users, revives malware campaign |
MALWARE |
Python |
|
29.5.24 |
ALLASENHA: ALLAKORE VARIANT LEVERAGES AZURE CLOUD C2 TO STEAL BANKING DETAILS IN LATIN AMERICA |
MALWARE |
RAT |
|
25.5.24 | BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in fact an updated version of Deed RAT, |
MALWARE | RAT |
|
25.5.24 | Malware Transmutation! - Unveiling the Hidden Traces of BloodAlchemy |
MALWARE | RAT |
|
22.5.24 |
Analysis and Detection of CLOUD#REVERSER: An Attack Involving Threat Actors Compromising Systems Using A Sophisticated Cloud-Based Malware |
MALWARE |
InfoStealer |
|
21.5.24 |
No-Justice Wiper - Wiper attack on Albania by Iranian APT) |
MALWARE |
Wipper |
|
21.5.24 |
Iranian State Actors Conduct Cyber Operations Against the Government of Albania |
MALWARE |
Wipper |
|
20.5.24 |
The LATRODECTUS loader evolves to deliver ICEDID and other malware |
MALWARE |
Loader |
|
20.5.24 |
Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns |
MALWARE |
Banking |
|
18.5.24 |
Artificial Sweetener: SugarGh0st RAT Used to Target American Artificial Intelligence Experts |
MALWARE |
RAT |
|
18.5.24 |
More than one legitimate software package was modified to deliver malware in North Korean group’s recent campaign against South Korean organizations. |
MALWARE |
Backdoor |
|
16.5.24 |
ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs |
MALWARE |
APT |
|
16.5.24 |
ESET researchers provide technical analysis of the Lunar toolset, likely used by the Turla APT group, that infiltrated a European ministry of foreign affairs |
MALWARE |
APT |
|
11.5.24 |
zEus Stealer Distributed via Crafted Minecraft Source Pack |
MALWARE |
Stealer |
|
10.5.24 |
Coper is a descendant of ExoBotCompat, which was a rewritten version of Exobot. |
MALWARE |
Android |
|
8.5.24 | HijackLoader (a.k.a. IDAT Loader) is a malware loader initially spotted in 2023 that is capable of using a variety of modules for code injection and execution. |
MALWARE | Loader |
|
7.5.24 | Post-infection traffic triggers signatures for Win32/MetaStealer Related Activity from the EmergingThreats Pro (ETPRO) ruleset. |
MALWARE | Stealer |
|
7.5.24 | CharmingCypress: Innovating Persistence |
MALWARE | VBS |
|
7.5.24 | Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion |
MALWARE | Python |
|
6.5.24 | Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware |
MALWARE | Apple |
|
3.5.24 |
The Black Lotus Labs team at Lumen Technologies is tracking a malware platform we’ve named Cuttlefish, that targets networking equipment, ... |
MALWARE | Trojan |
|
3.5.24 |
Playing Possum: What's the Wpeeper Backdoor Up To? |
MALWARE | Backdoor |
|
3.5.24 |
Graph: Growing number of threats leveraging Microsoft API |
MALWARE |
|
|
1.5.24 |
Zloader Learns Old Tricks |
MALWARE | Trojan |
|
|
27.4.24 |
Brokewell: do not go broke from new banking malware! |
MALWARE |
Android |
|
|
27.4.24 |
From BYOVD to a 0-day: Unveiling Advanced Exploits in Cyber Recruiting Scams |
MALWARE |
RAT |
|
|
25.4.24 |
Analysis of Pupy RAT Used in Attacks Against Linux Systems |
MALWARE |
RAT |
|
|
25.4.24 |
GuptiMiner: Hijacking Antivirus Updates for Distributing Backdoors and Casual Mining |
MALWARE |
Cryptocurrency |
|
|
24.4.24 |
Suspected CoralRaider continues to expand victimology using three information stealers |
MALWARE |
Stealer |
|
|
22.4.24 |
A new packed variant of the Redline Stealer trojan was observed in the wild, leveraging Lua bytecode to perform malicious behavior. |
MALWARE |
Stealer |
|
|
19.4.24 |
Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear |
MALWARE |
Loader |
|
|
19.4.24 |
