KmsdBot malware combines DDoS-attacks and coin mining

KmsdBot malware is a coin miner with the DDoS capabilities

A new malware, called KmsdBot, strikes user devices. The Akamai SIRT has discovered a new malware that uses the SSH (Secure Shell) protocol to infiltrate target systems in order to mine cryptocurrency and carry out DDoS attacks. It spreads disguised as a bot for popular games, in particular, GTA V. The combined threat raises malware… Continue reading KmsdBot malware combines DDoS-attacks and coin mining

Reverse Shell vs. Backdoor : What is the Differences?

Backdoor and Reverse Shell are very similar, which may lead you to believe they are the same thing. But take your time with conclusions on this point; we have given you the below guidance on the difference between the two mechanisms. What is Backdoor? Backdoors are methods of bypassing a computer’s security measures that aren’t… Continue reading Reverse Shell vs. Backdoor : What is the Differences?

Spyware vs. Stalkerware: What’s the difference?

Spyware and stalkerware are a real menace to your personal information

Fraudsters develop various methods to penetrate the property of others, so there are different types of attacks and threats. In this article, we will look at what spyware and stalkerware are, their differences, and how to avoid these programs penetrating your device. What is Spyware? Spyware is well known to the public, whereas stalkerware is… Continue reading Spyware vs. Stalkerware: What’s the difference?

What is Torrenting? Is it illegal or Safe? How Does it Work

Torrenting is a file downloading technology that is considered questionable

A torrent is a tool for free data exchange on the Internet. However, it is considered a symbol of piracy and copyright infringement. The term “torrent” in online communities is mainly used to describe downloading and uploading a file (often a movie, a piece of music, or a book) using a peer-to-peer network. But exactly… Continue reading What is Torrenting? Is it illegal or Safe? How Does it Work

Fake Sites for Adults Destroy User Data

Experts from the Cyble company have discovered a number of fake adult sites that distribute ransomware. However, a detailed analysis showed that this malware does not encrypt data, but deliberately destroys the information of its victims. Read also our article on Methods Hackers Use to Infect You with Ransomware. It is not known exactly how… Continue reading Fake Sites for Adults Destroy User Data

Hack Group Witchetty Hides Malware in the Windows Logo

Symantec researchers have discovered a malicious campaign by the hacker group Witchetty, which uses steganography to hide malware in an image with the Windows logo. Let me remind you that we also wrote that Hackers hide MageCart skimmers in social media buttons. Experts remind that the Witchetty hack group is associated with the Chinese group… Continue reading Hack Group Witchetty Hides Malware in the Windows Logo

Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

Cisco Talos analysts write that the Russian-speaking hack group Gamaredon (aka Primitive Bear, Shuckworm, IronTiden and Callisto) is attacking Ukrainian organizations with the help of a new infostealer. The targets of this campaign are employees of the Ukrainian state, defense and law enforcement agencies. Let me remind you that we also wrote that Hacker groups… Continue reading Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

The New Shikitega Malware Is Very Difficult to Detect and Eliminate

AT&T researchers have discovered a new Linux stealth malware called Shikitega that targets computers and IoT devices and uses privilege escalation vulnerabilities to run the Monero cryptocurrency miner on the infected devices. Shikitega can evade antivirus software with a polymorphic encoder that makes signature-based static detection impossible. Let me remind you that we also said… Continue reading The New Shikitega Malware Is Very Difficult to Detect and Eliminate

SharkBot Malware Infiltrates Google Play Store Again

Information security specialists from Fox IT discovered two applications in the Google Play Store that distribute the SharkBot Trojan: Mister Phone Cleaner and Kylhavy Mobile Security were installed more than 60,000 times in total. Let me remind you that we wrote that Researchers Found 35 Malware on Google Play, Overall Installed 2,000,000 Times, and also… Continue reading SharkBot Malware Infiltrates Google Play Store Again