Browsing tag

Trojan

Advanced Android Malware Steal Users Facebook, Twitter, Telegram,Skype Messenger Data

A Newly discovered  Android Trojan with Hidden Malicious code compromise Android Phone and steal sensitive information from victims well-known chat Messengers. Andriod Malware is kept increasing and targeting victims around the world using many advanced functionalities. This Trojan distributing as com.android.boxa and the method of distribution via a malicious app called Cloud Module in China. This Malware is designed to […]

CryptoJacking Android Malware “Loapi” Can Physically Damage Your Device

If you want to get malware on your Android device, it’s pretty easy. Forget about unofficial sources, malicious apps can be found on the “safe” Google Play where they can even live unnoticed for years. Adding to the pack of Android malware, Kaspersky Lab has spotted a new Android malware sample called “Trojan.AndroidOS.Loapi”. The researchers […]

Still Stealing

Two years ago in October 2015 we published a blogpost about a popular malware that was being distributed from the Google Play Store. Over the next two years we detected several similar apps on Google Play, but in October and November 2017 we found 85 new malicious apps on Google Play that are stealing credentials for VK.com. […]

Iran-linked OilRig hacked group use a new Trojan in Middle East Attacks

The Iran-Linked cyberespionage group OilRig has been using a new Trojan in attacks aimed at targets in the Middle East. Experts from Palo Alto Networks spotted a new campaign launched by the notorious APT group OilRig against an organization within the government of the United Arab Emirates (UAE). The OilRig hacker group is an Iran-linked APT that has been around since at least 2015. […]

Adware Installs InfoStealer Trojan that it loads via Chrome DLL Hijacking

A password stealing Trojan called AdService is being quietly distributed by adware bundles that typically install other programs such as Russian adware, extensions, clickers, adware, and fake system optimization programs. AdService uses Chrome DLL hijacking to load itself when Chrome is executed so that it can steal information from Facebook and Twitter accounts. AdService Executes via Chrome […]

Dangerous Mobile Banking Trojan Uses Keylogger To Steal Everything

Security researchers have discovered that one of Android’s most dangerous Mobile banking Trojan family has been modified to add a keylogger for its recent stump, giving attackers another way to steal sensitive information to victims. Kaspersky Lab’s old malware analyst Roman Unuchek has discovered a new variant of the famous Android trojan, called Svpeng, in […]

The ultimate Linux Trojan horse: Windows Subsystem for Linux

Fedora, openSUSE and Ubuntu are now available in the Windows Store, making life easier for Windows-dominant organizations to run open source software. I’m a Linux user. And, as the old adage goes, “I don’t do Windows.” This is not an article about how Linux is superior to Windows. Truth be told, I don’t begrudge any […]

EXPLOIT KIT ACTIVITY QUIETS, BUT IS FAR FROM SILENT

Over the past six months, the roar of exploit kits has quieted to a whimper. But that doesn’t mean exploit kit threats are nonexistent. According to security experts, gangs behind them are regrouping, tweaking code and finding fresh software exploits to target. Here are the exploit kits and exploit kit trends to watch for over the […]

Chinese Crooks Use Fake Cellular Telephony Towers to Spread Android Malware

Malware authors in China are using fake base transceiver stations (BTSs), which is equipment usually installed on cellular telephone towers, to send spoofed SMS messages that contain links to Android malware. This is the first ever reported case when malware authors have used base stations to spread malware, a trend that Avast predicted in 2014, […]

New Android trojan mimics user clicks to download dangerous malware

Android users have been exposed to a new malicious app imitating Adobe Flash Player that serves as a potential entrance for many types of dangerous malware. The application, detected by ESET security software as Android/TrojanDownloader.Agent.JI, tricks its victims into granting it special permissions in the Android accessibility menu and uses these to download and execute […]

Dridex Banking Trojan Returns, Leverages New UAC Bypass Method

First observed in July 2014, “Dridex,” a financial banking Trojan, is considered the successor to the “GameOver ZeuS” (GoZ) malware. • Dridex was most active between 2014 and 2015, and smaller campaigns were observed throughout 2016 with its peak activity in May 2016. • On January 25, 2017, the criminal syndicate behind Dridex launched another […]

Trojan Transforms Linux Devices into Proxies for Malicious Traffic

Security researchers have uncovered a new trojan that targets Linux devices that is capable of transforming infected machines into proxy servers and relay malicious traffic, hiding the true origin of attacks or other nefarious activities. This new trojan is named Linux.Proxy.10 and its first versions were spotted online towards the end of the year. According […]

Hacker Faces Up To 100 Years In Jail For Writing And Spreading GozNym Malware

Short Bytes: Krasimir Nikolov, a Bulgarian man, has just been indicted by a federal jury in connection with GozNym malware, which has been used to hack people’s online accounts. As a result, Nikolov now faces up to 100 years in jails and a fine of up to $3,500,000. Earlier this year in April, IBM X-Force Research revealed the […]

Tordow Android Trojan Roots Devices, Steals Photos, Contacts, Chrome Database

Comodo security researchers have spotted version 2.0 of a deadly Android trojan named Tordow, which first came to light in February this year. The trojan’s main feature is its ability to root Android devices, which in theory, gives the trojan the capability to carry out any malicious operation it wants. According to the researchers who […]

Loki Trojan Infects Android Libraries and System Process to Get Root Privileges

Malware authors have released a new version of the Android Loki trojan, which can now infect native Android OS libraries after an earlier version had previously gained the capabilities to infect core operating system processes. This trojan, named Loki, was first seen in February 2016 and was discovered by Russian antivirus vendor Dr.Web. The trojan […]

Middle Eastern hackers are using this phishing technique to infect political targets with Trojan malware

‘Moonlight’ group is likely to be involved in cyberespionage, warns Vectra Networks. A hacking group is conducting cyberespionage against targets in the Middle East by duping politicians, activists and staff at NGOs into clicking links to authentic-looking but fake versions of high-profile websites in the region, and then infecting them with malware. The operation — […]

Android Banking Trojan Asks for Selfie With Your ID

In the first half of 2016 we noticed that Android banking Trojans had started to improve their phishing overlays on legitimate financial apps to ask for more information. Victims were requested to provide “Mother’s Maiden Name,” “Father’s Middle Name,” “Maternal Grandmothers Name,” or a “Memorable Word.” Attackers used that data to respond to security questions and obtain […]

Hacked Steam accounts spreading Remote Access Trojan

Yesterday, I stumbled on a post where a Reddit user named Haydaddict was alerting people about some hacked Steam accounts spreading malware. As I am always interested in new malware, I took a look to see what could be discovered. According to the post, the hacked accounts were being used to SPAM suspicious links using Steam chat. These chat messages […]

Sofacy’s ‘Komplex’ OS X Trojan

The Sofacy group, also known as APT28, Pawn Storm, Fancy Bear, and Sednit, continues to add to the variety of tools they use in attacks; in this case, targeting individuals in the aerospace industry running the OS X operating system. During our analysis, we determined that Komplex was used in a previous attack campaign targeting […]