Infostealer Malware: Top Stealers in 2024

Aside from stealer majors, there are several novice names with a significant potential

Cybercrime world changes rapidly – both by expanding, collapsing, evolving extensively and intensively. One of the most massive malware types in the modern threat landscape – Infostealer Malware – appears to enter a new stage of development. Though its major names remain the same, some new malware families with promising features popped out. Let’s have… Continue reading Infostealer Malware: Top Stealers in 2024

RedLine Stealer Issues 100,000 Samples – What is Happening?

There could be quite a lot of applications for 100,000 samples of malware

Throughout the entire early May 2023, GridinSoft analysts team observed an anomalous activity of RedLine stealer. It is, actually, an activity different from what we used to know. Over 100,000 samples of this malware appeared through the first 12 days of the month – that is too much even for more massive threats. Needless to… Continue reading RedLine Stealer Issues 100,000 Samples – What is Happening?

Rorschach Ransomware Analysis

Rorschach ransomware is an amalgamation of best elements of other ransomware

Recent research from the CheckPoint Research team revealed a new ransomware sample that can potentially beat all samples currently present on the market. They coined it Rorschach, and already say that its unique properties can make it dominant ransomware pretty quickly. We told about this malware in a recent news post, and now it’s time… Continue reading Rorschach Ransomware Analysis

BlackGuard Receives Update, Targets More Cryptowallets

BlackGuard is now able to attack up to 57 crypto wallets and extensions

BlackGuard, a prolific infostealer malware, received an update at the edge of 2023. The new update introduced advanced data-stealing capabilities and secure connectivity features. The new version also includes a row of new anti-detection and anti-analysis capabilities. Let’s have a more detailed look into this malware and see the difference from all aspects. BlackGuard Stealer… Continue reading BlackGuard Receives Update, Targets More Cryptowallets

ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users

Phishing sites trick users into downloading ImBetter Stealer.

Today, phishing sites are commonplace. But unfortunately, this seemingly old, deceptive tactic, which everyone seemed to have figured out long ago, still brings enormous profits to scammers today. The problem is that while Internet users are becoming more cautious, cyber scammers are developing more sophisticated ways to trick them. One such method is ImBetter malware.… Continue reading ImBetter: New Information Stealer Spotted Targeting Cryptocurrency Users

Fake BSOD Scams Target Users Visiting Fake Adult Sites

Tech-support scammers use the fake blue screen of death to impose their scammy services on users.

The blue screen of death is probably the most unpleasant thing Windows users may ever see. In most cases, it is an alarming sign that something is wrong with your computer’s hardware or software. Some errors can mean that one or more components will soon be replaced. However, the Blue Screen of Death is not… Continue reading Fake BSOD Scams Target Users Visiting Fake Adult Sites

New stealthy “Beep” malware focuses heavily on evading detection

Beep Malware imitates action but, in fact, idly emits an actual inaudible "beep" sound from the PC speaker

Cybercriminals periodically develop something new. Sometimes it is an updated version of already known malware, and sometimes it is something new and not obvious, such as Beep malware. Thus, this malware has one distinguishing feature: a new tactic of evading detection. Although Beep malware is still under development, it already boasts existing functionality that avoids… Continue reading New stealthy “Beep” malware focuses heavily on evading detection

Qakbot Malware Applies New Distribution Methods

Qakbot malware exploits new spreading ways following recent changes in macros execution policies

Today there is an arms race between cybercriminals and antimalware manufacturers. While some release a fix for an existing threat, others must develop new loopholes. Recently, cybersecurity experts noticed that many malware families were using OneNote attachments to infect their victims. Since OneNote is considered a robust application that Microsoft has developed for easy note-taking,… Continue reading Qakbot Malware Applies New Distribution Methods

Dangerous Virus & Malware Threats in 2023

Users risk losing their data because of the rapid development of viruses and malware threats

Virus and malware threats are constantly evolving and become more sophisticated and more dangerous over time; this makes it extremely difficult to maintain your data’s security. Unless you’re adequately protected, you risk to become a victim of the latest computer viruses and malware attacks. In addition, cybercriminals are relentless. They will stop at nothing to… Continue reading Dangerous Virus & Malware Threats in 2023

Huge Ransomware List by Gridinsoft Research – Part #2

Even more ransomware attacks you should know about

We talked a lot about notorious ransomware examples in Part #1 of this series. Still, it was not enough to reveal all noteworthy ransomware attacks. In Part #2, we will have a look at notorious attacks and ransomware families – several groups that use a single ransomware sample or its subspecies. More Interesting Ransomware Attacks… Continue reading Huge Ransomware List by Gridinsoft Research – Part #2