Category: Malware

Bifrost malware

Bifrost Trojan Targets Linux with VMware Deception

A new Linux version of the Bifrost remote access trojan has emerged, employing a suite of novel camouflage techniques. Among its primary tools is a deceptive domain, mimicking the legitimate VMware. First identified two...

malicious packages

Lazarus Group Targets Python Developers with Malicious Packages

The North Korea-supported hacker group Lazarus has uploaded four malicious packages to the Python Package Index (PyPI) repository, aiming to infect developers’ systems with malevolent software. The implicated packages—“pycryptoenv,” “pycryptoconf,” “quasarlib,” and “swapmempool”—have been...

AMOS Stealer

Warning: AMOS Stealer Variant Targets macOS

Specialists at Bitdefender have discovered a new variant of the malicious software AMOS Stealer (or Atomic Stealer), one of the most prevalent cyber threats for macOS users over the past year. According to Bitdefender...

Xeno RAT

Open-Source Malware: The Xeno RAT Threat Exposed

A new advanced Remote Access Tool (RAT) named Xeno RAT has been published on GitHub. This Trojan, crafted in the C# programming language and compatible with Windows 10 and Windows 11 operating systems, offers...

Banking Trojans Google Cloud Run

Banking Trojans Surge on Google Cloud Run

Analysts warn that hackers have increasingly exploited the Google Cloud Run service for the widespread distribution of banking trojans such as Astaroth, Mekotio, and Ousaban. Google Cloud Run enables users to deploy front-end and...

SSH-Snake

Warning: SSH-Snake’s Stealthy Network Invasion

Cybersecurity specialists at Sysdig have unveiled a new malicious entity dubbed SSH-Snake, designed to stealthily search for private keys and navigate through a victim’s infrastructure, rendering it significantly more perilous than conventional viruses that...

Migo malware

Linux Servers Targeted in Redis Cryptomining Campaign

Experts from Cado Security have uncovered a new malicious campaign targeting Redis servers. Once initial access to the systems is secured, the attackers mine cryptocurrency on the compromised Linux-operated hosts. According to Matt Muir,...