Malware -

H  Activity  Alert  APT  Attacks/Hacks  BigBrother  BotNet  CERT  Crime  Cryptocurrency  Exploit  GHDB  ICS  Incident  Malware  MITRE  Phishing  Ransom  Spam  Vulnerebility  List 

H  2020  2019  Viry znalosti  Programy  Virus Calendar  Malware Traffic  Ransom  Database  Znalosti  Programy  Calendar  Banking  Mobil  RAT  Evolution 

2021

Datum

Název

Info 

12.3.21

REDXOR

Based on Tactics, Techniques, and Procedures (TTPs) the backdoor is believed to be developed by Chinese nation-state actors.The backdoor masquerades itself as polkit daemon.
We named it RedXOR for its network data encoding scheme based on XOR. The malware was compiled on Red Hat Enterprise Linux.We provide recommendations for detecting and responding to this threat below

12.3.21

Trojan.Win64.HAFNIUM.AThis Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

25.2.21

Trojan.MacOS.SLISP.AThis Trojan may be unknowingly downloaded by a user while visiting malicious websites.

25.2.21

Ransom.MSIL.POVLSOM.THBAOBAThis Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

12.2.21

Ransom.MSIL.TESLACRYPT.THABGBAThis Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It creates certain registry entries to disable applications related to security.

6.2.21

PUA.Win64.ProcHack.AC

This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Ransom.Win32.BABUK.YEBA-THAAEBA

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.Win64.COMBACKER.YABA-A

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Ransom.Win32.MAOLOA.THAAHBA

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.

6.2.21

Ransom.MSIL.COBRALOCKER.AA

This Ransomware may be dropped by other malware.

6.2.21

Trojan.INF.HIDDENTEAR.THAOGBA

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It automatically executes files when a user opens a drive.

6.2.21

Ransom.Win32.BABUK.THAODBA

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Win32/Filecoder.ODM

Win32/Filecoder.ODM is a trojan that encrypts files on fixed, removable and network drives. To decrypt files the user is requested to comply with given conditions in exchange for a password/instructions.

6.2.21

Trojan.Win32.MOOZ.THCCABO

This AutoIt-compiled malware downloads a coinminer in affected systems. This malware is distributed by cybercriminals by bundling it with a legitimate installer of the Zoom communication app.

6.2.21

Trojan.Win32.ZAPIZ.A

A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users.

6.2.21

Backdoor.Win32.DEVILSHADOW.THEAABO

Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer. This is probably hosted on malicious or suspicious sites.

6.2.21

Trojan.JS.MANAGEX.A

This MANAGEX variant is a modular adware that is able to gather important information as a browser extension.

6.2.21

IoT.Linux.MIRAI.VWISI

This new Mirai variant exploits CVE-2020-10173, a vulnerability in Comtrend VR-3033 routers. Similar to earlier variants, this Mirai variant uses telnet and SSH brute-forcing techniques to attack vulnerable devices.

6.2.21

Trojan.SH.MIRAI.BOI

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.Linux.MALXMR.USNELH820

A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users.

6.2.21

Trojan.Python.MALXMR.D

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Coinminer.Linux.MALXMR.UWELD

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Backdoor.Linux.KAITEN.AMV

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.Python.MALXMR.D

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Backdoor.Linux.KAITEN.AMV

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.Linux.MALXMR.USNELH820

A Trojan horse program is a malware that is not capable of automatically spreading to other systems. Trojans are usually downloaded from the Internet and installed by unsuspecting users.

6.2.21

Coinminer.Linux.KORKERDS.AB

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Rootkit.Linux.KORKERDS.AA

This Rootkit arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.Linux.DLOADER.THAOOAAK

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.SH.HADGLIDER.C

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.SH.HADGLIDER.D

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.SH.HADGLIDER.A

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Coinminer.SH.HADGLIDER.A

This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.SH.HADGLIDER.TSD

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.SH.HADGLIDER.F

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

6.2.21

Trojan.SH.HADGLIDER.J

This Trojan may be dropped by other malware.

6.2.21

TrojanSpy.SH.HADGLIDER.A

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from remote sites.