Items tagged with Malware

Security researchers at Kaspersky have discovered malware, dubbed SteelFox, which has been spreading “via forums posts, torrent trackers and blogs” since February of last year. It’s a potent piece of malicious software that attackers can use to extract a whole host of data from a victim’s computer, and can even enable... Read more...
In what feels like a serious case of déjà vu, a piece of Android malware initially discovered two years ago, and spotted this time by cybersecurity firm Zimperium, is making the rounds again with a new version sporting several alarming advancements. While the malicious app has a new coat of paint, the aim is still the... Read more...
In what feels like déjà vu, a particular piece of Android malware has managed to sneak its way back into apps available in the Google Play Store after initially being discovered in 2019. The security research team at Kaspersky shared that the "Necro" trojan was found within several popular apps that, according to... Read more...
Security researchers at McAfee have discovered new malware targeting Android users, named SpyAgent. The main aim of this malicious software being the theft of seed phrases that can be used to recover cryptocurrency wallets. Although once installed on a device threat actors using SpyAgent will also look to exfiltrate... Read more...
The United States Secret Service and United States Department of State are on the hunt for Belarusian national Volodymyr Iuriyovych Kadariya, who is wanted in connection with cybercrimes pertaining to the Angler Exploit Kit, and the agencies are willing to pay a massive reward for help in tracking him down. How... Read more...
Researchers at Cado Security have found new malware targeting maOS users, which is dubbed “Cthulhu Stealer.” The malicious app attempts to deceiver users by masquerading as legitimate software, such as CleanMyMac, Grand Theft Auto IV, and Adobe GenP. It’s incredibly similar to Atomic Stealer, malware first released in... Read more...
Security researchers at Cisco Talos have discovered a set of vulnerabilities affecting macOS users who have Microsoft applications installed on their computers, providing more attack vectors for malicious actors. The researchers say that “an attacker could bypass the operating system’s permission model by using... Read more...
More malware targeting Mac users has been found by searchers at security firm Elastic Security Labs. The malicious software has been dubbed “Banshee Stealer,” and it is able to compromise systems using either Intel or Apple Silicon chips. The researchers says that “this malware presents a severe risk to macOS users... Read more...
If you're rocking an AMD build, there's a high chance you're vulnerable to a serious security flaw that's been dubbed Sinkclose. That Ryzen 7 7800X3D pictured above? It's affected, as is the entire Ryzen 7000 series range and a slew of other processor models dating back to 2006. Another tidbit that won't give any AMD... Read more...
Security firm Cleafy has discovered a new piece of Android malware being used in the wild, dubbed BingoMod. BingoMod is designed to steal money from a victim by committing On Device Fraud, which makes it easier to bypass security measures used by banking institutions. The threat actors appear to be targeting users... Read more...
Android spyware dubbed Mandrake is back after being caught in 2020, managing to sneak back into the Google Play Store in 2022 and remaining available until spotted by Kaspersky in April of 2024. During those two years, Mandrake managed to accumulate 32,000 victims with the distribution of several apps, with the most... Read more...
A nasty banking trojan is taking aim at Android users in the United States and half a dozen other countries. It goes by two names, Medusa and TangleBot, but whatever you want to call it, the cause for concern is that it's a more nimble version that's tougher to detect than the one that wreaked havoc before seemingly... Read more...
Cybersecurity firm Check Point Research has discovered a potent piece of Android malware, called Rafel, being utilized by threat actors. The malware is an open-source remote administration tool (RAT) and Check Point Research says that it has already observed “an espionage group leveraging Rafel in their... Read more...
The Google Play Store is the primary app repository for most Android users, and that makes it a tantalizing target for internet ne'er-do-wells. Google says it takes Play Store security seriously—so seriously, in fact, that it has whipped up a nifty little acronym to describe its approach. Google says that it leveraged... Read more...
If you are a threat actor and want to mine cryptocurrency or steal some juicy information, a gamer’s PC is a good target for that sort of thing, given the hardware and software they use. Even better yet is the PC of a game cheater because they are used to downloading sketchy software in the first place, so the barrier... Read more...
StopCrypt ransomware is one of the most prolific yet underreported ransomware families due to its usual target of individuals rather than high-profile businesses or larger entities. We may not see this strain of ransomware in the United States as much, but it is still a threat regardless, and an evolving one at that... Read more...
This week, researchers have reported that earlier this year, threat actors leveraged a vulnerability in Windows to deploy DarkGate malware after phishing the victim for initial access. The vulnerability tracked as CVE-2024-21412 led to users running fake Microsoft software installer (.MSI) packages that looked like... Read more...
We've seen malware that wants to steal your files, money, or even your identity, but the new "Gold Pickaxe" mobile malware goes a step further. This nasty little piece of software is active on both Android and iOS, and it steals the victim's face. Security researchers warn the malware could be used to create deepfake... Read more...
Right from the start, Android has allowed you to install any software you come across on the internet, provided you aren't deterred by the prominent and increasingly scary warnings. Google is testing a new tactic to prevent the spread of mobile malware, but it's somewhat more draconian than its past efforts. The new... Read more...
Most of the time, preinstalled software on a PC can range from annoying to innocuous, with the occasional trip into "hey, this isn't so bad" territory. But sometimes, a PC can get imaged with something really nasty, causing buyers heartache well outside the norm. Such is the case with at least some AceMagic mini PCs... Read more...
Your personal data and information are hot commodities, so much so that virtually all businesses or other entities with access are all scrambling to monitor and sell it if possible. Threat actors also know this as well, which could lead to blackmail, extortion, bank account access, or more sinister things if your personal data is breached. Read more...
USB malware drops have been around forever, and as always, we do not recommend you randomly plug in a flash drive you find out in the wild. However, this initial access method is still working for threat actors, which is what researchers found tracking threat actor group UNC4990. Beyond the initial access, though... Read more...
1 2 3 4 5 Next