Mirai variant “Pandora” infects Android TV for DDoS attacks.

New Mirai malware botnet targets low-cost Android TV set-top boxes for powerful DDoS attacks.

A new variant of the Mirai malware botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively used for media streaming by millions of people. The present Trojan is a fresh edition of the ‘Pandora’ backdoor initially identified in 2015, per the analytics. The campaign targets low-cost Android TV boxes such as… Continue reading Mirai variant “Pandora” infects Android TV for DDoS attacks.

Gozi and IcedID Trojans Spread via Malvertising

Malvertising sing paid ads to spread Gozi and IcedID

Malvertising on Google Search is an unpleasant occurrence where malicious ads appear in search engine results. These ads are meant to help users find relevant information. But unfortunately, some cybercriminals use paid advertisements to entice users to visit harmful websites and deceive them into downloading malicious software. How does malvertising work? Malvertising is an attack… Continue reading Gozi and IcedID Trojans Spread via Malvertising

FIN8 Updated Sardonic Backdoor to Deliver Noberus Ransomware

FIN8 cybercriminals group using a new type of malware called Noberus to avoid detection.

FIN8, an infamous group of cybercriminals, has updated its backdoor malware to avoid being detected. They made improvements and prepared to release a new type of crimeware called Noberus. This threat actor has returned after inactivity, using a modified version of their Sardonic backdoor to distribute the Noberus ransomware. This is a part of their… Continue reading FIN8 Updated Sardonic Backdoor to Deliver Noberus Ransomware

Trojanized TeamViewer Installer Spreads njRAT

Hackers exploit third-party software sources to distribure a dangerous remote-access trojan

Threat actors reportedly started using fake TeamViewer to distribute malware. Their particular favourite for the final payload is the infamous njRAT trojan – an old-timer of the scene. Through the tricky spreading scheme, hackers run a multi-stage attack. njRAT Hides in Trojanized TeamViewer App For some reason, people show high levels of trust towards downloading… Continue reading Trojanized TeamViewer Installer Spreads njRAT

Domino Backdoor is Lead by FIN7 and Conti Actors

New Domino Backdoor appears to be a collaboration between two notorious threat actors

A new Domino Backdoor popped out at the beginning of 2023. Since February, a new malware family coined Domino is used for attack on corporations, having Project Nemesis stealer as a final payload. Analysts say that the new backdoor is controlled and developed by ex-TrickBot/Conti actors and hackers related to the FIN7 group. Who are… Continue reading Domino Backdoor is Lead by FIN7 and Conti Actors

IceBreaker Backdoor Emerged, Exploiting New Phishing Way

New malware sample brought a new spreading way

A new player has appeared in cyberspace, with surprisingly new methods. A previously unknown group attacked gambling and online gaming companies using a yet unknown backdoor, named IceBreaker by researchers. IceBreaker Backdoor exploits new phishing way The method of compromising is based on the fact that tech support workers are tricked into opening malicious screenshots… Continue reading IceBreaker Backdoor Emerged, Exploiting New Phishing Way

Remote Access Trojan (RAT Malware)

Backdoors are a major threat to anyone. Remote access trojans are yet another tool to provide the backdoor access

Remote Access Trojan is software that allows unauthorized access to a victim’s computer or covert surveillance. Remote access Trojan are often disguised as legitimate programs and give the attacker unhindered access. Their capabilities include tracking user behavior, copying files, and using bandwidth for criminal activity. What is a Remote Access Trojan (RAT)? A Remote Access… Continue reading Remote Access Trojan (RAT Malware)

Reverse Shell vs. Backdoor : What is the Differences?

Backdoor and Reverse Shell are very similar, which may lead you to believe they are the same thing. But take your time with conclusions on this point; we have given you the below guidance on the difference between the two mechanisms. What is Backdoor? Backdoors are methods of bypassing a computer’s security measures that aren’t… Continue reading Reverse Shell vs. Backdoor : What is the Differences?

Signs of Identity Theft: How to Prevent It?

Identity theft (ID) occurs when someone steals your personal information to commit fraud.

Identity theft is a rather unpleasant crime. Cybercriminals can not only empty your wallet but also stalk your digital space and may even use it to commit crimes on your behalf. Since criminals invent new tricks daily, keeping yourself safe is pretty hard. So we’ve set together some essential tips to help prevent identity theft… Continue reading Signs of Identity Theft: How to Prevent It?

How to Keep Your Windows 10 Computer Secure in 2023

How to Keep Your Windows 10 Computer Secure?

Windows has valuable features, including comfortable tools for user PC and confidential data protection. Unfortunately, hackers are interested in breaking into this operating system, as Windows occupies more than 85% of user devices. Also, this OS has many vulnerabilities that attackers try to use. In the following guide, you will find some essential tips on… Continue reading How to Keep Your Windows 10 Computer Secure in 2023