trojan

  1. Father

    Вредоносное ПО ZLoader развивается с помощью антианалитического трюка от Zeus Banking Trojan

    Авторы обновленного вредоносного ПО ZLoader добавили функцию, которая изначально присутствовала в Zeus banking trojan, на которой оно основано, что указывает на его активную разработку. "В последней версии 2.4.1.0 добавлена функция предотвращения выполнения на машинах, отличных от исходного...
  2. Father

    Banking Android Trojan Godfather is not interested in Russian users

    Godfather is back. The Android Trojan attacks clients of banks, cryptocurrency exchanges, and e-wallets. It is distributed through the official Google Play Store under the guise of legal crypto applications. Interestingly, the Trojan bypasses users from Russia and the CIS. The geography of...
  3. Father

    Kaolin RAT: North Korean hackers hide their new Trojan in job openings

    The "Dream Job" operation does not slow down, using a long chain to hide the infection. Lazarus Group, a prominent hacker group traditionally associated with North Korea, used tempting job offers to deliver a new remote access trojan (RAT) called Kaolin RAT as part of attacks targeting specific...
  4. Father

    New Trojan Brokewell turns Android smartphone into surveillance tool

    How Google Chrome updates help you remotely control a victim's phone. ThreatFabric identified it A new malicious application called Brokewell that can record every action on your device, from tapping to typing and launching apps. The Trojan is distributed via a fake update Google Chrome in the...
  5. Father

    SoumniBot: Banking Trojan that turned Android features against its users

    Clever disguise allows the malware to permanently register on infected devices. A new type of banking malware for Android, dubbed "SoumniBot", uses an unusual method of obfuscation, exploiting vulnerabilities in the process of extracting and analyzing the Android manifest. This allows them to...
  6. Teacher

    AZORult Trojan turns Google Docs into a hotbed of viruses

    AZORult adapts to modern defenses with a clever campaign. Netskope Threat Labs has revealed a new campaign that uses Google Sites phishing pages to distribute the AZORult infostiler. The phishing campaign is not yet associated with any specific attacker or group, but is aimed at collecting...
  7. Teacher

    Fake domains as a weapon: the survivable BIFROSE Trojan made its way into Linux systems

    Researchers talk about new features of the old cyber threat. Researchers from Palo Alto Networks have discovered a new variant of the well - known remote access Trojan-BIFROSE (also known as Bifrost). The updated version is adapted for attacks on Linux systems. Its distinctive feature is the...
  8. Teacher

    Bifrost: An old Trojan uses new Tricks to Steal Your Identity

    One of the oldest RAT threats has become suspiciously active recently. There is a new Linux version of the remote access Trojan Bifrost, which uses a number of new masking methods. One of the main tools is a fake domain, similar to a legitimate VMware one. Bifrost, first discovered 20 years...
  9. Teacher

    Proton: a Trojan horse with 36% alien mass

    The study is an important step forward in our understanding of the fundamental laws of nature. A new study conducted by Professor Chen Xurong of the Institute of Modern Physics of the Chinese Academy of Sciences reveals the secrets of the origin of the proton mass. The results, published in the...
  10. Teacher

    GoldPickaxe Trojan Steals iPhone Owners Faces to Access Bank Accounts

    Biometrics has become a truly valuable resource for cybercriminals. Cybercriminals have begun attacking iPhone owners with malware that steals 3D scans of individuals for unauthorized access to bank accounts. This became known from a study of the company Group-IB, which deals with...
  11. Teacher

    CVE-2024-21412: Exchange Wolves trapped by the DarkMe Trojan

    How to master stock trading without losing your last savings? As part of the regular security update Patch Tuesday, which we already wrote about earlier , Microsoft fixed a vulnerability in SmartScreen, which is actively used by hackers to distribute the DarkMe remote access Trojan. In this...
  12. Teacher

    Stealth and Resilience: The New Coyote as a Banking Trojan Revolution

    Using the Nim language and open tools shows how hackers follow trends. Kaspersky Lab specialists have discovered the Coyote Banking Trojan, which targets users of more than 60 banking institutions, mainly from Brazil. A distinctive feature of this malware is a complex infection chain that uses...
  13. Teacher

    Raspberry Robin Trojan exploits 0day threats even before their public disclosure

    It seems that the malware authors have secret access to insider information... Cybersecurity experts from Check Point have discovered another modification of the Raspberry Robin malware, first identified back in 2021. This Trojan is characterized by a high degree of adaptability and...
  14. Teacher

    Banking Trojan Mispadu takes advantage of a hole in Windows SmartScreen

    The banking Trojan Mispadu has become the latest cyber threat that exploits a vulnerability in Windows SmartScreen. Mispadu is written in Delphi and is designed to steal the victim's confidential information. The Unit 42 team (owned by Palo Alto Networks) first detected Mispadu in 2019, and...
  15. Brother

    Trojan approach for controlling light rays through Lagrange points

    How scientists made the world play by its own rules. A recently published study in the journal Nature Physics presents a groundbreaking method for controlling and capturing light waves based on the exotic properties of Lagrange points. Scientists from the University of Southern California have...
  16. Brother

    Grandoreiro Trojan destroyed: ESET reveals details of Brazilian agents operation

    Thanks to the company's efforts, the banking Trojan stopped terrorizing Latin American banks. During a joint operation between ESET and the Brazilian Federal Police, actions were taken to stop the activities of the Grandoreiro botnet, as a result of which victims suffered $3.9 million...
  17. Brother

    Cybertend over China: FakeApp as a new vector of remote access Trojan distribution

    When will IT giants finally fix a fundamental flaw in their advertising services? Recently, security experts from Malwarebytes identified a malicious campaign aimed at Chinese-speaking users who became victims of intruders thanks to the Google Ads advertising service. Cybercriminals used...
  18. Brother

    Russian retailers, bankers, and IT specialists are attacked by the RADX Trojan

    Researchers F.A.C.C.T. report the addition to the “warriors” regiment with a new remote access Trojan, RADX, which was used in recent attacks on Russian marketplaces, retail chains, banks and IT companies. A little earlier, the group behind the attacks used another Trojan - DarkCrystal RAT...
  19. Brother

    Teenagers are spreading a new Silver RAT Trojan that can bypass any protection

    The authors are ready to share advanced software to take control of the device. The hacker group Anonymous Arab has released a Remote Access Trojan (RAT) called Silver RAT, which is able to bypass security and run hidden applications unnoticed. This was reported by the information security...
  20. Brother

    MacOS users, be on your guard: Unknown Trojan spreads via PDF files

    The BlueNoroff group has come up with a way to infect financial organizations and investors. Kaspersky Lab has discovered a new version of the malicious boot loader for macOS, presumably associated with the BlueNoroff APT group and its RustBucket campaign. The group is aimed at financial...
Top