Category: ➽Botnet

  • The Rise of Stealer Logs in 2024

    The Rise of Stealer Logs in 2024

    Among the many cyber threats out there, a category of malicious software tools has emerged as a pervasive and insidious danger. These tools, commonly referred to as “stealers,” are designed by cybercriminals to infiltrate computers and surreptitiously extract sensitive data. The malware operates in the background, gathering details like login credentials, personal information (such as…

  • Swiss Government and Bank System Under Siege

    Pro-Russian Cyber Group “NoName” Attacks and Leaves Unresponsive Dozens of Swiss Websites On Monday, June 12, 2023, the Swiss government and several state-linked companies fell victim to a series of cyber-attacks, rendering their websites inaccessible. The finance ministry of Switzerland confirmed the incident, stating that federal administration specialists were quick to notice the attack and…

  • The Rise of AI Malware: How to Protect Yourself

    AI Enthusiasts gradually become #1 target for cybercriminals Over the years, malware operators have continuously adapted their strategies to capitalize on emerging trends and exploit new vulnerabilities. In the past, they primarily relied on distributing classic “keygen.exe” programs through platforms like YouTube, file sharing and custom fake websites, preying on users seeking free software or…

  • REvil ransomware is back?

    Back in January 2022 we were writing that REvil ransomware servers were seized by FBI and some of cyber criminals behind it have been arrested. However, less than four months later ransomware’s Tor page, “Happy blog”, came back to life. More surprisingly, REvil posted information about new victims: Visotec Group and Oil-india.com. It’s unclear whether…

  • New Stealer Malware “META” Spread in Email Campaign

    The new META malware, a new stealer malware appears to be rising in popularity among cybercriminals. Darknet users advertise new malware as an “improved RedLine” version. RedLine has been known for stealing user information, such as browser-saved credentials, browser history, credit cards, cryptocurrency wallet access, cookies, desktop files, gaming credentials and desktop screenshots among other…