pirate chick vpn malware adware trojan antimalware solutions

Fake VPN Software Pushing Trojan Installation via Adware

A fake VPN going by the name of Pirate Chick VPN has been installing malicious payloads, including the AZORult password-stealing Trojan. On the surface, Pirate Chick VPN looks like any other legitimate VPN service, with a professional website and privacy policy available to read. There is even a free three-month trial available.   However, its...
Continue Reading
cryptostealing hijacking vidar malware bitcoin cryptocurrency

Crypto-stealing malware Vidar spreads via cloned cryptocurrency trading website

A malware researcher and a twitter user Fumik0_ has discovered a new website that is spreading crypto malware. This fake cryptocurrency trading website is masquerading as a legitimate service that delivers crypto-stealing malware trojan known as Vidar. This malware trojan is distributed through a site that impersonates CryptoHopper trading platform which allows users to build...
Continue Reading
phishing email scam

Phishing Email Scam Asks You to Login to Read Encrypted Message

Summary  New phishing campaign is in circulation requiring users to login to a fraudulent OneDrive site in order to unveil an encrypted message.    Analysis  A believed to be phishing emails with subject similar to ‘Encrypted Message Received’ and includes a link stating ‘View Encrypted Email’.  Message link will divert the user to a fake OneDrive...
Continue Reading
wordpress website joomla malcious scripts malware hacking hacker

New Malicious Script Poses Threat to WordPress and Joomla-based Websites

Cyber-security researchers are warning owners of Joomla and WordPress websites of a malicious redirect script that is pushing visitors to malicious websites and expose them to various malwares.   A renowned cyber-security researcher published a report outlining a rogue hypertext access (.htaccess) injector found on a client website. He reported that the impacted site was...
Continue Reading
black router iranian malware ransomware trojan blackrouter

Iranian Malware BlackRouter – evolved as a Ransomware

BlackRouter, a ransomware recognized in 2018 is currently being endorsed as a Raas by its maker. The individual behind BlackRouter, known as “MOH3NE2”, is accepted to be of Iranian origins.   This ransomware was identified by a cybersecurity scientist Petrovic and is found to have enhanced highlights, for example, a clock and an alternate GUI...
Continue Reading

Phishing Emails Pretend to be Office 365 ‘File Deletion’ Alerts

Deceptive phishing has been proliferating recently with campaigns appearing to come from the  “Office 365 Team”. Phishing emails are warning recipients that there has been an unusual amount of file deletions occurring on their account. The phishing campaign pretends to be a warning from the Office 365 service that states a medium-severity alert has been...
Continue Reading
google android malware trojans security backdoor

Google Android Confirms Smartphone Security Backdoor

Summary Triada Trojan has been found in the firmware of various low-cost Android devices, which could be used to steal sensitive data and run cyber espionage modules.   Analysis First seen in March 2016 and labelled as the most advance mobile Trojan during that time specifically engineered as Android banking trojan. Android system images were...
Continue Reading
hiddenwasp malware linux digital risk protection risk compliance

HiddenWasp malware seizes control of Linux systems

Summary  New found malware dubbed as HiddenWasp believed to be targeting linux ecosystem, developers of this malware deployed it to remotely control infected Linux systems. The malware is also established from key parts of code used in Mirai and Azazel rootkit. Surprisingly, HiddenWasp has a zero-detection rate in all anti malware program under Linux.    Analysis  This malware main goal is to take control of compromised...
Continue Reading
apple gatekeeper bug mac os mojave malware trojan

Gatekeeper Bug in MacOS Mojave Allows Malware to Execute

Summary  Researcher recently uncover bug in the macOS security feature Gatekeeper that allows malicious code execution on systems running the most recent version of Mojave (10.14.0) release. Included in macOS since 2012, the Gatekeeper security protection attempts to prevent malware from running on a Mac by enforcing code signing and verifying downloaded applications before execution.    Analysis  The...
Continue Reading

Data Wiping Malware hits Bahrain’s national oil company

On December 29, 2019, the National Cybersecurity Authority of Saudi Arabia published a new cyber-attack incident describing software that was deployed to target Bapco, the national oil company of Bahrain specifically. The malware, dubbed as “Dustman”, is a data-wiper, designed to access a computer, a database, or a server/mainframe, delete its data, and replace the...
Continue Reading
1 2 3 50