NEW CARDING CHAT IN TELEGRAM

trojans

  1. Friend

    Latin America under siege: Mekotio and BBTok take over devices in the region

    Even experienced specialists do not always recognize new banking Trojans. In Latin America, there has been a sharp increase in phishing attacks associated with the distribution of the dangerous banking Trojans Mekotio and BBTok. These malware threats aim to steal banking data and conduct...
  2. Carding Forum

    BadPack's set of APK files makes it difficult to detect Trojans for Android

    A set of malicious APK files, named "BadPack", makes it difficult to detect malware in applications for the Android mobile operating system. Researchers blame BadPack for recent successful attacks by banking Trojan operators like TeaBot. A special feature of BadPack is the modified header of...
  3. Carding Forum

    BadPack APKs Make Android Trojans Hard to Detect

    A set of malicious APK files dubbed "BadPack" is making it difficult to detect malware in apps for the Android mobile operating system . Researchers blame BadPack for the recent successful attacks by operators of banking Trojans like TeaBot. BadPack's peculiarity is that it modifies the header...
  4. Tomcat

    Trojans and backdoors in push-button mobile phones

    TL;DR: a considerable number of simple push-button phones present in Russian stores contain unwanted undocumented functions. They can automatically send SMS messages or go online to transmit the fact of purchase and use of the phone (transmitting the IMEI of the phone and IMSI of SIM cards)...
  5. Tomcat

    Trojans in ATMs. Official comments from Kaspersky Lab.

    The news about the appearance of viruses in ATMs caused a lot of noise today. Habré has already posted links to relevant publications on the sites Lenta.ru and CNews, but we have not received any official comments from companies involved in information security. And I literally just received...
  6. Father

    Trojans stole 2.5 million passwords to log in to Russian web resources in 2023

    Over the past five years, using stylers, that is, programs for stealing information, attackers have obtained logins and passwords to log in to 443 thousand sites around the world. These are the results of a study by the Kaspersky Digital Footprint Intelligence team. They were obtained as a...
  7. Teacher

    DarkGate and PikaBot Trojans picked up the baton of the QakBot that left the race

    The DarkGate and PikaBot malware programs are distributed by cybercriminals using the same methods as the attacks using the QakBot Trojan, which was eliminated in August. This was announced by Cofense in its report. The QakBot platform (QBot, Pinkslipbot), was eliminated during a joint law...
  8. Teacher

    RePack by Apple: 93% of iOS apps may contain Trojans

    The weakening of Apple's monopoly also reduces user security. In accordance with new EU laws, Apple introduces the ability to install applications from third-party sources, which caused concern among experts after the publication of a report on the security of iOS applications. In its report...
  9. Teacher

    PNG Images - a new way to deliver Trojans to organizations computers

    Remcos found a distribution method through the hidden IDAT Loader. According to a Morphisec report, Ukrainian organizations based in Finland were targeted in a malicious campaign to spread the Remcos RAT . The attack was attributed to the UAC-0184 group. The Remote Access Trojan (Remcos RAT)...
  10. Lord777

    RAT epidemic: researchers note a rapid increase in the activity of remote access Trojans

    Opened an invoice — say goodbye to the data. Why should you be more careful with office documents? A recent report on cybersecurity for the third quarter of 2023, published by HP Wolf Security, shows a significant increase in the number of campaigns using remote access Trojans (RAT). Experts...
  11. Carding

    Rat Race: Unknown hackers infect companies with Trojans in China

    Massive cyber attacks have put Chinese businesses in the hands of hackers. Cybersecurity company Proofpoint reports that Chinese companies on the mainland have been targeted by cybercriminals, many of whom use new types of malware. Analysts said that in 2023, about 30 such campaigns were...
  12. Carding

    Hackers exploit the search function in Windows Explorer to install remote access Trojans

    A JavaScript script from the browser lures users into a clever trap. Cybersecurity experts have discovered that attackers use a legitimate search function in Windows to secretly download malware to their victims ' computers. In this way, hackers can gain full access to the system and steal...
  13. Tomcat

    Germany may allow intelligence agencies to spy on users with Trojans

    Next week, Germany will consider a bill that gives all 19 federal state intelligence agencies the right to spy on users with Trojans when looking for criminals. ISPs will be required to install government malware-distributing equipment in their data centers. The FinFly ISP of FinFisher will...
  14. Hacker

    Trojans for sale. Exploring the underground malware market.

    The content of the article N0F1L3 Kratos AZORult Eredel Kpot Arkei Pony Predator The Thief Instead of an afterword Among the commercial three, a separate niche is occupied by stealers and a similar spiver. It is not surprising: other people's secrets have always been valuable. Today we will...
  15. Lord777

    How do hackers create Trojans for Android?

    Content 1 How to write a Trojan on Android 1.1 Frame 1.2 Location information 1.3 List of installed applications 1.4 Dump SMS 1.5 Hidden audio recording 1.6 Covert shooting 1.7 Putting It All Together 1.8 Scheduled Tasks 1.9 Screen shot 1.10 Start at boot 1.11 Record audio on command 1.12...
  16. Lord777

    Tracking Trojans for Windows, macOS, Linux, Android, iOS

    Tracking trojans with a built-in keylogger and critical data stealing functions are one of the oldest types of malware. For a quarter of a century, spy software has only evolved, receiving more and more anti-detection functions. At the same time, mobile devices were mastered, and varieties of...
  17. Lord777

    Selling and buying Trojans in the underground market

    Content 1. Selling and buying Trojans 1.1 N0F1L3 1.2 Kratos 1.3 AZORult 1.4 Eredel 1.5 Kpot 1.6 Arkei 1.7 Pony 1.8 Predator The Thief 2. Total Among commercial Trojans, a separate niche is occupied by stealers and similar spyware. It is not surprising: other people's secrets have always been...
  18. Carding 4 Carders

    Banking Trojans and protection against them

    The content of the article Banking Trojans before Banking Trojans today Bankbots are a type of banking Trojan Distribution of banking Trojans Protection against banking Trojan One beautiful sunny May morning, my breakfast was interrupted by a phone call from a friend, an entrepreneur involved...
  19. Carding

    Trojans

    A Trojan program (Trojan) is a malicious agent, the main difference of which from a classic virus is its propagation method: it usually penetrates the system under the guise of a regular, legitimate program, which is the reason for the tradition of calling it a "Trojan horse". After penetration...
Top