Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

April 1, 2024 at 02:15AM The Android banking trojan Vultur has reappeared with enhanced features and sophisticated tactics to avoid detection, allowing remote manipulation and data harvesting. Distribution involves trojanized apps and a dropper-as-a-service operation. A similar transition was observed with the Octo trojan, offering advanced features and infecting thousands of devices, primarily in specific … Read more

Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites

March 18, 2024 at 08:45AM A new malware campaign using bogus Google Sites and HTML smuggling to distribute the AZORult malware for information theft has been discovered by cybersecurity researchers. The campaign employs stealthy tactics to bypass security controls, with findings revealing similar techniques used in recent phishing campaigns to disseminate other malware like Agent … Read more

TimbreStealer Malware Spreading via Tax-themed Phishing Scam Targets IT Users

February 28, 2024 at 03:21AM Mexican users have been targeted with tax-themed phishing lures since November 2023 to distribute a new Windows malware called TimbreStealer. The skilled authors use sophisticated tactics like geofencing and obfuscation to evade detection and ensure persistence. The malware harvests a wide range of data and targets various industries, with a … Read more

New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility

January 30, 2024 at 04:30AM Threat hunters have discovered a new campaign delivering the ZLoader malware, reappearing with significant changes after being dismantled in April 2022. The latest variant includes RSA encryption, updated domain generation algorithm, and is now compiled for 64-bit Windows. Its return poses a potential threat for new ransomware attacks, prompting increased … Read more

iLeakage Attack Exploits Safari to Steal Sensitive Data From Macs, iPhones

October 26, 2023 at 12:21PM Researchers have discovered a new side-channel attack called iLeakage that exploits Safari to extract sensitive information from Macs and iPhones. The attack requires the user to be lured to a malicious website, which then automatically opens the targeted site. The researchers demonstrated how it can steal passwords, Instagram credentials, email … Read more