Malware

Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters

An ongoing effort of cryptojacking has been brought to light by cybersecurity researchers, which mines Dero money using misconfigured Kubernetes systems. The activity was made public by cloud security company Wiz, which stated it was an enhanced version of a financially driven operation that CrowdStrike had initially reported on in March 2023. Wiz researchers Avigayil

Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters Read More »

Hackers Exploit GitHub and FileZilla to Deliver Malware Cocktail

A “multi-faceted campaign” has been observed that uses reputable services such as GitHub and FileZilla to propagate a variety of banking trojans and stealer malware, including Vidar, Atomic (also known as AMOS), Lumma (also known as LummaC2), and Octo, by posing as reliable programmes such as 1Password, Bartender 5, and Pixelmator Pro. “The presence of

Hackers Exploit GitHub and FileZilla to Deliver Malware Cocktail Read More »

Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials

It has been noted that malicious Android apps that pose as Google, Instagram, Snapchat, WhatsApp, and X (previously Twitter) can steal user credentials from devices that have been hijacked. In a recent analysis, the threat research team at SonicWall Capture Labs stated that “this malware uses famous Android app icons to mislead users and trick

Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials Read More »

Android Virus Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

Researchers studying cybersecurity have uncovered a yet unreported malware that targets Android smartphones and evades detection by using hacked WordPress websites as relays for its real command-and-control (C2) servers. Code-named Wpeeper, the malware is an ELF binary that uses HTTPS to encrypt its C2 communications. “Wpeeper is a typical backdoor Trojan for Android systems, supporting

Android Virus Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers Read More »

New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks

SoumniBot is a new Android malware that targets South Korean users by taking advantage of flaws in the manifest extraction and parsing process. It has been discovered in the wild. Researchers at Kaspersky have identified the virus as “notable for an unconventional approach to evading analysis and detection, namely obfuscation of the Android manifest,” according

New Android Trojan ‘SoumniBot’ Evades Detection with Clever Tricks Read More »

The Mispadu Trojan Attacks Europe, Compromising Thousands of Credentials

The banking trojan known as Mispadu now targets users in Italy, Poland, and Sweden in addition to Latin America (LATAM) and Spanish-speaking people. According to Morphisec, the campaign’s targets include businesses in the banking, services, automotive manufacturing, legal, and commercial sectors. According to a report released last week by security expert Arnold Osipov, “Mexico remains

The Mispadu Trojan Attacks Europe, Compromising Thousands of Credentials Read More »

Russian Government Software Backdoored to Deploy Konni RAT Malware

A backdoor has been included in an installer for a utility that is probably used by the Ministry of Foreign Affairs (MID)’s Russian Consular Department to distribute the remote access trojan Konni RAT (also known as UpDog). The investigation was conducted by German cybersecurity firm DCSO, which concluded that actors with ties to the Democratic

Russian Government Software Backdoored to Deploy Konni RAT Malware Read More »

Syrian Hackers are Giving Cybercriminals Access to a Covert C#-based Silver RAT.

A remote access trojan (RAT) known as Silver RAT, developed by threat actors going by the moniker Anonymous Arabic, can run concealed apps covertly and evade security measures. Cybersecurity company Cyfirma stated in a research released last week that “the developers operate on multiple hacker forums and social media platforms, showcasing an active and sophisticated

Syrian Hackers are Giving Cybercriminals Access to a Covert C#-based Silver RAT. Read More »

Behind the Scenes of Matveev’s Ransomware Empire: Tactics and Team

The inner workings of the ransomware operation headed by Russian national Mikhail Pavlovich Matveev, who was charged by the US government earlier this year for his claimed involvement in thousands of attacks worldwide, have been revealed by cybersecurity researchers. According to reports, Matveev—who goes by the identities Wazawaka, m1x, Boriselcin, Uhodiransomwar, Orange, and waza—lives in

Behind the Scenes of Matveev’s Ransomware Empire: Tactics and Team Read More »