PlugX malware deleted from thousands of systems by FBI
The FBI has announced it’s deleted PlugX malware from approximately 4,258 US-based computers and networks.
Read moreThe FBI has announced it’s deleted PlugX malware from approximately 4,258 US-based computers and networks.
Read moreCredit to Author: Daria Ivanova| Date: Wed, 06 Dec 2023 19:41:34 +0000
Attackers send companies Remcos RAT under the guise of emails from a new client —hiding malware in Discord attachments.
Read moreCategories: Threat Intelligence Tags: fakeupdates Tags: socgholish Tags: netsupport Tags: RAT A new campaign leveraging compromised WordPress sites emerges with another fake browser update. |
The post FakeSG enters the ‘FakeUpdates’ arena to deliver NetSupport RAT appeared first on Malwarebytes Labs.
Read moreCredit to Author: Alanna Titterington| Date: Thu, 29 Jun 2023 09:38:20 +0000
Hackers’ favorite social engineering schemes: tech support calls; business email compromise; conversation hijacking; fake data requests.
Read moreCategories: News Tags: RAT Tags: ukraine Tags: trojan Tags: arrest Tags: game Tags: application Tags: fake We take a look at news of an arrest in Ukraine regarding the creator of a remote access trojan. |
The post Malware creator who compromised 10,000 computers arrested appeared first on Malwarebytes Labs.
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 08 Aug 2022 11:38:31 +0000
The most important and interesting computer security stories from the last week.
The post A week in security (August 1 – 7) appeared first on Malwarebytes Labs.
Read moreCredit to Author: Threat Intelligence Team| Date: Wed, 03 Aug 2022 21:25:52 +0000
The Malwarebytes Threat Intelligence team has discovered a new Remote Access Trojan that we dubbed Woody Rat used to target Russian entities.
The post Woody RAT: A new feature-rich malware spotted in the wild appeared first on Malwarebytes Labs.
Read moreCredit to Author: Anastasia Starikova| Date: Mon, 25 Jul 2022 15:50:47 +0000
Examples of how cybercriminals gain access to company infrastructure using social engineering rather than malware.
Read more