OfflRouter virus causes Ukrainian users to upload confidential documents to VirusTotal |
MALWARE |
VBA Macro |
|
|
19.4.24 |
CR4t Malware: A Shape-Shifting Threat — Threat Intelligence Report |
MALWARE |
Backdoor |
|
|
18.4.24 |
SoumniBot: the new Android banker’s unique techniques |
MALWARE |
Android Banking |
|
|
18.4.24 |
Malvertising campaign targeting IT teams with MadMxShell |
MALWARE |
Backdoor |
|
|
18.4.24 |
Kapeka: A novel backdoor spotted in Eastern Europe |
MALWARE |
Backdoor |
|
|
15.4.24 |
LightSpy Returns: Renewed Espionage Campaign Targets Southern Asia, Possibly India |
MALWARE |
ios |
|
11.4.24 |
Analyzing the FUD Malware Obfuscation Engine BatCloak |
MALWARE | FUD Engine |
|
11.4.24 |
eXotic Visit campaign: Tracing the footprints of Virtual Invaders |
MALWARE | RAT |
|
|
10.4.24 |
Smoke and (screen) mirrors: A strange signed backdoor |
MALWARE |
Backdoor |
|
|
9.4.24 |
ScrubCrypt Deploys VenomRAT with an Arsenal of Plugins |
MALWARE |
Crypto |
|
|
8.4.24 |
Latrodectus: This Spider Bytes Like Ice |
MALWARE |
Downloader |
|
|
8.4.24 |
Bing ad for NordVPN leads to SecTopRAT |
MALWARE |
RAT |
|
|
5.4.24 |
Rhadamanthys Malware Disguised as Groupware Installer (Detected by MDS) |
MALWARE |
Stealer |
|
|
5.4.24 |
Resecurity has detected a new version of JSOutProx, targeting financial services and organizations in the APAC and MENA regions. |
MALWARE |
Tool |
|
|
5.4.24 |
Byakugan – The Malware Behind a Phishing Attack |
MALWARE |
infostealer |
|
|
5.4.24 |
Extra credit: VietCredCare information stealer takes aim at Vietnamese businesses |
MALWARE |
Stealer |
|
|
5.4.24 |
AGENT TESLA TARGETING UNITED STATES & AUSTRALIA: REVEALING THE ATTACKERS’ IDENTITIES |
MALWARE |
RAT |
|
|
5.4.24 |
SonicWall Capture Labs threat research team has observed an updated variant of StrelaStealer. |
MALWARE |
Stealer |
|
|
5.4.24 |
This study provides a detailed overview of Sync-Scheduler, a potent malware written in C++ boasting defense evasion and anti-analysis capabilities. |
MALWARE |
Stealer |
|
|
5.4.24 |
Recently Updated Rhadamanthys Stealer Delivered in Federal Bureau of Transportation Campaign |
MALWARE |
Stealer |
|
|
3.4.24 |
Breaking Boundaries: Mispadu's Infiltration Beyond LATAM |
MALWARE |
Banking |
|
|
2.4.24 |
Everything I Know About the XZ Backdoor |
MALWARE |
Backdoor |
|
|
2.4.24 |
Earth Freybug Uses UNAPIMON for Unhooking Critical APIs |
MALWARE |
Backdoor |
|
|
2.4.24 |
VenomRAT: A remote access tool with dangerous consequences |
MALWARE |
RAT |
|
1.4.24 |
Satori Threat Intelligence Alert: PROXYLIB and LumiApps Transform Mobile Devices into Proxy Nodes |
MALWARE | APP |
|
1.4.24 |
Android Malware Vultur Expands Its Wingspan |
MALWARE | Android |
|
|
31.3.24 |
The authors behind Android banking malware Vultur have been spotted adding new technical features, ... |
MALWARE |
Android |
|
|
31.3.24 |
Infostealers continue to pose threat to macOS users |
MALWARE |
MacOS |
|
|
30.3.24 |
Linksys Worm ("TheMoon") Captured |
MALWARE |
Worm |
|
|
30.3.24 |
DinodasRAT Linux implant targeting entities worldwide |
MALWARE |
RAT |
|
|
28.3.24 |
Agent Tesla's New Ride: The Rise of a Novel Loader |
MALWARE |
Loader |
|
|
27.3.24 |
MALWARE |
osx |
||
|
27.3.24 |
Trochilus is a C++ written RAT, which is available on GitHub. |
MALWARE |
RAT |
|
|
23.3.24 |
Here, MUSKYBEAT refers to the in-memory dropper component, while STATICNOISE is the final payload / downloader. |
MALWARE |
Dropper |
|
|
23.3.24 |
According to Mandiant, BEATDROP is a downloader written in C that uses Atlassian's project management service Trello for C&C. |
MALWARE |
Dropper |
|
|
23.3.24 |
