31 Oct 2022

Cranefly Cyberspy Group Spawns Unique ISS Technique

Security researchers have found that the hacking group Cranefly is deploying new techniques that leverage Internet Information Services (IIS) commands to deliver backdoors to targets. The technique has been used in intelligence gathering campaigns perpetrated by the hacking group. Security researchers at Symantec detailed the tactic, which uses a previously

Read More
09 Jun 2022

Black Basta Ransomware Teams Up with Malware Stalwart Qbot

Cybercriminal group Black Basta has reportedly teamed up with the evolving information stealing trojan known as Qbot. The cyber threat group utilized the trojan to move laterally on a network in a recent attack, according to researchers. Qbot has been around for 14 years, but has undergone many significant developments

Read More
10 May 2022

Kaspersky uncovers fileless malware inside Windows event logs

Kaspersky has made an unprecedented discovery that could have serious consequences for Windows operating systems and its users. Kaspersky released information about its findings on May 4, detailing how hackers were able to place shellcode into Windows event logs for the first time ever. This means that threat actors were

Read More
06 Apr 2022

No-Joke Borat RAT Propagates Ransomware, DDoS

Security researchers at Cyble Research Labs have discovered a new malware strain that extends the abilities of typical trojans, providing for a series of modules for launching various types of malicious activity. Cyble reports that the trojan, boasting advanced functionality, is bring used by attackers to spread ransomware and conduct

Read More
22 Feb 2022

Almost 100,000 new mobile banking Trojan strains detected in 2021

Researchers have detected almost 100,000 new variants of mobile banking Trojans over the past year, as many malware developers have shifted their focus to the creation of mobile threats. Many of the infection routes of these trojans are still workable, such as phishing and the download execution of suspicious software,

Read More
08 Feb 2022

Medusa Malware Joins Flubot’s Android Distribution Network

Flubot, the Android spyware that has been spreading since last year, has joined another mobile threat known to researchers as Medusa. The two powerful trojans boast spyware and RAT capabilities, and are now being used in side-by-side campaigns using a common infrastructure. ThreatFabric was the first to discover that Medusa

Read More
18 Oct 2021

TrickBot Gang Enters Cybercrime Elite with Fresh Affiliates

The TrickBot ransomware group, which also created BazarLoader and the Conti ransomware, has just upped its distribution tactics to become more of a threat. The cybercriminals behind the TrickBot Trojan have signed two additional distribution affiliates, named Hive0106 and Hive 0107 by IBM X-Force. The result of this move is

Read More
29 Sep 2021

This dangerous mobile Trojan has stolen a fortune from over 10 million victims

Zimperium zLabs has reported that a new malware Trojan targeting Android devices has achieved a victim count of over ten million across at least 70 different countries. The malware has been embedded in at least 200 malicious applications, many of which were able to circumvent protections offered by the Google

Read More
13 Sep 2021

SOVA, Worryingly Sophisticated Android Trojan, Takes Flight

A new Android banking trojan referred to as SOVA is currently under active development, according to researchers. The malware is reportedly looking to incorporate several tools into its arsenal, including ransomware functionality, distributed denial of service, and man in the middle. The banking trojan already boasts functions such as banking

Read More
07 Jul 2021

SideCopy cybercriminals use new custom Trojans in attacks against India’s military

Researchers at Cisco Talos recently published a report detailing the activity of the advanced persistent threat group known as SideCopy, which has recently been targeting India with new Trojans. The threat group has been active since 2019 and focuses on valuable assets when choosing its targets. SideCopy has previously targeted

Read More