FFDroider Stealer – the new hazard to your social networks

FFDroider Stealer, FFDroider malware, Stealer virus

FFDroider is an example of a modern stealer malware that aims at sensitive data in web browsers. The overall amount of new stealers that appeared in the first quarter of 2022 says a lot about the new malware trends. FFDroider Stealer is the second malware of this type that popped out last month. The BlackGuard… Continue reading FFDroider Stealer – the new hazard to your social networks

Meta Infostealer Malware Spread via Spam Campaign

Meta, a newly crafted information-stealing malware, is distributed via a vast spam spree. The mechanism of the stealer injection within this campaign is already well-known. However, Meta is now a mainstream tool among hackers. Therefore, further attacks featuring this software but with different scenarios are inevitable. This article explains how the current malspam scheme works.… Continue reading Meta Infostealer Malware Spread via Spam Campaign

Hydra Market Shut Down by the German Authorities

The United States, together with its European allies, has managed to get Hydra market shut down. Servers of this shop, a Russian-language darknet platform, were reported on Tuesday, April 5, 2022, to be seized by German authorities. The marketplace used to be a place to mainly trade illegal drugs and documents, mix cryptocurrency, and exchange… Continue reading Hydra Market Shut Down by the German Authorities

Pornographic virus alert from Microsoft

Microsoft shows you the banner which states that your PC is infected with a “Pornographic virus”? It seems that someone wants to involve you into a popular online tech support scam, called “Pornographic virus alert from Microsoft”. But how can they do it with a single banner? That article will show you the whole mechanism… Continue reading Pornographic virus alert from Microsoft

The Facebook Pixel Hunt

Facebook Mozilla Firefox Facebook Pixel Hunt

Mozilla, a browser maker, these days introduced its collaboration with a non-earnings newsroom Markup. The collective efforts of companies could be directed toward studies into a selected subject of the net that regularly stays disregarded through customers, researchers and policymakers. This time beneath the scrupulous eyes of experts and newshounds the predominant social platform Facebook… Continue reading The Facebook Pixel Hunt

Volvo Cars under Snatch attack

Snatch ransomware Volvo Cars Safe Mode

In its press release, Volvo Cars, a Swedish multinational luxury vehicle manufacturer based in Torslanda, Gothenburg, reported unlawful third party access to its records. Upon discovery of the violation, the company notified the relevant authorities and took steps to prevent further access to its property. Immediately shares of Volvo Cars fell 3.2% at 3:55 p.m.… Continue reading Volvo Cars under Snatch attack

Antivirus scanner and anti-malware. What is the difference?

Antivirus, anti-malware software, antivirus scanner… There are so many terms, and all of them look so similar, but they’re different. It is easy to confuse the user who does not have any information about all these things. Thus, it is important to clear out these things in easy words. From a certain point of view,… Continue reading Antivirus scanner and anti-malware. What is the difference?

Script-based malware. How to stay protected?

Script-Based Malware

Over the last four years, the share of script-based attacks of malware offenses worldwide has grown so drastically that it raised alerts among security specialists and ordinary users. In this post, we shall regard script-based malware, assess its strengths and weaknesses, explain how the attacks happen, and suggest measures to maintain security in your workgroup.… Continue reading Script-based malware. How to stay protected?