trojan

  1. Teacher

    Bifrost: An old Trojan uses new Tricks to Steal Your Identity

    One of the oldest RAT threats has become suspiciously active recently. There is a new Linux version of the remote access Trojan Bifrost, which uses a number of new masking methods. One of the main tools is a fake domain, similar to a legitimate VMware one. Bifrost, first discovered 20 years...
  2. Teacher

    Proton: a Trojan horse with 36% alien mass

    The study is an important step forward in our understanding of the fundamental laws of nature. A new study conducted by Professor Chen Xurong of the Institute of Modern Physics of the Chinese Academy of Sciences reveals the secrets of the origin of the proton mass. The results, published in the...
  3. Teacher

    GoldPickaxe Trojan Steals iPhone Owners Faces to Access Bank Accounts

    Biometrics has become a truly valuable resource for cybercriminals. Cybercriminals have begun attacking iPhone owners with malware that steals 3D scans of individuals for unauthorized access to bank accounts. This became known from a study of the company Group-IB, which deals with...
  4. Teacher

    CVE-2024-21412: Exchange Wolves trapped by the DarkMe Trojan

    How to master stock trading without losing your last savings? As part of the regular security update Patch Tuesday, which we already wrote about earlier , Microsoft fixed a vulnerability in SmartScreen, which is actively used by hackers to distribute the DarkMe remote access Trojan. In this...
  5. Teacher

    Stealth and Resilience: The New Coyote as a Banking Trojan Revolution

    Using the Nim language and open tools shows how hackers follow trends. Kaspersky Lab specialists have discovered the Coyote Banking Trojan, which targets users of more than 60 banking institutions, mainly from Brazil. A distinctive feature of this malware is a complex infection chain that uses...
  6. Teacher

    Raspberry Robin Trojan exploits 0day threats even before their public disclosure

    It seems that the malware authors have secret access to insider information... Cybersecurity experts from Check Point have discovered another modification of the Raspberry Robin malware, first identified back in 2021. This Trojan is characterized by a high degree of adaptability and...
  7. Teacher

    Banking Trojan Mispadu takes advantage of a hole in Windows SmartScreen

    The banking Trojan Mispadu has become the latest cyber threat that exploits a vulnerability in Windows SmartScreen. Mispadu is written in Delphi and is designed to steal the victim's confidential information. The Unit 42 team (owned by Palo Alto Networks) first detected Mispadu in 2019, and...
  8. Brother

    Trojan approach for controlling light rays through Lagrange points

    How scientists made the world play by its own rules. A recently published study in the journal Nature Physics presents a groundbreaking method for controlling and capturing light waves based on the exotic properties of Lagrange points. Scientists from the University of Southern California have...
  9. Brother

    Grandoreiro Trojan destroyed: ESET reveals details of Brazilian agents operation

    Thanks to the company's efforts, the banking Trojan stopped terrorizing Latin American banks. During a joint operation between ESET and the Brazilian Federal Police, actions were taken to stop the activities of the Grandoreiro botnet, as a result of which victims suffered $3.9 million...
  10. Brother

    Cybertend over China: FakeApp as a new vector of remote access Trojan distribution

    When will IT giants finally fix a fundamental flaw in their advertising services? Recently, security experts from Malwarebytes identified a malicious campaign aimed at Chinese-speaking users who became victims of intruders thanks to the Google Ads advertising service. Cybercriminals used...
  11. Brother

    Russian retailers, bankers, and IT specialists are attacked by the RADX Trojan

    Researchers F.A.C.C.T. report the addition to the “warriors” regiment with a new remote access Trojan, RADX, which was used in recent attacks on Russian marketplaces, retail chains, banks and IT companies. A little earlier, the group behind the attacks used another Trojan - DarkCrystal RAT...
  12. Brother

    Teenagers are spreading a new Silver RAT Trojan that can bypass any protection

    The authors are ready to share advanced software to take control of the device. The hacker group Anonymous Arab has released a Remote Access Trojan (RAT) called Silver RAT, which is able to bypass security and run hidden applications unnoticed. This was reported by the information security...
  13. Brother

    MacOS users, be on your guard: Unknown Trojan spreads via PDF files

    The BlueNoroff group has come up with a way to infect financial organizations and investors. Kaspersky Lab has discovered a new version of the malicious boot loader for macOS, presumably associated with the BlueNoroff APT group and its RustBucket campaign. The group is aimed at financial...
  14. Brother

    International distrust grows: SugarGh0st Trojan attacks the Uzbek Foreign Ministry

    Written in C++, the Chinese malware has an extensive range of spy features. According to a new report by Cisco Talos, a group of Chinese-speaking hackers has carried out a malicious campaign targeting the Ministry of Foreign Affairs of Uzbekistan, as well as private organizations in South...
  15. Brother

    Word - a new channel for the Konni Trojan: an ordinary document turns into a means of espionage

    Hackers have found a way to invade and control victims computers without being noticed. FortiGuard Labs has discovered that the Konni APT group linked to North Korea is using an infected Word document as part of an ongoing phishing campaign. Konni was first detected by Cisco Talos in 2017, but...
  16. Brother

    Trojan horse in Chrome: Latin American bank data in the hands of ParaSiteSnatcher extension

    Why would a harmless extension need the financial data of Brazil's largest banks? Trend Micro has discovered a malicious extension for Google Chrome called ParaSiteSnatcher that targets users in Latin America, particularly Brazil. The extension allows attackers to track, manipulate, and steal...
  17. Lord777

    Trojan operators are once again using XLL, breaking accounts to bypass protection

    In recent months, the HP Wolf Security team has recorded an increase in the activity of Trojans distributed in XLL files. To bypass the blocking of such downloads introduced by Microsoft, attackers send their emails from compromised accounts. In the third quarter of 2023, 80% of malware...
  18. Lord777

    Trojan operators are once again using XLL, breaking accounts to bypass protection

    In recent months, the HP Wolf Security team has recorded an increase in the activity of Trojans distributed in XLL files. To bypass the blocking of such downloads introduced by Microsoft, attackers send their emails from compromised accounts. In the third quarter of 2023, 80% of malware...
  19. Carding 4 Carders

    The Amadey Trojan as an Undercover Agent PDF

    A harmless PDF can take control of your data. Cybersecurity experts from the 360 Threat Intelligence Center team have discovered a new campaign by the APT-C-36 group, known for its targeted phishing attacks. This time, cybercriminals decided to step up their attacks by introducing the Amadey...
  20. Carding 4 Carders

    Hackers use Windows System Calculator to infect Quasar RAT Trojan

    DLL Sideloading once again demonstrates its superiority over security tools. The open-source remote access Trojan Quasar RAT uses the DLL Sideloading technique to discreetly extract data from infected Windows-based devices. According to Uptycs researchers, this method uses the system trust...
Top