Backchannel Diplomacy: APT29’s Rapidly Evolving Diplomatic Phishing Operations |
MALWARE |
Spy |
|
|
23.3.24 |
APT29 Uses WINELOADER to Target German Political Parties |
MALWARE |
Loader |
|
|
22.3.24 |
Sign1 Malware: Analysis, Campaign History & Indicators of Compromise |
MALWARE |
JavaScript |
|
|
22.3.24 |
Revenge RAT via malicious PPAM in Latin America, Portugal and Spain |
MALWARE |
RAT |
|
|
22.3.24 |
Insight into ESET telemetry statistics about AceCryptor in H2 2023 with a focus on Rescoms campaigns in European countries |
MALWARE |
RAT |
|
|
22.3.24 |
Stealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. |
MALWARE |
Loader |
|
|
22.3.24 |
StrelaStealer malware steals email login data from well-known email clients and sends them back to the attacker’s C2 server. |
MALWARE |
Stealer |
|
|
22.3.24 |
A MIPS ELF binary with wiper functionality used against Viasat KA-SAT modems. |
MALWARE |
Wipper |
|
|
22.3.24 |
AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine |
MALWARE |
Wipper |
|
|
22.3.24 |
AndroxGh0st is a Python-based malware designed to target Laravel applications. |
MALWARE |
Android |
|
20.3.24 | According to zscaler, PureCrypter is a fully-featured loader being sold since at least March 2021 |
MALWARE | Crypter |
|
20.3.24 | Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor |
MALWARE | Loader |
|
20.3.24 | WhiteSnake Stealer: Unveiling the Latest Version – Less Obfuscated, More Dangerous |
MALWARE | Stealer |
|
20.3.24 | The GlorySprout or a Failed Clone of Taurus Stealer |
MALWARE | Stealer |
|
20.3.24 | CoinMiner (KONO DIO DA) Distributed to Linux SSH Servers |
MALWARE | CoinMiner |
|
20.3.24 | A MIPS ELF binary with wiper functionality used against Viasat KA-SAT modems. |
MALWARE | Wiper |
|
20.3.24 | Enigma Software notes that NetSupport Manager is a genuine application, which was first released about twenty years ago. |
MALWARE | RAT |
|
20.3.24 | APT37's ROKRAT HWP Object Linking and Embedding |
MALWARE | RAT |
|
18.3.24 | Scalable Vector Graphics (SVG) files are a popular format for web graphics because they can be resized without losing quality. |
MALWARE | Malware |
|
18.3.24 | From Delivery To Execution: An Evasive Azorult Campaign Smuggled Through Google Sites |
MALWARE | Stealer |
|
18.3.24 | PowerShell script |
MALWARE | Stealer |
|
18.3.24 | the malware was used previously in campaigns from July through August, and September 2023 |
MALWARE | Stealer |
|
18.3.24 | The government computer emergency response team of Ukraine CERT-UA detected a malicious document "Nuclear Terrorism A Very Real Threat.rtf", ... |
MALWARE | JavaScript |
|
18.3.24 | X-Force’s analysis revealed that OCEANMAP has a strong overlap in both technique and .NET implementation. |
MALWARE | Backdoor |
|
18.3.24 | Compromised Routers Are Still Leveraged as Malicious Infrastructure to Target Government Organizations in Europe and the Caucasus |
MALWARE | Python |
|
17.3.24 | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. |
MALWARE | Keylogger |
|
17.3.24 | RisePro stealer targets Github users in “gitgub” campaign |
MALWARE | Stealer |
|
17.3.24 | Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled |
MALWARE | Loader |
|
|
14.3.24 |
Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor) |
MALWARE |
Wrapper |
|
|
14.3.24 |
Unveiling Earth Kapre aka RedCurl’s Cyberespionage Tactics With Trend Micro MDR, Threat Intelligence |
MALWARE |
CyberSpy |
|
|
14.3.24 |
zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. |
MALWARE |
RAT |
|
|
14.3.24 |
According to Subex Secure, CyberGate is a Remote Access Trojan (RAT) that allows an attacker to gain unauthorized access to the victim’s system. |
