Glitch POS Malware
The POS malware is being sold by cyber criminals on a crimeware forum. A phishing email that includes a fake game featuring a cute cat is leveraged to distribute the malware.
Glitch POS Malware Read More »
The POS malware is being sold by cyber criminals on a crimeware forum. A phishing email that includes a fake game featuring a cute cat is leveraged to distribute the malware.
Glitch POS Malware Read More »
Trojan-Dropper is Software that injects Trojans, viruses, worms and other malware into a computer. When run, it typically decompresses the malware components hidden within the dropper file and executes them, sometimes without saving them on disk to avoid detection. The dropper is Malwarebytes’ generic detection name for trojans that drop additional malware on an affected
Trojan-Dropper Malware Read More »
Baldr is the name of a new family of information-stealing malware. Its authors first introduced it to cybercriminal circles in January, and about a month later, Microsoft’s security team reported that they have seen it in the wild. Bill Gates’ specialists said that the stealer is ‘highly obfuscated’ which usually suggests that someone has put
Baldr – Information Stealing Malware Read More »
RIDL stands for Rogue In-Flight Data Load. RIDL is also known to use MFBDS in addition to MLPDS to acquire data. Attackers can execute code using cloud resources, malicious websites or advertisements and can steal data by breaking any security barriers. RIDL (Rogue In-Flight Data Load) shows attackers can exploit MDS vulnerabilities to mount practical
RIDL (Rogue In Flight Data Load) Read More »
PushDo Trojan is a downloader trojan responsible for downloading its spam counterpart and other malicious Trojans. Since its beginning, it has evolved into many different versions and in this blog post, we will make a deeper analysis of it.