Joker Spyware
The malware “Joker” is spyware that gives malicious agents access to the victims’ SMS and contact list and other device information.
The malware “Joker” is spyware that gives malicious agents access to the victims’ SMS and contact list and other device information.
‘Bait & Switch’ is a type of fraud that uses relatively trusted avenues – ads – to trick users into visiting malicious sites. These attacks often occur in the form of advertising space being sold by websites and purchased by shady companies.
Bait & Switch attack Read More »
Gootkit is the name of a strain of malware. Hereinafter, we’ll be using the name Gootkit to refer to both the malware and the criminal group behind it. The malware was first spotted in the wild in 2014, and it’s been evolving ever since. In the beginning, Gootkit functioned as a banking trojan — all
TFlower is software categorized as ransomware. Unlike most ransomware-type programs, it does not change extensions of encrypted files. It does, however, create a ransom message (within a text file named “!_Notice_!.txt“) that contains instructions about how to purchase a decryption tool. Typically, programs such as TFlower encrypt (lock) files, which then cannot be accessed unless
TFlower Ransomware Read More »
Cryptomining malware, or cryptocurrency mining malware or simply cryptojacking, is a relatively new term that refers to software programs and malware components developed to take over a computer’s resources and use them for cryptocurrency mining without a user’s explicit permission.
Cryptomining Malware Read More »