MALWARE |
RAT |
|
|
14.3.24 |
Planet Stealer is a recently identified infostealing malware variant. This Go-based malware has been advertised for sale on underground forums. |
MALWARE |
Stealer |
|
|
14.3.24 |
Latest DBatLoader Uses Driver Module to Disable AV/EDR Software |
MALWARE |
Loader |
|
|
14.3.24 |
Tweaks Stealer Targets Roblox Users Through YouTube and Discord |
MALWARE |
Stealer |
|
|
14.3.24 |
Unveiling Phemedrone Stealer: Threat Analysis and Detections |
MALWARE |
Stealer |
|
|
14.3.24 |
According to ESET Research, Mispadu is an ambitious Latin American banking trojan that utilizes McDonald’s malvertising and extends its attack surface to web browsers. |
MALWARE |
Banking |
|
|
14.3.24 |
First documented in 2018, DarkGate is a commodity loader with features that include the ability to download and execute files to memory, ... |
MALWARE |
Loader |
|
|
13.3.24 |
PixPirate: The Brazilian financial malware you can’t see |
MALWARE |
Android |
|
|
13.3.24 |
STRRAT is a Java-based RAT, which makes extensive use of plugins to provide full remote access to an attacker, as well as credential stealing, key logging and additional plugins. |
MALWARE |
RAT |
|
|
13.3.24 |
Recently, FortiGuard Labs uncovered a phishing campaign that entices users to download a malicious Java downloader with ... |
MALWARE |
Java |
|
|
12.3.24 |
RL has discovered a campaign using PyPI packages posing as open-source libraries to steal BIP39 mnemonic phrases, which are used for wallet recovery. |
MALWARE |
PyPI |
|
|
12.3.24 |
FortiGuard Labs recently uncovered a threat actor employing a malicious PDF file to propagate the banking Trojan CHAVECLOAK. |
MALWARE |
Banking |
|
|
11.3.24 | MALWARE |
Backdoor |
||
|
7.3.24 |
My Tea’s not cold. An overview of China’s cyber threat |
MALWARE |
Bot |
|
|
7.3.24 |
In this Threat Analysis Report, Cybereason Security Services dives into the Python Infostealer, ... |
MALWARE |
InfoStealer |
|
|
7.3.24 |
AhnLab Security intelligence Center (ASEC) has recently discovered the distribution of backdoor malware via aNotepad, a free online notepad platform. |
MALWARE |
RAT |
|
|
7.3.24 |
The malware has been released on github at https://github.com/EVLF/Cypher-Rat-Source-Code |
MALWARE |
RAT |
|
|
6.3.24 |
According to PcRisk, Research shows that the OceanLotus 'backdoor' targets MacOS computers. |
MALWARE |
OSX |
|
|
6.3.24 |
TODDLERSHARK: ScreenConnect Vulnerability Exploited to Deploy BABYSHARK Variant |
MALWARE |
VBS |
|
2.3.24 | GUloader Unmasked: Decrypting the Threat of Malicious SVG Files |
MALWARE | Loader |
|
2.3.24 | The Art of Domain Deception: Bifrost's New Tactic to Deceive Users |
MALWARE | RAT |
|
2.3.24 | GTPDOOR - A novel backdoor tailored for covert access over the roaming exchange |
MALWARE | Backdoor |
|
2.3.24 | European diplomats targeted by SPIKEDWINE with WINELOADER |
MALWARE | Loader |
|
1.3.24 | A custom backdoor written in C++ capable of file exfiltration and upload, command execution, and more. Communicates using Azure cloud infrastructure. |
MALWARE | Backdoor |
|
1.3.24 | A custom backdoor that provides a more flexible code-execution interface and enhanced reconnaissance features compared to MINIBIKE |
MALWARE | Backdoor |
|
1.3.24 | A tunneler, likely based on an open-source Socks4a proxy, that communicates using Azure cloud infrastructure |
MALWARE | Backdoor |
|
28.2.24 | Pony (also known as Fareit or Siplog) is a malware categorized as a loader and stealer, although it is also used as a botnet, being a tool that has been used for.. |
MALWARE | Stealer |
|
