Trojanized

Cyber security

Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging Apps

[ad_1] Mar 07, 2023Ravie LakshmananSpyware / Cyber Espionage A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe…

Read More »
Cyber security

Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware

[ad_1] Feb 23, 2023Ravie LakshmananEndpoint Security / Cryptocurrency Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency…

Read More »
Cyber security

Trojanized Windows 10 Installer Used in Cyberattacks Against Ukrainian Government Entities

[ad_1] Government entities in Ukraine have been breached as part of a new campaign that leveraged trojanized versions of Windows…

Read More »
Cyber security

North Korean Hackers Spreading Trojanized Versions of PuTTY Client Application

[ad_1] A threat with a North Korea nexus has been found leveraging a “novel spear phish methodology” that involves making…

Read More »
Cyber security

New SEO Poisoning Campaign Distributing Trojanized Versions of Popular Software

[ad_1] An ongoing search engine optimization (SEO) poisoning attack campaign has been observed abusing trust in legitimate software utilities to…

Read More »
Cyber security

North Korean Hackers Target Cybersecurity Researchers with Trojanized IDA Pro

[ad_1] Lazarus, the North Korea-affiliated state-sponsored group, is attempting to once again target security researchers with backdoors and remote access…

Read More »
Back to top button
Close