Jump to content

Search the Community

Showing results for tags 'malware'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station


  • Drivers
  • Filesharing
    • BitTorrent
    • eDonkey & Direct Connect (DC)
    • NewsReaders (Usenet)
    • Other P2P Clients & Tools
  • Internet
    • Download Managers & FTP Clients
    • Messengers
    • Web Browsers
    • Other Internet Tools
  • Multimedia
    • Codecs & Converters
    • Image Viewers & Editors
    • Media Players
    • Other Multimedia Software
  • Security
    • Anti-Malware
    • Firewalls
    • Other Security Tools
  • System
    • Benchmarking & System Info
    • Customization
    • Defrag Tools
    • Disc & Registry Cleaners
    • Management Suites
    • Other System Tools
  • Other Apps
    • Burning & Imaging
    • Document Viewers & Editors
    • File Managers & Archivers
    • Miscellaneous Applications
  • Linux Distributions

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

  1. Malware found on laptops given out by government Some of the laptops given out in England to support vulnerable children home-schooling during lockdown contain malware, BBC News has learned. Teachers shared details on an online forum about suspicious files found on devices sent to a Bradford school. The malware, which they said appeared to be contacting Russian servers, is believed to have been found on laptops given to a handful of schools. The Department for Education sai
  2. FreakOut malware exploits critical bugs to infect Linux hosts An active malicious campaign is currently targeting Linux devices running software with critical vulnerabilities that is powering network-attached storage (NAS) devices or for developing web applications and portals. The purpose is to infect machines with vulnerable versions of the popular TerraMaster operating system, the Zend Framework (Laminas Project), or Liferay Portal with FreakOut malware, which can help deploy a wide variety of cyberattacks. Hitting unpatched Linux systems The co
  3. Malware incidents on remote devices increase 52% of organizations experienced a malware incident on remote devices in 2020, up from 37% in 2019, a Wandera report reveals. Of devices compromised by malware in 2020, 37% continued accessing corporate emails after being compromised and 11% continued accessing cloud storage, highlighting a need for organizations to better determine how to configure business tools to ensure fast and safe connectivity for all users in 2021. Other findings In 2020, 28% of organizations were regularly utilizing an operat
  4. Introducing Malvuln.com – the first website ‘exclusively dedicated’ to revealing security vulnerabilities in malware One security researcher is turning the tide on attackers by posting high-impact zero-day vulnerabilities in the very malware that underpins their campaigns A pioneering malware vulnerability database has become a surprise addition to security pros’ defensive toolkits as they seek to disrupt, remediate, or attribute cyber-attacks. Launched on January 2, Malvuln.com provides exploit code for security flaws in malicious software in the same
  5. “Oski Stealer” Is a Widely-Used Cheap Yet Powerful Malware The “Oski Stealer” is getting more popular, as it’s a bargain for what it can do. The malware appears to be of Russian origin, and it’s mainly used by actors of the associated countries. Oski can steal sensitive information and credentials from over 60 different applications. There’s a piece of malware that has created some frenzy on the Russian parts of the dark web named “Oski Stealer.” The credential-stealing malware first appeared in November 2019, so it’s not exactly new, but it
  6. December 2020’s Most Wanted Malware: Emotet Returns as Top Malware Threat Our latest Global Threat Index for December 2020 has revealed that the Emotet trojan has returned to first place in the top malware list, impacting 7% of organizations globally, following a spam campaign which targeted over 100,000 users per day during the holiday season. In September and October 2020, Emotet was consistently at the top of the Global Threat Index, and was linked to a wave of ransomware attacks. But in November it was much less prevalent, dropping to 5th place in the Index. It has
  7. Hackers Using Fake Trump's Scandal Video to Spread QNode Malware Cybesecurity researchers today revealed a new malspam campaign that distributes a remote access Trojan (RAT) by purporting to contain a sex scandal video of U.S. President Donald Trump. The emails, which carry with the subject line "GOOD LOAN OFFER!!," come attached with a Java archive (JAR) file called "TRUMP_SEX_SCANDAL_VIDEO.jar," which, when downloaded, installs Qua or Quaverse RAT (QRAT) onto the infiltrated system. "We suspect that the bad guys are attempting to ride the frenzy brou