28.2.24 | New macOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group |
MALWARE | Backdoor |
|
28.2.24 | When Stealers Converge: New Variant of Atomic Stealer in the Wild |
MALWARE | Stealer |
|
28.2.24 | According to ESET Research, Mispadu is an ambitious Latin American banking trojan that utilizes McDonald’s malvertising and extends its attack surface to web browsers. |
MALWARE | Banking |
|
28.2.24 | Modular malware framework targeting SOHO network devices |
MALWARE | Linux |
|
28.2.24 | Compromised Routers Are Still Leveraged as Malicious Infrastructure to Target Government Organizations in Europe and the Caucasus |
MALWARE | Loader |
|
28.2.24 | Analysis of Nood RAT Used in Attacks Against Linux (Gh0st RAT’s Variant) |
MALWARE | RAT |
|
27.2.24 | Unveiling UAC-0184: The Steganography Saga of the IDAT Loader Delivering Remcos RAT to a Ukraine Entity in Finland |
MALWARE | Loader |
|
27.2.24 | DarkVNC is a hidden utility based on the Virtual Network Computing (VNC) technology, initially promoted on an Exploit forum in 2016. |
MALWARE | Stealer |
|
27.2.24 | We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware. |
MALWARE | RAT |
|
27.2.24 | We have discovered some of the most dangerous threats and nation state attacks in our space – including the Kaseya MSP breach and the more_eggs malware. |
MALWARE | RAT |
|
27.2.24 | Ousaban: LATAM Banking Malware Abusing Cloud Services |
MALWARE | Banking |
|
27.2.24 | Tweet on recent Mekotio Banker campaign |
MALWARE | Banking |
|
27.2.24 | First spotted in the wild in 2017, Astaroth is a highly prevalent, information-stealing Latin American banking trojan. It is written in Delphi and has some innovative... |
MALWARE | Banking |
|
22.2.24 | SSH-Snake: New Self-Modifying Worm Threatens Networks |
MALWARE | Worm |
|
22.2.24 | To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer |
MALWARE | RAT |
|
21.2.24 | Mustang Panda’s PlugX new variant targetting Taiwanese government and diplomats |
MALWARE | Stealer |
|
21.2.24 | Extra credit: VietCredCare information stealer takes aim at Vietnamese businesses |
MALWARE | Stealer |
|
21.2.24 | Migo - a Redis Miner with Novel System Weakening Techniques |
MALWARE | Miner |
|
21.2.24 | Sysjoker is a backdoor malware that was first discovered in December 2021 by Intezer. |
MALWARE | Backdoor |
|
21.2.24 | According to Security Joes, this malware is an x64 ELF executable, lacking obfuscation or protective measures. |
MALWARE | Wipper |
|
19.2.24 | Anatsa Trojan Returns: Targeting Europe and Expanding Its Reach |
MALWARE | Android |
|
19.2.24 | Through its managed security services offerings, Volexity routinely identifies spear-phishing campaigns targeting its customers. |
MALWARE | Backdoor |
|
18.2.24 | Raccoon Stealer v2 – Part 1: The return of the dead |
MALWARE | Stealer |
|
18.2.24 |
An info stealer is malicious software (malware) that seeks to steal private data from a compromised device, including passwords, cookies, autofill information from browsers,
|
MALWARE | Stealer |
|
17.2.24 | According to CERT-UA, this malware makes use of XSLT (Extensible Stylesheet Language Transformations) and COM-hijacking. |
MALWARE | Backdoor |
|
17.2.24 | TinyTurla Next Generation - Turla APT spies on Polish NGOs |
MALWARE | Backdoor |
|
17.2.24 | Group-IB uncovers the first iOS Trojan harvesting facial recognition data used for unauthorized access to bank accounts. The GoldDigger family grows |
MALWARE | iOS |
|
17.2.24 | This malware is delivered by an ISO file, with an DLL inside with a custom loader. Because of the unique user-agent "bumblebee" this malware was dubbed BUMBLEBEE. |
