Malware

22 Results / Page 2 of 3

Background

Malware + Ransomware + Dark Web + Breach + Cyber security + News Mjolnir Security / March 20, 2023

Cl0p Ransomware Group Exploits GoAnywhere Zero-Day: How Mjolnir Security’s Solution Outshines Conventional Security Tools

Introduction The cyber threat landscape is constantly evolving, and ransomware groups like Cl0p are consistently finding new ways to exploit vulnerabilities in the digital world. Recently, the Cl0p ransomware group targeted GoAnywhere, a popular Managed File Transfer (MFT) solution, exploiting a zero-day vulnerability. In this blog post, we will discuss ...

News + Malware + Botnet + Ransomware Mjolnir Security / March 18, 2023

Emotet’s New Strategy: Exploiting Microsoft OneNote to Spread Malware and How Mjolnir Security Can Help

Introduction Emotet, a notorious banking Trojan, has been wreaking havoc in the cybersecurity world for years. With its sophisticated and ever-evolving techniques, this malware has become a significant threat to individuals and organizations alike. In this blog post, we’ll discuss how Emotet is now utilizing Microsoft OneNote to spread its ...

Breach + Cyber security + Cybercrime + News + Malware + Ransomware + APT + Threat Intelligence Mjolnir Security / November 28, 2022

Qakbot Malware Used By Black Basta In Series of Ransomware Attacks

Qakbot Malware Attacks Resurrected By Black Basta Hacker Collective Qakbot Malware Utilized as a Means of Cyber Extortion in Canada Qakbot malware and ransomware attacks have soared across the globe as a new hacker group known as “Black Basta” has targeted a number of Canadian corporations. Qakbot ransomware sometimes referred ...

todayFebruary 3, 2021

  • 223
  • 1
Featuredstar
close

Ransomware + News + Malware + Botnet Mjolnir Security

Fall of Emotet

On January 27, 2021, news broke from Europol that a collaborative effort had effectively taken down and disrupted one of the most significant botnets in the past decade – Emotet. This global action and collaborative initiative incorporated authorities in the Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, ...

todayAugust 3, 2019

  • 166
close

News + Malware + Botnet + Threat Intelligence Mjolnir Security

Resurgence of Zeus

Zeus, ZeuS, or Zbot is a Trojan horse malware package that runs on various versions of Microsoft Windows. While it can be used to carry out many malicious and criminal tasks, it is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. In a blog post ...

Mjolnir Security Torri Botnet IOC

todaySeptember 29, 2018

  • 247
  • 1
close

News + Malware + Botnet + Exploits + Threat Intelligence + IoT + Business Mjolnir Security

Torii Botnet

Security researchers at Avast have discovered a new malware strain that uses comes with a quite rich set of features for exfiltration of (sensitive) information, modular architecture capable of fetching and executing other commands and executables and all of it via multiple layers of encrypted communication named Torii. We have already ...

Hidden Cobra Mjolnir Security

todayMay 30, 2018

  • 263
close

News + Malware + APT + Threat Intelligence Mjolnir Security

North Korean Malicious Cyber Activity: HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm

Backdoor.Joanap is a malicious program which is developed by cyber criminals to gain illegal income. It uses several stealthy ways to get inside the targeted computer and after successful invasion it carry out several malicious activities. According to a research this malware hides its executable in INI and CNF files ...

todayMay 23, 2018

  • 119
close

News + Malware + Botnet + Threat Intelligence + IoT Mjolnir Security

VPNFilter Malware targets over half a million networking devices worldwide

A new malware known as VPNFilter capable of targeting a range of routers and NAS devices rendering infected devices unusable and also capable of maintaining a persistent presence on an infected device, even after a reboot. VPNFilter has a range of capabilities including spying on traffic being routed through the ...