Fake MSI Afterburner Infects Users’ Machines with Miners and Stealers

According to cybersecurity specialists from Cyble, attackers distribute miners and the RedLine infostealer using download sites for the fake MSI Afterburner utility. Over the past three months, more than 50 such fake resources have appeared on the network. Let me remind you that we also talked that Djvu Ransomware Spreads via Discord, Carrying RedLine Stealer,… Continue reading Fake MSI Afterburner Infects Users’ Machines with Miners and Stealers

Chrome Extension ViperSoftX Steals Passwords and Cryptocurrency

A Windows malware designed to steal cryptocurrency and clipboard contents installs a malicious VenomSoftX Chrome extension on users’ machines. The extension works like a RAT (Remote Access Trojan), stealing victims’ data and cryptocurrencies. Let me remind you that we also said that Malicious Ledger Live extension for Chrome steals Ledger wallet data, and also that… Continue reading Chrome Extension ViperSoftX Steals Passwords and Cryptocurrency

KmsdBot malware combines DDoS-attacks and coin mining

KmsdBot malware is a coin miner with the DDoS capabilities

A new malware, called KmsdBot, strikes user devices. The Akamai SIRT has discovered a new malware that uses the SSH (Secure Shell) protocol to infiltrate target systems in order to mine cryptocurrency and carry out DDoS attacks. It spreads disguised as a bot for popular games, in particular, GTA V. The combined threat raises malware… Continue reading KmsdBot malware combines DDoS-attacks and coin mining

Reverse Shell vs. Backdoor : What is the Differences?

Backdoor and Reverse Shell are very similar, which may lead you to believe they are the same thing. But take your time with conclusions on this point; we have given you the below guidance on the difference between the two mechanisms. What is Backdoor? Backdoors are methods of bypassing a computer’s security measures that aren’t… Continue reading Reverse Shell vs. Backdoor : What is the Differences?

Spyware vs. Stalkerware: What’s the difference?

Spyware and stalkerware are a real menace to your personal information

Fraudsters develop various methods to penetrate the property of others, so there are different types of attacks and threats. In this article, we will look at what spyware and stalkerware are, their differences, and how to avoid these programs penetrating your device. What is Spyware? Spyware is well known to the public, whereas stalkerware is… Continue reading Spyware vs. Stalkerware: What’s the difference?

What is Torrenting? Is it illegal and Safe? How Does it Work

Torrenting is a file downloading technology that is considered questionable

A torrent is a tool for free data exchange on the Internet. However, it is considered a symbol of piracy and copyright infringement. The term “torrent” in online communities is mainly used to describe downloading and uploading a file (often a movie, a piece of music, or a book) using a peer-to-peer network. But exactly… Continue reading What is Torrenting? Is it illegal and Safe? How Does it Work

Fake Sites for Adults Destroy User Data

Experts from the Cyble company have discovered a number of fake adult sites that distribute ransomware. However, a detailed analysis showed that this malware does not encrypt data, but deliberately destroys the information of its victims. Read also our article on Methods Hackers Use to Infect You with Ransomware. It is not known exactly how… Continue reading Fake Sites for Adults Destroy User Data

Hack Group Witchetty Hides Malware in the Windows Logo

Symantec researchers have discovered a malicious campaign by the hacker group Witchetty, which uses steganography to hide malware in an image with the Windows logo. Let me remind you that we also wrote that Hackers hide MageCart skimmers in social media buttons. Experts remind that the Witchetty hack group is associated with the Chinese group… Continue reading Hack Group Witchetty Hides Malware in the Windows Logo

Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

Cisco Talos analysts write that the Russian-speaking hack group Gamaredon (aka Primitive Bear, Shuckworm, IronTiden and Callisto) is attacking Ukrainian organizations with the help of a new infostealer. The targets of this campaign are employees of the Ukrainian state, defense and law enforcement agencies. Let me remind you that we also wrote that Hacker groups… Continue reading Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

Does a Factory Reset Get Rid of Viruses?

Factory Reset

You can use the reset feature to destroy the virus from your PC. Besides being an excellent way to eliminate viruses, this is also a way to remove all the information you have. Such a step requires a lot of preparing and precautions taken. But do not forget that hackers work hard to improve their… Continue reading Does a Factory Reset Get Rid of Viruses?