MALWARE | Loader |
|
17.2.24 | CVE-2024-21412: Water Hydra Targets Traders With Microsoft Defender SmartScreen Zero-Day |
MALWARE | Loader |
|
17.2.24 | Diving Into Glupteba's UEFI Bootkit |
MALWARE | Bootkit |
|
17.2.24 | Pikabot is a malware loader that originally emerged in early 2023. Over the past year, ThreatLabz has been tracking the development of Pikabot and its modus operandi. |
MALWARE | Loader |
|
17.2.24 | Ivanti Connect Secure: Journey to the core of the DSLog backdoor |
MALWARE | Backdoor |
|
17.2.24 | New macOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group |
MALWARE | macOS |
|
12.2.24 | The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was used to sell a remote access trojan (RAT) called Warzone RAT. |
MALWARE | RAT |
|
10.2.24 | New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group |
MALWARE | Backdoor |
|
10.2.24 | RASPBERRY ROBIN KEEPS RIDING THE WAVE OF ENDLESS 1-DAYS |
MALWARE | Worm |
|
9.2.24 | MoqHao evolution: New variants start automatically right after installation |
MALWARE | Android |
|
9.2.24 | Coyote: A multi-stage banking Trojan abusing the Squirrel installer |
MALWARE | Banking |
|
9.2.24 | New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization |
MALWARE | Backdoor |
|
8.2.24 | HijackLoader Expands Techniques to Improve Defense Evasion |
MALWARE | Loader |
|
8.2.24 | Kimsuky disguised as a Korean company signed with a valid certificate to distribute Troll Stealer |
MALWARE | Stealer |
|
7.2.24 | According to Mandiant, this malware family is attributed to potential chinese background and its Linux variant is related to exploitation of Fortinet's SSL-VPN (CVE-2022-42475). |
MALWARE | Backdoor |
|
7.2.24 | According to Mandiant, this malware family is attributed to potential chinese background and directly related to observed exploitation of Fortinet's SSL-VPN (CVE-2022-42475). |
MALWARE | ELF |
|
7.2.24 | Successful exploitation of the flaw paved the way for the deployment of a backdoor dubbed COATHANGER from an actor-controlled server that's designed to.. |
MALWARE | RAT |
|
6.2.24 | CrackedCantil: A Malware Symphony Breakdown |
MALWARE | Stealer |
|
6.2.24 | Facebook Advertising Spreads Novel Malware Variant |
MALWARE | Stealer |
|
6.2.24 | A Spyware Vendor Seemingly Made a Fake WhatsApp to Hack Targets |
MALWARE | Spyware |
|
6.2.24 | Skygofree: Following in the footsteps of HackingTeam |
MALWARE | Android |
|
5.2.24 | ESET researchers discovered several Android apps carrying VajraSpy, a RAT used by the Patchwork APT group |
MALWARE | RAT |
|
5.2.24 | New spyware attacks exposed: civil society targeted in Jordan |
MALWARE | Spyware |
|
5.2.24 | This report aims to detail the functioning of a malware used by FIN7 since 2021, named DiceLoader (also known Icebot), .... |
MALWARE | Loader |
|
5.2.24 | CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign |
MALWARE | Stealer |
|
5.2.24 | Unit 42 researchers recently discovered activity attributed to Mispadu Stealer, a stealthy infostealer first reported in 2019 |
MALWARE | Stealer |
|
3.2.24 | ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware |
MALWARE | Backdoor |
|
3.2.24 | Securonix Threat Research Security Advisory: Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor |
MALWARE | Backdoor |
|
2.2.24 | We discuss proof-of-concept rootkits and malware used by cybercriminals in conjunction with Berkeley Packet Filtering (BPF), .... |
MALWARE | Rootkit |
|
2.2.24 | HeadCrab 2.0: Evolving Threat in Redis Malware Landscape |
MALWARE | Backdoor |
|
1.2.24 | Evolution of UNC4990: Uncovering USB Malware's Hidden Depths |