  8. Cross-platform ElectroRAT malware drains cryptocurrency wallets Security researchers have discovered a new remote access trojan (RAT) used to empty the cryptocurrency wallets of thousands of Windows, Linux, and macOS users. Named ElectroRAT after being discovered in December, the cross-platform RAT malware is written in Golang and it was used as part of a campaign that has been targeting cryptocurrency users since the start of 2020. Thousands infected within a year The attackers behind the ElectroRAT operation created and injected their RAT into cu
  9. Malware uses WiFi BSSID for victim identification Malware authors are using the WiFi AP MAC address (also known as the BSSID) as a way to geo-locate infected hosts. Image: Stephen Phillips Malware operators who want to know the location of the victims they infect usually rely on a simple technique where they grab the victim's IP address and check it against an IP-to-geo database like MaxMind's GeoIP to get a victim's approximate geographical location. While the technique isn't very accurate, it is still the most reliable method of determining a us
  10. Windows and Linux servers turned into crypto miners Another in growing trend of malware working across multiple platforms (Image credit: Shutterstock) Security researchers have discovered a new malware that installs a legitimate cryptocurrency mining program on poorly secured Windows and Linux servers. Intezer’s Avigayil Mechtinger, who specializes in malware analysis, has been tracking the multi-platform worm that installs XMRig Miner to mine the Monero cryptocurrency since early December. According
  11. The Emotet botnet is back and hits 100K recipients per day Emotet is back on Christmas Eve, cybercrime operators are sending out spam messages to deliver the infamous Trickbot Trojan. Emotet is back on Christmas Eve, after two months of silence, cybercrime operators are sending out spam messages to deliver the infamous Trickbot Trojan. The recent Emotet campaign uses updated payloads and is targeting over 100,000 recipients per day. “After a lull of nearly two months, the Emotet botnet has returned with updated payloads. The changes are likely meant
  12. 7 ways malware can get into your device You know that malware is bad, but are you also aware of the various common ways in which it can infiltrate your devices? Malware has been one of the most common threats that netizens face daily. However, although you have heard about the various types of malware you can encounter, chances are you don’t know how these malicious programs are able to infest your devices. While knowing what types of threats exist is the first step towards protecting yourself and your devices, the next and arguably more important step is to know h
  13. Microsoft issues warning about malware campaign infecting Chrome, Edge, and Firefox Cyberattacks have become rampant over the past few months, especially now that people are relying mostly on digital services in light of the ongoing pandemic. Now, Microsoft has shared details about a new malware campaign targeting major browsers such as Google Chrome, Microsoft Edge, Yandex, and Mozilla Firefox. The "Adrozek" family of browser modifiers has been active since May 2020, injecting advertisements into search results. These malware-inserted ads lead us
  14. Researchers link new malware attacks designed to install a backdoor onto compromised systems to Vietnamese-backed hacking operation OceanLotus. A newly discovered form of malware is targeting Apple MacOS users in a campaign which researchers say is tied to a nation-state backed hacking operation. The campaign has been detailed by cybersecurity analysts at Trend Micro who've linked it to OceanLotus – also known as APT32 – a hacking group which is thought to have links to the Vietnamese government. OceanLotus is known to targe
  15. Three years after the first malware attacks targeting Docker, developers are still misconfiguring and exposing their Docker servers online. Towards the end of 2017, there was a major shift in the malware scene. As cloud-based technologies became more popular, cybercrime gangs also began targeting Docker and Kubernetes systems. Most of these attacks followed a very simple pattern where threat actors scanned for misconfigured systems that had admin interfaces exposed online in order to take over servers and deploy cryptocurrency-mining malware. Ov
  16. The TrickBot cybercrime gang has released the hundredth version of the TrickBot malware with additional features to evade detection. TrickBot is a malware infection commonly installed via malicious phishing emails or other malware. When installed, TrickBot will quietly run on a victim's computer while it downloads other modules to perform different tasks. These modules perform a wide range of malicious activity, including stealing a domain's Active Directory Services database, spreading laterally on a network, screenlocking, stealing cookies and browser pas
