Developer of CodeRAT Trojan Releases Source Code

The source code for the CodeRAT remote access trojan has been published on GitHub. This happened after the security researchers identified the malware developer and called him to account because of the attacks in which this “tool” was used. SafeBreach experts say that the attacks using CodeRAT were built as follows: the campaign, apparently, was… Continue reading Developer of CodeRAT Trojan Releases Source Code

TrickBot Hack Group Systematically Attacks Ukraine

IBM Security X-Force experts noticed that from the very beginning of the full-scale Russian invasion, the TrickBot hack group “systematically attacks” Ukraine, which has not been observed before. It is believed that from mid-April to June 2022, hackers have already organized at least six such phishing campaigns. Let me remind you that the TrickBot hack… Continue reading TrickBot Hack Group Systematically Attacks Ukraine

ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers

Lumen Black Lotus Labs has discovered a new Remote Access Trojan (RAT) called ZuoRAT, attacking remote workers’ routers in North America and Europe since 2020. The malware appeared in the first months of the COVID-19 pandemic but remained unnoticed for more than two years. The researchers write that the complexity of this targeted campaign, as… Continue reading ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers

Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure

Europol announced that law enforcement officers, as a result of an international operation, destroyed one of the fastest-spreading malware – the FluBot Trojan. Let me remind you that we also talked about the fact that Law enforcement officers closed the hacker resource RaidForums, and also that the US authorities arrest Kaseya hacker and attacker associated… Continue reading Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

An unknown hacker attacked German users who are interested in information about the Russian invasion of Ukraine, infecting them with PowerShell RAT malware (more precisely, a remote access trojan) and stealing their data. Let me remind you that we wrote that Hacker groups split up: some of them support Russia, others Ukraine, and also that… Continue reading Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

20 Dangerous Types of Cybersecurity Threats 2022

The cybersecurity threats in 2022 are more considerable than ever. Due to the emergence of efficient ransomware, coin miners, spyware, and so on, hacking has become a consistently profitable business. Knowing about cybersecurity threats is crucial because it livens up the safety measures. In addition, when you’re aware of what is up against you on… Continue reading 20 Dangerous Types of Cybersecurity Threats 2022

Malware vs. Virus. Difference explained

The topic of this small post is malware vs. virus conceptual clarification. We remember times when people used to call any harmful program a “virus”. Today this “malware” term popped out! How do these words correlate? People seem to use them freely and arbitrarily. But is such usage correct? Let’s investigate. For those who are… Continue reading Malware vs. Virus. Difference explained

Microsoft patches Windows AppX Installer vulnerability that spreads Emotet malware

The latest of this year, December’s patch Tuesday brought fixes for six 0-day vulnerabilities in Microsoft products, including a bug in the Windows AppX Installer that uses Emotet malware to spread. Microsoft patched 67 vulnerabilities in its products this month, seven of which are classified as critical and 60 are classified as important. Separately, Microsoft… Continue reading Microsoft patches Windows AppX Installer vulnerability that spreads Emotet malware

Coin Miner – What is it?

Coin Miner Trojan Virus

Throughout the timeline of trojan virus evolution, it obtained a lot of different forms. Nowadays, they become global malware that can exploit your computer as it wants. In this article, I will tell you about the particular type of trojan virus – Trojan Coin Miners, also known as “Coin Miner Virus”. Coin miners: essence, spreading… Continue reading Coin Miner – What is it?

In August, the updated Qbot Trojan first entered the top of the most widespread malware

Check Point has released its monthly Global Threat Index for August 2020. According to the researchers, the updated Qbot Trojan (aka QuakBot, Qakbot, and Pinkslipbot) first entered the TOP of the most widespread malware in the world, where it took tenth place. Experts discovered Qbot in 2008; over the years, it has evolved from an… Continue reading In August, the updated Qbot Trojan first entered the top of the most widespread malware