Tag: Spyware

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into downloading Lumma…

Stephanie Adlam Stephanie Adlam

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website reporting a…

Stephanie Adlam Stephanie Adlam

Trojan:Win32/Stealer!MTB Virus

Trojan:Win32/Stealer!MTB is a detection that indicates the presence of an infostealer on…

Stephanie Adlam Stephanie Adlam

Trojan:Win32/Commandrob.A!ml Threat Analysis

The Trojan:Win32/Commandrob.A!ml detection may sometimes flag legitimate programs. Here is how to…

Stephanie Adlam Stephanie Adlam

Trojan:Win64/Zusy.CZ!MTB

Trojan:Win64/Zusy.CZ!MTB detection may appear out of the blue. Here is what it…

Stephanie Adlam Stephanie Adlam

Trojan:Win32/Leonem

Trojan:Win32/Leonem is a spyware that targets any login data on a compromised…

Stephanie Adlam Stephanie Adlam

Trojan:Win64/Reflo.HNS!MTB

Win64/Reflo.HNS!MTB is a detection of a malware sample that aims at stealing…

Stephanie Adlam Stephanie Adlam

Trojan:Win32/Bearfoos.B!ml

Trojan:Win32/Bearfoos.B!ml is a detection of Microsoft Defender associated with data stealing malware.…

Stephanie Adlam Stephanie Adlam

What is Infostealer Malware? Top 5 Stealers in 2024

The Cybercrime world changes rapidly – both by expanding, collapsing, and evolving…

Stephanie Adlam Stephanie Adlam

Password Stealer

Password stealer is a type of data stealing malware, that aims at…

Stephanie Adlam Stephanie Adlam

Trojan:Win32/Acll

Trojan:Win32/Acll is a stealer malware detected by Microsoft Defender. It targets sensitive…

Stephanie Adlam Stephanie Adlam

Remote Access Trojan (RAT)

Remote Access Trojan is software that allows unauthorized access to a victim's…

Stephanie Adlam Stephanie Adlam