Lokibat
The LokiBot Android Trojan was first seen in February 2016 and is considered one of the first instances where malware could infect devices and settle inside the core Android operating system processes.
The LokiBot Android Trojan was first seen in February 2016 and is considered one of the first instances where malware could infect devices and settle inside the core Android operating system processes.
Gootkit is an advanced banking Trojan first discovered in mid-2014. Known for using various techniques to evade detection, the malware also has its own unique methods: it’s partially written in JavaScript and it incorporates the node.js runtime environment.
The malware “Joker” is spyware that gives malicious agents access to the victims’ SMS and contact list and other device information.
Gootkit is the name of a strain of malware. Hereinafter, we’ll be using the name Gootkit to refer to both the malware and the criminal group behind it. The malware was first spotted in the wild in 2014, and it’s been evolving ever since. In the beginning, Gootkit functioned as a banking trojan — all
TFlower is software categorized as ransomware. Unlike most ransomware-type programs, it does not change extensions of encrypted files. It does, however, create a ransom message (within a text file named “!_Notice_!.txt“) that contains instructions about how to purchase a decryption tool. Typically, programs such as TFlower encrypt (lock) files, which then cannot be accessed unless
TFlower Ransomware Read More »