malware

  1. Man

    Viruses with eggs: What surprises do malware hide?

    Programmers also get bored sometimes. If you work for a serious software company, you can have a little fun by hiding an Easter egg somewhere in the depths of the program you are developing, and in such a way that it will not be accidentally discovered during a code review. Apparently, this is...
  2. Man

    Behavioral Analysis in Malware Detection Task

    Malware has long been one of the main threats in the field of information security. Approaches to analysis and protection against such attacks are different. In general, two approaches are distinguished: static and dynamic analysis. The task of static analysis is to search for malicious...
  3. I

    JSHOP.CC, THE NEW GENESIS.MARKET MARKETPLACE 2024, NON VBV CC, CVV, DUMPS WITH PIN, ACCOUNTS SHOP, SPAMMING, RANSOMWARE, BOTNET, RAT, LOGS, MALWARE

    Jshop.cc, CC, CVV, Ransomware As a Service, loading bank accounts and credit cards, browser thief, RAT, Payload, Botnet, Keylogger, The New Genesis.Market Marketplace 2024, non-VBV CC stores, list of Cardable Gateway 2D sites, virus, malware, Trojans. OTP/2FA bypass tool, Office 365 corporate...
  4. Man

    FIN7 Gang Hides Malware in AI “Deepnude” Sites

    FIN7, a notorious and financially motivated hacking group, is employing new tactics to lure unsuspecting internet users with malware-laden websites that masquerade as deepfake "Deepnude" tools. A recent report from Silent Push reveals that this Russia-based group operates these malicious sites...
  5. Friend

    Manipulating notifications via GitHub to distribute malware

    Malware distributors have begun to use a new way to send malicious emails on behalf of the security team on GitHub. The mailing is aimed at encouraging maintainers and developers using the Windows platform to take actions that lead to the installation of malware on their systems. The method is...
  6. Friend

    Researchers have discovered a multifunctional malware for Linux

    Cybersecurity researchers at Aqua have uncovered a new malware campaign dubbed Hadooken. The malware is distributed through Oracle Weblogic servers and is engaged in cryptocurrency mining, as well as the delivery of malware for a DDoS botnet. The attack chain exploits both known vulnerabilities...
  7. Friend

    BabyShark: the evolution of the Kimsuky malware campaign resembles a Hollywood thriller

    How VbsEdit helps hackers bypass traditional means of detecting malicious code. The North Korean hacking group Kimsuky continues to develop its activity, using increasingly sophisticated methods to bypass security systems. Since 2018, the group's malware campaign, codenamed BabyShark, has been...
  8. Friend

    Hackers use other people's malware and violate the bans of its authors

    Bi.Zone analysts noted that since the beginning of 2024, commercial malware, whose developers prohibit its use against organizations in the CIS countries, has been increasingly used to attack Russian companies. However, attackers disable regional restrictions and "pirated" versions of malware...
  9. Friend

    Check if your iPhone is infected with malware

    Can iPhone get viruses? In this article I will tell you how to scan your iPhone for malware and how to remove a virus from it if it is detected. The iPhone is well known for its security measures: the malware protection offered by Apple is one of the main reasons why people buy these devices...
  10. Friend

    New Android Malware NGate Uses NFC Chip to Steal Money

    ESET researchers have discovered a new malware for Android that can steal money by transferring data read via NFC to an attacker's device. The malware, dubbed NGate, allows you to emulate victims' cards, make unauthorized payments, or withdraw cash from ATMs. According to experts, NGate has...
  11. Friend

    AMOS Stealer: the updated version of the malware is aimed at your cryptocurrency

    Researchers link the attacks to a mysterious group called Crazy Evil. Security researchers at Moonlock have discovered a new wave of activity in the AMOS malware, also known as Atomic Stealer. Attackers allegedly linked to the hacker group Crazy Evil spread malware through fake advertising...
  12. Carding Forum

    Android malware erases all data on the device after money is stolen

    A new malicious program for Android not only tries to empty users ' bank accounts, but also completely erases data on the device, effectively implementing the destructive functionality of Viper. The malware was named BingoMod. Vector of malware spread — text messages. Attackers are trying to...
  13. Carding Forum

    0-day in the Android version of Telegram allowed you to send malware as a video

    In the Android version of the Telegram messenger, a vulnerability has been identified that allows you to send malicious APK payloads, disguising them as video content. The breach was named "EvilVideo". On June 6, 2024, a cybercriminal named Ancryno posted an announcement on the XSS hacker forum...
  14. Carding Forum

    Digital weed: the Mandrake malware hit 5 apps in the Google Play Store at once

    How did the spy operation manage to go unnoticed since the beginning of 2022? Yesterday, July 29, researchers from Kaspersky Lab reported on a new version of the Mandrake spyware, which, using improved methods of hiding and bypassing security systems, penetrated Google Play through five...
  15. Carding Forum

    Praise for barcodes: How a $36 Scanner Saved hundreds of Grant Thornton computers Подробнее:

    The company revealed an unusual way to recover from a CrowdStrike crash. After the recent global crash caused by a failed CrowdStrike software update, Grant Thornton's computers and servers in Australia did not escape the fate of the rest of the world's Windows devices and began to massively...
  16. Cloned Boy

    Common Types of Malware

    Drain Malicious smart contract. The main task is to pump out all the cryptocurrency on the user's wallet. When connected, it issues a request for trust management of assets and if you sign it, then all the cryptocurrency will go to the attacker. The most expensive option is equal to Stealer-IOS...
  17. Carding Forum

    Malware-spy managed via Telegram

    The TgRAT malware is written for a specific computer, and closed chats in Telegram become control channels. The malware was discovered by Positive Technologies experts. The virus can download files, take screenshots of the screen, and” put " the device to sleep. Many companies use Telegram as a...
  18. chushpan

    Malware. Sniffer. Stealer. Viruses.

    Hello Anonymous. Where do cards with balances come from and why doesn’t it work out for you? The first answer is outrageously simple: they steal or buy. More often than not, it’s the latter, because stealing data is a tricky task and not everyone is capable of it. What is a stealer? What is a...
  19. Tomcat

    In the VSCode addon store, we found thousands of malware with millions of installations

    A story about how over 100 organizations fell victim to forced pentests. Israeli researchers have identified serious vulnerabilities in the Visual Studio Code extension market, successfully infecting more than 100 organizations by injecting malicious code into a clone extension of the popular...
  20. Tomcat

    EGAN: AI creates malware that tricks AI antivirus programs

    How an AI ransomware can become a weapon of cybercriminals. A group of scientists from the United States and Africa has developed an advanced method for creating a ransomware program that can bypass modern AI-based antivirus systems. Ransomware poses a serious threat by blocking access to the...
Top