Malware

GeneralNews

Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware

On October 15th 2020, a federal grand jury in Pittsburgh USA returned an indictment charging six computer hackers, all of

Read More
Security NewsNews

Joint NSA and FBI Cybersecurity Advisory Discloses Russian Malware Drovorub

The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165, is deploying previously

Read More
Security NewsNews

Phishing Emails Used to Deploy KONNI Malware

KONNI malware is often delivered via phishing emails as a Microsoft Word document with a malicious VBA macro code. The

Read More
Security NewsNews

New version of Chinese malware named Taidoor has been discovered

This discovery is the result of analytic efforts between the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of

Read More
Security NewsNews

Risk from Malware Targeting QNAP NAS Devices [QSnatch malware]

All QNAP NAS devices are potentially vulnerable to QSnatch malware if not updated with the latest security fixes. The malware,

Read More
Security NewsNews

GoldenSpy Malware Embedded in Official Golden Tax Software

During major fiscal reforms in 1994, China began a value-add tax (VAT) system requiring businesses to pay tax on the

Read More
Security NewsNews

SoreFang Malware

Malware, dubbed ‘SoreFang’ by the NCSC, is a first stage downloader that uses HTTP to exfiltrate victim information and download

Read More
Security NewsNews

Purple Fox Malware

Purple Fox is a combined fileless rootkit and backdoor trojan, that is also able to act as an exploit kit.

Read More
Security NewsNews

RATicate – information-stealing malware

Sophos has identified five separate campaigns between November, 2019 and January, 2020 in which the payloads used similar packing code

Read More
Security NewsNews

Ramsay Trojan designed to target air-gapped systems

Ramsay is a highly sophisticated information-stealing trojan and associated espionage framework capable of operating on air-gapped systems. First observed in

Read More