A Windows malware designed to steal cryptocurrency and clipboard contents installs a malicious VenomSoftX Chrome extension on users’ machines. The extension works like a RAT (Remote Access Trojan), stealing victims’ data and cryptocurrencies. Let me remind you that we also said that Malicious Ledger Live extension for Chrome steals Ledger wallet data, and also that… Continue reading Chrome Extension ViperSoftX Steals Passwords and Cryptocurrency
A new malware, called KmsdBot, strikes user devices. The Akamai SIRT has discovered a new malware that uses the SSH (Secure Shell) protocol to infiltrate target systems in order to mine cryptocurrency and carry out DDoS attacks. It spreads disguised as a bot for popular games, in particular, GTA V. The combined threat raises malware… Continue reading KmsdBot malware combines DDoS-attacks and coin mining
Backdoor and Reverse Shell are very similar, which may lead you to believe they are the same thing. But take your time with conclusions on this point; we have given you the below guidance on the difference between the two mechanisms. What is Backdoor? Backdoors are methods of bypassing a computer’s security measures that aren’t… Continue reading Reverse Shell vs. Backdoor : What is the Differences?
Fraudsters develop various methods to penetrate the property of others, so there are different types of attacks and threats. In this article, we will look at what spyware and stalkerware are, their differences, and how to avoid these programs penetrating your device. What is Spyware? Spyware is well known to the public, whereas stalkerware is… Continue reading Spyware vs. Stalkerware: What’s the difference?
A torrent is a tool for free data exchange on the Internet. However, it is considered a symbol of piracy and copyright infringement. The term “torrent” in online communities is mainly used to describe downloading and uploading a file (often a movie, a piece of music, or a book) using a peer-to-peer network. But exactly… Continue reading What is Torrenting? Is it illegal and Safe? How Does it Work
Experts from the Cyble company have discovered a number of fake adult sites that distribute ransomware. However, a detailed analysis showed that this malware does not encrypt data, but deliberately destroys the information of its victims. Read also our article on Methods Hackers Use to Infect You with Ransomware. It is not known exactly how… Continue reading Fake Sites for Adults Destroy User Data
Symantec researchers have discovered a malicious campaign by the hacker group Witchetty, which uses steganography to hide malware in an image with the Windows logo. Let me remind you that we also wrote that Hackers hide MageCart skimmers in social media buttons. Experts remind that the Witchetty hack group is associated with the Chinese group… Continue reading Hack Group Witchetty Hides Malware in the Windows Logo
Cisco Talos analysts write that the Russian-speaking hack group Gamaredon (aka Primitive Bear, Shuckworm, IronTiden and Callisto) is attacking Ukrainian organizations with the help of a new infostealer. The targets of this campaign are employees of the Ukrainian state, defense and law enforcement agencies. Let me remind you that we also wrote that Hacker groups… Continue reading Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations
You can use the reset feature to destroy the virus from your PC. Besides being an excellent way to eliminate viruses, this is also a way to remove all the information you have. Such a step requires a lot of preparing and precautions taken. But do not forget that hackers work hard to improve their… Continue reading Does a Factory Reset Get Rid of Viruses?
AT&T researchers have discovered a new Linux stealth malware called Shikitega that targets computers and IoT devices and uses privilege escalation vulnerabilities to run the Monero cryptocurrency miner on the infected devices. Shikitega can evade antivirus software with a polymorphic encoder that makes signature-based static detection impossible. Let me remind you that we also said… Continue reading The New Shikitega Malware Is Very Difficult to Detect and Eliminate