IS Specialists Discovered a New Version of Malware from Russian Hackers LOLI Stealer

Cyble Research Labs specialists found a sample of malware in the wild, which turned out to be an updated version of a previously discovered malware named LOLI Stealer. Let me remind you that we also reported that FFDroider Stealer is the new hazard to your social networks, and also that STOP Ransomware Spreads through Discord,… Continue reading IS Specialists Discovered a New Version of Malware from Russian Hackers LOLI Stealer

Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC

VirusTotal analysts presented a report on the methods that malware operators use to bypass protection and increase the effectiveness of social engineering. The study showed that attackers are increasingly imitating legitimate applications such as Skype, Adobe Reader and VLC Player to gain the trust of victims. Let me remind you that we also wrote that… Continue reading Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC

Microsoft Links Raspberry Robin Worm to Evil Corp

Microsoft analysts have noticed that the access broker, which the company tracks as DEV-0206, is using the Raspberry Robin Windows worm to deploy the malware loader on networks where traces of malicious activity by Evil Corp are also detected. Let me remind you that we also wrote that The Austrian Company DSIRF Was Linked to… Continue reading Microsoft Links Raspberry Robin Worm to Evil Corp

The Austrian Company DSIRF Was Linked to the Knotweed Hack Group and the Subzero Malware

Microsoft has been told that the Knotweed hack group is linked to the Austrian spyware vendor DSIRF, which also often acts as a cyber mercenary. Researchers have determined that Knotweed is attacking European and Central American organizations using the Subzero malware toolkit. Let me remind you that we also wrote that Experts linked BlackCat (ALPHV)… Continue reading The Austrian Company DSIRF Was Linked to the Knotweed Hack Group and the Subzero Malware

New Linux Malware Lightning Framework Installs Backdoors and Rootkits

Intezer analysts call the new Linux malware Lightning Framework a real “Swiss knife” because of its modular architecture, as well as the ability to install rootkits and backdoors. Let me remind you that we also talked about New RedAlert Ransomware that Targets Windows and Linux VMware ESXi Servers, and also that Information Security Experts Told… Continue reading New Linux Malware Lightning Framework Installs Backdoors and Rootkits

Chrome 0-day Vulnerability Used to Attack Candiru Malware

Avast has discovered that DevilsTongue spyware, created by Israeli company Candiru, exploited a 0-day vulnerability in Google Chrome to spy on journalists and others in the Middle East. The vulnerability in question is the CVE-2022-2294 bug, which was fixed by Google and Apple engineers earlier this month. Let me remind you that we also wrote… Continue reading Chrome 0-day Vulnerability Used to Attack Candiru Malware

CloudMensis Malware Attacks MacOS Users

ESET experts have discovered the CloudMensis malware, which is used to create backdoors on devices running macOS and subsequently steal information. The malware received its name due to the fact that it uses pCloud, Dropbox and Yandex.Disk cloud storages as control servers. Let me remind you that we also wrote that Vulnerability in macOS Leads… Continue reading CloudMensis Malware Attacks MacOS Users

The Essential Guide to Computer Viruses

The Essential Guide to Computer Viruses Computer viruses can steal and facilitate the dissemination of your confidential information, and reduce your computer performance and any other threats. To understand what viruses are and how to get rid of them, we gave you a little insight into this topic. What is a computer virus? The computer… Continue reading The Essential Guide to Computer Viruses

Which Deadliest Virus in History? Types to Remember

What is the Deadliest Virus in History? On November 11, 1983, the first virus was written, which ushered in a new era of dangerous programs for computers. An American student at the University of Southern California, Fred Cohen, wrote a program that demonstrated the ability to infect a computer at a virus reproduction rate of… Continue reading Which Deadliest Virus in History? Types to Remember