Category: Malware

ShadowHammer supply-chain attack

Iranian hacker deploys new ZeroCleare data removal malware

Recently, IBM’s security researchers discovered a new type of destructive data removal malware ZeroCleare. Data removal malware is often used to remove evidence to cover up intrusions or to influence victims. It is reported...

PGA ransomware

U.S. data center vendor CyrusOne was infected by ransomware

Recently, CyrusOne, a well-known data center provider in the United States, was attacked by Sodinokibi (also known as REvil) ransomware, causing its service interruption. Although the company has not disclosed any details, financial and...

Qakbot banking trojan

Malicious Python library steal SSH and GPG keys

The Python security team removed two malicious Python libraries from PyPI that were found to steal SSH and GPG keys. Both libraries were created by the same developer. The first is “python3-dateutil,” which imitated...

PyLocky ransomware decryption

Cash-moving company Prosegur attacked by Ryuk Ransomware

Recently, the Spanish cash transfer company Prosegur issued a press statement stating that its network had been attacked by Ryuk Ransomware, resulting in a brief interruption of its services.  It is understood that Prosegur...

Linux kernel updates

Roboto botnet is targeting Linux Webmin servers

Researchers recently disclosed that the attacker used a Webmin application vulnerability on a Linux server to form a botnet named Roboto. Webmin is a web-based remote management application that has a vulnerability in older...

Carbanak banking malware source code

MalwareHunterTeam found new SectopRAT trojan horse

Recently, the security research team MalwareHunterTeam said it discovered a new Trojan horse program SectopRAT. This Trojan can be used to control browser sessions on infected computers, change browser configuration, and disable security measures....

Platinum APT

Platinum APT develops a new stealth backdoor

Recently, the hacker organization Platinum APT has developed a new stealth backdoor Trojan called Titanium that can penetrate and control its target system. Because Titanium uses encryption and fileless technology and masquerades as a...