MALWARE | Python |
|
1.2.24 | Mandiant has observed UNC4990 leverage EMPTYSPACE (also known as VETTA Loader and BrokerLoader),... |
MALWARE | Backdoor |
|
1.2.24 | KRUSTYLOADER - RUST MALWARE LINKED TO IVANTI CONNECTSECURE COMPROMISES |
MALWARE | Loader |
|
31.1.24 |
Grandoreiro is one of the many Latin American banking trojans such as Javali, Melcoz, Casabeniero, Mekotio, and Vadokrist, .... |
MALWARE | Banking |
|
31.1.24 |
From Screen Captures to Crypto wallets: Analyzing the Multi-Faceted Threat of Rage Stealer |
MALWARE | Stealer |
|
31.1.24 |
RUSSIAN STEALER LOG AGGREGATOR RELEASES FULLY NATIVE INFOSTEALER |
MALWARE | Stealer |
|
31.1.24 |
Zloader: No Longer Silent in the Night |
MALWARE | Trojan |
|
29.1.24 |
LODEINFO is a fileless malware that has been observed in campaigns that start with spear-phishing emails since December 2019. |
MALWARE | Backdoor |
|
29.1.24 |
Inside the SYSTEMBC Command-and-Control Server |
MALWARE | Trojan |
|
29.1.24 |
AllaKore is a simple Remote Access Tool written in Delphi, first observed in 2015 but still in early stages of development. |
MALWARE | RAT |
|
29.1.24 |
CherryLoader: A New Go-based Loader Discovered in Recent Intrusions |
MALWARE | GO base |
|
29.1.24 |
It is a backdoor commonly distributed as an encoded binary file downloaded and decrypted by shellcode following the exploitation of weaponized documents. |
MALWARE | RAT |
|
29.1.24 |
Glupteba is a trojan horse malware that is one of the top ten malware variants of 2021. |
MALWARE | Cryptomining |
|
29.1.24 |
Info Stealing Packages Hidden in PyPI |
MALWARE | Python |
|
20.1.24 |
Screentime: Sometimes It Feels Like Somebody's Watching Me |
MALWARE | VBS |
|
19.1.24 |
Jamf Threat Labs discovers new malware embedded in pirated applications |
MALWARE | OSX |
|
18.1.24 |
CISA and FBI Release Known IOCs Associated with Androxgh0st Malware |
MALWARE | Android |
|
17.1.24 |
Remcos RAT Being Distributed via Webhards |
MALWARE | RAT |
|
16.1.24 |
CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign |
MALWARE | Stealer |
|
12.1.24 |
Exploring FBot | Python-Based Malware Targeting Cloud and Payment Services |
MALWARE | Linux |
|
11.1.24 |
Mac users targeted in new malvertising campaign delivering Atomic Stealer |
MALWARE | osx |
|
11.1.24 |
You Had Me at Hi — Mirai-Based NoaBot Makes an Appearance |
MALWARE | Bot |
|
10.1.24 |
Introducing Pikabot, an emerging malware family that comprises a downloader/installer, a loader, and a core backdoor component. |
MALWARE | Loader |
|
9.1.24 |
Deceptive Cracked Software Spreads Lumma Variant on YouTube |
MALWARE | Stealer |
|
9.1.24 |
A GAMER TURNED MALWARE DEVELOPER : DIVING INTO SILVERRAT AND IT’S SYRIAN ROOTS |
MALWARE | RAT |
|
6.1.24 |
Today will be a quick post on a TA444 (aka Sapphire Sleet, BLUENOROFF, STARDUST CHOLLIMA) ... |
MALWARE | macOS |
|
6.1.24 |
Wiper attack on Albania by Iranian APT |
MALWARE | Wipper |
|
5.1.24 |
Bandook - A Persistent Threat That Keeps Evolving |
MALWARE | RAT |
|
5.1.24 |
Ukraine Targeted by UAC-0050 Using Remcos RAT Pipe Method for Evasion |
MALWARE | RAT |
|
3.1.24 |
WhiteSnake Stealer malware sample on MalwareBazaar |
MALWARE | Stealer |
|
3.1.24 |
RisePro is a stealer that is spread through downloaders like win.privateloader. Once executed on a system, the malware can steal credit card information,... |
MALWARE | Stealer |
|
1.1.24 |
On Christmas Eve, Resecurity's HUNTER (HUMINT) spotted the author of perspective password stealer Meduza has released a new version (2.2). |
MALWARE | Stealer |
|
1.1.24 |
Jinx – Malware 2.0 We know it’s big, we measured it! |
MALWARE | Stealer |
|