The Internet Crime Complaint Center (IC3) and Federal Bureau of Investigation (FBI) issued a new warning that cyber actors are using banking trojans and fake mobile banking apps to steal…
Security experts discovered LokiBot, a trojan malware, has been impersonating a popular game launcher. As a result, cybercriminals are able to trick users into downloading the fake app and executing the malware on their systems.
A multi-stage downloader trojan dubbed sLoad uses BITS to steal data from compromised systems. Attackers use sLoad to evade anti-malware protections and security monitoring that may not detect activity using these unconventional protocols.
A new Windows trojan dubbed CStealer attempts to steal passwords from Chrome browser. The malware also uses a remote MongoDB server to store the stolen passwords.
Cyber criminals have been actively pushing Emotet malware since early November.
A new malware family dubbed NOKKI is being used in politically motivated attacks targeting Russian and Cambodian speaking people and organizations.
US-CERT has published a joint Technical Alert (TA18-201A) warning of a cyber campaign involving Emotet Malware. Malicious activity was observed as recently as this month.
A new version of Rakhni Trojan has added a cryptocurrency mining capability to its feature-set. A new cyber campaign discovered by Kaspersky researchers uses a downloader to either install a cryptor or miner on victim computers.
A new US-CERT Technical Alert (TA) warned cyber actors are using Joanap and Brambul malware to target multiple victims worldwide.
Security researchers have spotted a new email campaign last week that is distributing a new variant of the Dridex banking trojan.