Microsoft Links Raspberry Robin Worm to Evil Corp

Microsoft analysts have noticed that the access broker, which the company tracks as DEV-0206, is using the Raspberry Robin Windows worm to deploy the malware loader on networks where traces of malicious activity by Evil Corp are also detected. Let me remind you that we also wrote that The Austrian Company DSIRF Was Linked to… Continue reading Microsoft Links Raspberry Robin Worm to Evil Corp

The Austrian Company DSIRF Was Linked to the Knotweed Hack Group and the Subzero Malware

Microsoft has been told that the Knotweed hack group is linked to the Austrian spyware vendor DSIRF, which also often acts as a cyber mercenary. Researchers have determined that Knotweed is attacking European and Central American organizations using the Subzero malware toolkit. Let me remind you that we also wrote that Experts linked BlackCat (ALPHV)… Continue reading The Austrian Company DSIRF Was Linked to the Knotweed Hack Group and the Subzero Malware

New Linux Malware Lightning Framework Installs Backdoors and Rootkits

Intezer analysts call the new Linux malware Lightning Framework a real “Swiss knife” because of its modular architecture, as well as the ability to install rootkits and backdoors. Let me remind you that we also talked about New RedAlert Ransomware that Targets Windows and Linux VMware ESXi Servers, and also that Information Security Experts Told… Continue reading New Linux Malware Lightning Framework Installs Backdoors and Rootkits

Chrome 0-day Vulnerability Used to Attack Candiru Malware

Avast has discovered that DevilsTongue spyware, created by Israeli company Candiru, exploited a 0-day vulnerability in Google Chrome to spy on journalists and others in the Middle East. The vulnerability in question is the CVE-2022-2294 bug, which was fixed by Google and Apple engineers earlier this month. Let me remind you that we also wrote… Continue reading Chrome 0-day Vulnerability Used to Attack Candiru Malware

CloudMensis Malware Attacks MacOS Users

ESET experts have discovered the CloudMensis malware, which is used to create backdoors on devices running macOS and subsequently steal information. The malware received its name due to the fact that it uses pCloud, Dropbox and Yandex.Disk cloud storages as control servers. Let me remind you that we also wrote that Vulnerability in macOS Leads… Continue reading CloudMensis Malware Attacks MacOS Users

The Essential Guide to Computer Viruses

The Essential Guide to Computer Viruses Computer viruses can steal and facilitate the dissemination of your confidential information, and reduce your computer performance and any other threats. To understand what viruses are and how to get rid of them, we gave you a little insight into this topic. What is a computer virus? The computer… Continue reading The Essential Guide to Computer Viruses

Which Deadliest Virus in History? Types to Remember

What is the Deadliest Virus in History? On November 11, 1983, the first virus was written, which ushered in a new era of dangerous programs for computers. An American student at the University of Southern California, Fred Cohen, wrote a program that demonstrated the ability to infect a computer at a virus reproduction rate of… Continue reading Which Deadliest Virus in History? Types to Remember

Conti Ransomware Shutdown, Site Disabled

Conti operators shut down the remnants of the public infrastructure. Two servers on the Tor network that were used to publish victims’ data and negotiate ransoms are down. The Conti News website’s admin panel and the stolen information storage were closed a month ago, and the list of non-payers has not been updated all this… Continue reading Conti Ransomware Shutdown, Site Disabled

How to Prevent Crimeware Attacks: Users` Guide

You may come across the term “Crimeware” and understandably get confused as you probably thought before that only malware or viruses are the words for the definition of any bad intention malware.The term “Crimeware” doesn’t mean another synonym for malware or viruses but rather it is a standalone word for specific kind of malware which… Continue reading How to Prevent Crimeware Attacks: Users` Guide