Malware

Home / Security / Malware

Linux Trojan Linux.Mirai Source Code Leaked

The malicious program first appeared in May 2016, detected by Doctor Web after being added to its virus database under the name Linux.DDoS.87 and Linux.DDoS.89. The Trojan can work with with the SPARC, ARM, MIPS, SH-4, M68K architectures and Intel x86 computers. It has similar features as Linux.BackDoor.Fgt, a backdoor that was found infecting Linux [...]

By | October 3rd, 2016|Attacks, Malware, Security|

RAUM Tool Allows Malware To Spread In Torrents

Researchers at InfoArmor have uncovered a new tool that allows cybercriminals to package malware into popular torrent files. This new tool is called RAUM and is believed to have been created by an Eastern European crime group by the name of Black Team. The new tool uses a "pay-per-install" model which is only available in [...]

By | September 22nd, 2016|Malware, Security|

New Variant of iSpy Keylogger Distributed Via Spam Email

Security researchers at zScaler have come across a new variant of a commercial keylogger called iSpy. This new variance not only captures victim’s keystrokes, but it can also take screenshots, access their webcam, and steal user data and license keys to popular applications. We call it a commercial keylogger because it actually has a subscription [...]

By | September 22nd, 2016|Malware, Security|

Miner-C Malware Infects Seagate Central NAS Devices

Malware researchers from security firm Sophos have analyzed a new strain of malware detected as Mal/Miner-C that was designed to abuse resources of the infected machine to mine Monero (XMR) cryptocurrency. The experts discovered that the new malware leverages network-attached storage (NAS) devices as attack vector. The authors of Mal/Miner-C used the NSIS (Nullsoft Scriptable [...]

By | September 12th, 2016|Malware, Security|

Luabot Malware Turning Linux Based IoT Devices into DDoS Botnet

The IT security researchers at MalwareMustDie have discovered a malware that is capable of infecting Linux-based Internet of Things (IoT) devices and web servers to launch DDoS attacks, called Linux/Luabot. Earlier this week we reported on a similar malware BASHLITE. It is written in the Lua programming language which can infect a system and issue [...]

By | September 9th, 2016|Malware, Security|

BackDoor.TeamViewerENT.1 – TeamViewer Trojan Can Spy On You

There have been some trojans that install malicious versions of the TeamViewer software circulating since 2011. Dr. Web has posted a new iteration of this tojan, calling it BackDoor.TeamViewerENT.1. All iterations of this trojan have been distributed under the name Spy-Agent. The Trojan is used to install additional malware such as keyloggers and form grabbers [...]

By | September 6th, 2016|Malware, Security|

BASHLITE Malware Infects Over 1 Million IoT Devices

Level 3 Threat Research Labs tracked a family of malware, variously called Lizkebab, BASHLITE, Torlus and Gafgyt, that is capable of causing IoT-based DDoS attacks. Most of the infected IoT devices are digital video recorders (DVRs). What is BASHLITE? Bashlite can brute force a vulnerable device and steal its login credentials and distributes itself on [...]

By | September 2nd, 2016|Malware, Security|
Load More Posts