PUABundler:Win32/PiriformBundler

PiriformBundler is a detection name for software developed by Piriform

PUABundler:Win32/PiriformBundler is the detection of an unwanted program, developed and issued by Piriform Software. While applications from this developer aren’t inherently malicious, the bundled software they carry and their questionable behavior make them less than desirable. What is PUABundler:Win32/PiriformBundler? PiriformBundler is a detection name for unwanted software developed by Piriform. Microsoft assigns such names to… Continue reading PUABundler:Win32/PiriformBundler

Novice Rugmi Loader Delivers Various Spyware

Analysts uncovered a novice Rugmi Loader, malware that primarily aims at spreading spyware and stealers

The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact capable of delivering any malware type. Rugmi boasts of its unusual structure, which makes it rather promising among other loaders. What is Rugmi Loader? The Rugmi is a complex loader with multiple components that deliver… Continue reading Novice Rugmi Loader Delivers Various Spyware

Xamalicious Trojan Hits Over 327K Android Devices

Android backdoor, Xamalicious, has been discovered, carrying out various malicious actions on infected devices.

A new Android backdoor, dubbed Xamalicious, was discovered by the researchers at the edge of 2023. This malware exhibits potent capabilities to perform malicious actions on infected devices. Malware reportedly exploits Android’s accessibility permissions to gain access to various sources of user data. What is Xamalicious Malware? As I’ve said in the introduction, Xamalicious is… Continue reading Xamalicious Trojan Hits Over 327K Android Devices

Integris Health Hacked, Patients Receive Ransom Emails

Attackers have taken extortion to the next level and are blackmailing patients at a hacked medical facility.

Integris Health, Oklahoma’s most extensive not-for-profit health network, fell victim to a sophisticated cyberattack, which compromised susceptible patient data. This unfortunate occasion got some really unusual results: patients of Integris Health in Oklahoma started receiving extortion emails. They threaten the sale of their data to other malicious actors if they fail to pay an extortion… Continue reading Integris Health Hacked, Patients Receive Ransom Emails

Carbanak is Back with a New Spreading Tactic

The banking malware Carbanak has been observed being used in ransomware attacks with updated tactics.

The Carbanak cybercrime group, infamous for its banking malware, has resurfaced with new ransomware tactics, marking a significant evolution in their modus operandi. This development, as reported by the NCC Group, reflects Carbanak’s adaptability and increased threat to global cybersecurity Carbanak is Back, Using New Distribution Methods Carbanak’s return is marked by a significant shift… Continue reading Carbanak is Back with a New Spreading Tactic

What Should You Do When You Get Scammed?

Every dark cloud has a silver lining

As online scams become not only more widespread, but also more sophisticated, it appears to be rather easy to become a victim of one. But what should you do in such a case? Is it possible to get your money back? Let me show you every step you should do. You Got Scammed – Where… Continue reading What Should You Do When You Get Scammed?

What are Crypto Draining Attacks? Signs & Mitigation

Cryptocurrency owners tensed up. Major fraud empties the wallets of users.

Among a wide variety of possible scams that involve cryptocurrencies, crypto draining attacks stand in their volume and amount of losses. As the name suggests, such an attack drains the entirety of contents of an involved cryptocurrency wallet. But let’s have a more detailed look at how this fraud works, and how you can avoid… Continue reading What are Crypto Draining Attacks? Signs & Mitigation

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

UAC-0099 has been using a critical vulnerability in WinRAR software to spread Lonepage malware.

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its cyber espionage campaign against Ukrainian firms. Leveraging a severe vulnerability in the popular WinRAR software, the group orchestrates sophisticated attacks to deploy the Lonepage malware, a VBS malware capable of remote command execution and data theft. UAC-0099 Exploits WinRar Vulnerability In most recent… Continue reading UAC-0099 Targets Ukrainian Companies With Lonepage Malware

FalseFont Malware Targets Defence Contractors Worldwide

Iranian hackers joined the big hacking game with a novice malware sample

The Iranian hacking group APT33 has developed a new malware called FalseFont. They use it to target the Defense Industrial Base worldwide. Microsoft reports the surge in its activity in December, 2023. APT33 targets defense firms with FalseFont malware Researchers recently shed light on a new cyber-espionage campaign. The Iranian APT33 group has been deploying… Continue reading FalseFont Malware Targets Defence Contractors Worldwide

Cryptocurrency Scams on Twitter Exploit Post Features

Cryptocurrency scammers are misusing a Twitter "feature" to promote scams, fake giveaways for stealing cryptocurrency.

Fraudsters are seen to exploit a feature of Twitter publications, misleading users and endangering digital assets. This deceptive strategy hinges on Twitter’s URL structure, which allows hackers to lure folks into various scams. Primarily, such campaigns are used to promote various cryptocurrency scams. Vulnerability in Twitter In-Post Links The exploit involves altering the account name… Continue reading Cryptocurrency Scams on Twitter Exploit Post Features