CALL US

+91 9116117170

Author: Chaitra V M

Cerberus – A New Android Malware

By Chaitra V M 0 Comment August 26, 2019

Cerberus is a new  Android banking trojan and has emerged as a new Malware-as-a-service.   Cerberus is a Remote Access Trojan were the infected Android devices, are taken control by remote attackers and have the capabilities of banking trojan like SMS control, harvesting of the contact list and the use of overlay attacks. Cerberus is developed […]

LokiBot Malware

Steganography Technique used by New LokiBot Malware

By Chaitra V M 0 Comment August 10, 2019

Lokibot is a malware which steals information by gathering sensitive data and credentials of login from the infected system. The malware is spread either through a malicious link or malicious mail. An email was detected that contained malicious attachment of LokiBot. The attachment had an Excel worksheet and ‘package.json’ labeled package. By running the excel […]

Clipsa Malware

What is Clipsa Malware | How Clipsa Steals Cryptocurrency and Credentials of WordPress

By Chaitra V M 0 Comment August 8, 2019

Clipsa is a malicious program that is categorized as a password stealer. Cybercriminals use it to steal credentials of poorly secured WordPress websites, cryptocurrencies and replace cryptocurrency addresses. XMRig cryptocurrency miners are designed to install in a few versions of Clipsa. Programs of this type use system resources to mine cryptocurrency. Over 43,000 attacks of […]

Email Phishing Scam

New Phishing Email Scams- “Confirm Your Unsubscribe” Request

By Chaitra V M 0 Comment August 7, 2019

Email Phishing Scams – An Unsubscribe confirmation request is a long-running scam email campaign that pretends to be seen an uptick recently. These emails should never be responded or clicked as they are designed to perform some type of scam or to harvest working email addresses. The scam aims to gather active email addresses which […]

New Ransomware

New Ransomware for Android Infect Its Victims uses SMS Spam

By Chaitra V M 0 Comment August 6, 2019

Hackers use different ways to breach into a smartphone using  viruses, malware, worms, Trojan horses, phishing, etc and gain access to the personal information. Android devices are targeted by a new ransomware family by spreading to other victims by sending text messages containing malicious links to the entire contact list. This ransomware malware differs than […]

error: Content is protected by Cyberops !!