Chameleon Android Banking Trojan Variant Bypasses Biometric Authentication

December 21, 2023 at 12:18PM Cybersecurity researchers identified an updated version of Android banking malware “Chameleon,” which expanded its targeting to include users in the U.K. and Italy. The malware excels in executing Device Takeover using the accessibility service and is now being delivered via Zombinder. The latest findings also revealed its ability to disrupt … Read more

Hackers Abusing GitHub to Evade Detection and Control Compromised Hosts

December 19, 2023 at 08:39AM Threat actors are using GitHub for malicious activities, including hosting malware and delivering malicious commands via secret Gists and git commit messages. The use of legitimate public services allows threat actors to bypass detection tools. These novel methods can blend malicious traffic with genuine communications, making it harder to detect … Read more

New NKAbuse Malware Exploits NKN Blockchain Tech for DDoS Attacks

December 15, 2023 at 01:24AM A new threat named NKAbuse has emerged, using the decentralized NKN network for communication. The malware leverages NKN technology to conduct DDoS attacks and function as an implant in compromised Linux systems, with potential expansion into IoT devices. NKAbuse lacks self-propagation and integrates backdoor features, making it a serious security … Read more

Lumma Stealer malware now uses trigonometry to evade detection

November 20, 2023 at 09:42AM The Lumma information-stealing malware is using a unique method to avoid detection. It measures mouse movements using trigonometry to determine if it is operating on an actual machine or in an antivirus sandbox. This version of the malware also includes control flow obfuscation, XOR encrypted strings, and other evasion techniques … Read more