  17. Zscaler says attacks involving the use of SSL/TLS encryption jumped 260% in the first nine months of 2020 compared to the same period last year. The fact that attackers hide malware inside encrypted traffic is not news any longer. What might be surprising, however, is just how much the practice has recently spiked due in part to the shift to remote work in the COVID-19 pandemic. Researchers from Zscaler analyzed attack data gathered from customers of the company's cloud security platform between January and September this year. The security vendor discovered
  18. After endless claims that supposed malware in pirate streaming apps is putting Internet users in peril, it's now time to bring these threats into the open. The challenge for anti-piracy groups is to actually start naming and shaming pirate apps that act maliciously. Given the reported grave threat, this should be simplicity itself. Over the past couple of years the big shift for anti-piracy groups everywhere is to claim that piracy apps are dangerous to users. According to the MPA, Digital Citizens Alliance, FACT, and countless other entitie
  19. Cybercriminals are relying on the same old tricks to secure their financial treats. Forget Halloween’s Michael Myers, malware threats are the real villains out there, hoping to trick you into giving away your money and personal data. Webroot has released its annual list of nastiest malware threats. The list reveals phishing, ransomware and botnets as 2020’s most vicious cybersecurity threats. And it’s no surprise that cybercriminals have taken advantage of the global pandemic. Furthermore, they’re relying on the same old tricks to secure
  20. The world of malware has a new rising star - and that's a big problem Buer loader paves the way for further malicious activity (Image credit: Pixabay) A new malware-as-a-service offering has been discovered by cybersecurity firm Sophos, providing an alternative to other well-known malware loaders like Emotet and BazarLoader. Buer, as the new malware has been dubbed, was first discovered in August 2019, when it was used to compromise Windows PCs, acting as a gateway for further attacks to follow. “Buer was first advertise
  21. GravityRAT, a malware strain known for checking the CPU temperature of Windows computers to detect virtual machines or sandboxes, is now multi-platform spyware as it can now also be used to infect Android and macOS devices. The GravityRAT Remote Access Trojan (RAT) has been under active development by what looks like Pakistani hacker groups since at least 2015 and has been deployed in targeted attacks against Indian military organizations. New versions infect Android and macOS devices While the malware authors previously focused their efforts on targeting Wind
  22. Facebook Shut Down Malware That Hijacked Accounts to Run Ads Hackers spent $4 million of victims' money to buy ads for diet pills, fake designer handbags, and more. SilentFade used a number of s sneaky tactics to go undetected, like turning off notifications for a victim's account.Photograph: Paul Linse/Getty Images Usually when you hear about malicious activity on Facebook it's tied up in geopolitical skulduggery of some sort. But on Thursda
  23. “Joker”—the malware that signs you up for pricey services—floods Android markets Dozens of malicious apps, some available in Play, found in the past couple months. Enlarge portal gda / Flickr 68 with 37 posters participating September has been a busy month for malicious Android apps, with dozens of them from a single malware family alone flooding either Google Play or third-party markets, researchers from security companies said. Known as Joker, this family of malicious apps has been attac
  24. Apple Accidentally Approved Malware to Run on MacOS The ubiquitous Shlayer adware has picked up a new trick, slipping past Cupertino's “notarization” defenses for the first time. Notarization can help Apple keep security pretty tight, but anything that does sneak past can then spread quickly because it has the company's imprimatur.Photograph: Mairo Cinquetti/NurPhoto/Getty Images For decades, Mac users had to worry less about malware than the
  25. NSA and FBI warn that new Linux malware threatens national security Previously unknown Drovorub is being used by advanced hacking group APT 28. Enlarge Suse The FBI and NSA have issued a joint report warning that Russian state hackers are using a previously unknown piece of Linux malware to stealthily infiltrate sensitive networks, steal confidential information, and execute malicious commands. In a report that’s unusual for the depth of technical detail from a government agency, officials
  • Create New...