Search

Nalezeno "Malware": 449

Hackers are selling counterfeit phones with crypto-stealing malware


Cybersecurity firm Kaspersky says it has uncovered thousands of counterfeit Android smartphones sold online with preinstalled malware designed to steal crypto and other sensitive data. The Android devices are sold at reduced prices, cybersecurity firm Kaspersky Labs said in an April...

Android malware ‘Crocodilus’ can take over phones to steal crypto


Cybersecurity firm Threat Fabric says it has found a new family of mobile-device malware that can launch a fake overlay for certain apps to trick Android users into providing their crypto seed phrases as it takes over the device. Threat Fabric analysts said in a March 28 report that the Crocodilus...

Android malware ‘Crocodilus’ can take over phones to steal crypto


Cybersecurity firm Threat Fabric says it has found a new family of mobile-device malware that can launch a fake overlay for certain apps to trick Android users into providing their crypto seed phrases as it takes over the device. Threat Fabric analysts said in a March 28 report that the Crocodilus...

Understanding recent credential leaks and the rise of InfoStealer malware


Opinion by: Jimmy Su, Binance chief security officerThe threat of InfoStealer malware is on the rise, targeting people and organizations across digital finance and far beyond. InfoStealers are a category of malware designed to extract sensitive data from infected devices without the victim’s...

StilachiRAT malware: How it targets crypto wallets on Chrome


What is StilachiRAT malware? In November 2024, Microsoft Incident Response researchers uncovered a remote access Trojan (RAT) called StilachiRAT. This discovery highlights the evolving nature of cyber threats, with the malware combining multiple malicious...

StilachiRAT malware: How it targets crypto wallets on Chrome


What is StilachiRAT malware? In November 2024, Microsoft Incident Response researchers uncovered a remote access Trojan (RAT) called StilachiRAT. This discovery highlights the evolving nature of cyber threats, with the malware combining multiple malicious...

Fake CAPTCHA Forces Users to Run Malware Disguised as Verification Text


Fake CAPTCHA pages tricked users into pasting malware-laced commands into Windows Run, launching stealth attacks that silently deployed infostealers undetected. Deceptive CAPTCHA Pages Deploy Stealth Malware Using Windows Run Exploit Cybersecurity analysts in New Jersey flagged an alarming malware...

New Malware Is Draining Crypto Wallets Through Google Chrome


New malware is attacking cryptocurrency users, stealing wallet credentials and financial data by bypassing Chrome’s encryption and monitoring clipboard activity to intercept and redirect transactions. New Malware Targets Crypto Users, Stealing Wallet Credentials and Financial Data A newly...

New MassJacker malware targets piracy users, steals crypto


A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking...

New MassJacker malware targets piracy users, steals crypto


A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking...

New MassJacker malware targets piracy users, steals crypto


A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking...

Lazarus Group sends 400 ETH to Tornado Cash, deploys new malware


North Korean-affiliated hacking collective the Lazarus Group has been moving crypto assets using mixers following a string of high-profile hacks. On March 13, blockchain security firm CertiK alerted its X followers that it had detected a deposit of 400 ETH (ETH) worth around $750,000 to...

ISPs Targeted in Massive Info Stealing and Cryptomining Malware Campaign


Crypto hackers have set their sights on internet service providers (ISPs). According to a technical report from Splunk, a Cisco security and observability platform, a massive attack campaign involving addresses in Eastern Europe targeted over 4,000 addresses corresponding to ISPs in China and...

Hackers Using Github to Steal Crypto—Malware Hidden in Open Source


A stealthy malware campaign is hijacking crypto wallets by embedding malicious code in fake open-source projects on Github, tricking developers into executing hidden payloads. Stealthy Malware on Github Is Hijacking Crypto Wallets A recently uncovered cyber campaign known as Gitvenom has been...

Monero Mining Malware Hits Users Downloading Game Torrents


According to Kaspersky, the campaign started last December, targeting users who are downloading torrents of popular games with a silent install of XMRig, a monero mining program. Crypto Malware Targets Gamers: Monero Mining Payload Delivered via Popular Game Torrents Hackers are now targeting...

Nahoru
Tento web používá k poskytování služeb a analýze návštěvnosti soubory cookie. Používáním tohoto webu s tímto souhlasíte. Další informace