Tag: Families
-
A Comprehensive Overview on Stealer Malware Families
Over the last seven years, there has been a noticeable increase in the sale and use of stealers’ malware, sold on underground forums …
-
US Lawmakers Want to Use a Powerful Spy Tool on Immigrants and Their Families
Legislation set to be introduced in Congress this week would extend Section 702 surveillance of people applying for green cards, asylum, …
-
ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware Families
Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have leveraged as …
-
DotRunpeX Malware Injector Widely Delivers Known Malware Families to Attack Windows
DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware …
-
DotRunpeX: The Malware That Infects Systems with Multiple Families
Currently, DotRunpeX malware appears to be primarily distributed through phishing emails and malicious Google Ads, presenting a significant …
-
New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads
A new piece of malware dubbed dotRunpeX is being used to distribute numerous known malware families such as Agent Tesla, Ave Maria, BitRAT, …
-
North Korean UNC2970 Hackers Expands Operations with New Malware Families
A North Korean espionage group tracked as UNC2970 has been observed employing previously undocumented malware families as part of a …
-
Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
Microsoft has shed light on four different ransomware families – KeRanger, FileCoder, MacRansom, and EvilQuest – that are known to …
-
Vice Society Ransomware Gang Attack Schools with Multiple Ransomware Families
As the 2022–23 school gets started and malicious ransomware groups see prospects for successful operations, the CSA continued to predict …
-
New Malware Families Found Targeting VMware ESXi Hypervisors
Threat actors have been found deploying never-before-seen post-compromise implants in VMware’s virtualization software to seize control of …
●●●