Flexible-Ferret is an evasive variant being used in the “Contagious Interview” campaign that even upgraded Apple protections ...
The trojan has been used in attacks since mid-November 2024 to infect and remotely control systems and exfiltrate data such ...
DaggerFly’s Lunar Peek campaign is using a new malware strain, identified by FortiGuard Labs, to compromise Linux networks ...
The entire campaign is thus named “Hidden Risk”. The malware comes in multiple stages. The first stage is a dropper app, signed with a valid Apple Developer ID, which was revoked in the meantime.
While on the surface the app works as intended, in the background it delivers the Brunhilda malware dropper. This dropper drops three payloads, including two APKs and a DEX file which, after ...
A Chinese hacking group is hijacking the SSH daemon on network appliances by injecting malware into the process for ...
A 7-Zip vulnerability allowing attackers to bypass the Mark of the Web (MotW) Windows security feature was exploited by ...
The malware can also steal session cookies—an increasingly common technique to bypass multi-factor authentication by presenting as a trusted user on a different device. Brokewell’s dropper ...
When run, it typically decompresses the malware components hidden within the dropper file and executes them, sometimes without saving them on disk to avoid detection. The Trojan dropper may appear ...
The “ghost tapping” phone theft scam, also known as the Vultur banking Trojan, represents the latest evolution in sophisticated Android malware targeting mobile banking users. The attack builds upon ...