FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

New BunnyLoader Malware Variant Surfaces with Modular Attack Features

By: Newsroom β€” March 20th 2024 at 09:43
Cybersecurity researchers have discovered an updated variant of a stealer and malware loader called BunnyLoader that modularizes its various functions as well as allow it to evade detection. "BunnyLoader is dynamically developing malware with the capability to steal information, credentials and cryptocurrency, as well as deliver additional malware to its victims," Palo Alto Networks
☐ β˜† βœ‡ The Hacker News

DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software

By: Newsroom β€” November 29th 2023 at 05:55
A variant of a ransomware strain known as DJVU has been observed to be distributed in the form of cracked software. "While this attack pattern is not new, incidents involving a DJVU variant that appends the .xaro extension to affected files and demanding ransom for a decryptor have been observed infecting systems alongside a host of various commodity loaders and infostealers," Cybereason
☐ β˜† βœ‡ The Hacker News

New "Whiffy Recon" Malware Triangulates Infected Device Location via Wi-Fi Every Minute

By: THN β€” August 24th 2023 at 11:24
The SmokeLoader malware is being used to deliver a new Wi-Fi scanning malware strain calledΒ Whiffy ReconΒ on compromised Windows machines. "The new malware strain has only one operation. Every 60 seconds it triangulates the infected systems' positions by scanning nearby Wi-Fi access points as a data point for Google's geolocation API," Secureworks Counter Threat Unit (CTU)Β saidΒ in a statement
☐ β˜† βœ‡ The Hacker News

CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine

By: Ravie Lakshmanan β€” May 8th 2023 at 06:10
An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a polyglot file, according to the Computer Emergency Response Team of Ukraine (CERT-UA). The emails, per theΒ agency, are sent using compromised accounts and come with a ZIP archive that, in reality, is aΒ polyglot fileΒ containing a decoy document and a JavaScript file. The
❌