Malware

Iranian Hackers Deploy WezRat Malware to Attack Isreal

A newly discovered remote access trojan and information stealer that Iranian state-sponsored attackers employ to survey compromised endpoints and carry out malicious orders has been made public by cybersecurity experts. The malware has been identified in the wild since at least September 1, 2023, according to artefacts posted to the VirusTotal website, and the cybersecurity […]

Iranian Hackers Deploy WezRat Malware to Attack Isreal Read More »

Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters

An ongoing effort of cryptojacking has been brought to light by cybersecurity researchers, which mines Dero money using misconfigured Kubernetes systems. The activity was made public by cloud security company Wiz, which stated it was an enhanced version of a financially driven operation that CrowdStrike had initially reported on in March 2023. Wiz researchers Avigayil

Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters Read More »

Hackers Exploit GitHub and FileZilla to Deliver Malware Cocktail

A “multi-faceted campaign” has been observed that uses reputable services such as GitHub and FileZilla to propagate a variety of banking trojans and stealer malware, including Vidar, Atomic (also known as AMOS), Lumma (also known as LummaC2), and Octo, by posing as reliable programmes such as 1Password, Bartender 5, and Pixelmator Pro. “The presence of

Hackers Exploit GitHub and FileZilla to Deliver Malware Cocktail Read More »

Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials

It has been noted that malicious Android apps that pose as Google, Instagram, Snapchat, WhatsApp, and X (previously Twitter) can steal user credentials from devices that have been hijacked. In a recent analysis, the threat research team at SonicWall Capture Labs stated that “this malware uses famous Android app icons to mislead users and trick

Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials Read More »

Android Virus Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

Researchers studying cybersecurity have uncovered a yet unreported malware that targets Android smartphones and evades detection by using hacked WordPress websites as relays for its real command-and-control (C2) servers. Code-named Wpeeper, the malware is an ELF binary that uses HTTPS to encrypt its C2 communications. “Wpeeper is a typical backdoor Trojan for Android systems, supporting

Android Virus Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers Read More »

New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks

SoumniBot is a new Android malware that targets South Korean users by taking advantage of flaws in the manifest extraction and parsing process. It has been discovered in the wild. Researchers at Kaspersky have identified the virus as “notable for an unconventional approach to evading analysis and detection, namely obfuscation of the Android manifest,” according

New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks Read More »

The Mispadu Trojan Attacks Europe, Compromising Thousands of Credentials

The banking trojan known as Mispadu now targets users in Italy, Poland, and Sweden in addition to Latin America (LATAM) and Spanish-speaking people. According to Morphisec, the campaign’s targets include businesses in the banking, services, automotive manufacturing, legal, and commercial sectors. According to a report released last week by security expert Arnold Osipov, “Mexico remains

The Mispadu Trojan Attacks Europe, Compromising Thousands of Credentials Read More »

Russian Government Software Backdoored to Deploy Konni RAT Malware

A backdoor has been included in an installer for a utility that is probably used by the Ministry of Foreign Affairs (MID)’s Russian Consular Department to distribute the remote access trojan Konni RAT (also known as UpDog). The investigation was conducted by German cybersecurity firm DCSO, which concluded that actors with ties to the Democratic

Russian Government Software Backdoored to Deploy Konni RAT Malware Read More »