FakeBat Malvertising Active Campaigns
The threat actor behind FakeBat employs MSIX installers containing heavily obfuscated PowerShell code, utilizing various tactics to evade detection.
The threat actor behind FakeBat employs MSIX installers containing heavily obfuscated PowerShell code, utilizing various tactics to evade detection.
The PixPirate Android banking trojan employs a new technique to conceal its presence on compromised devices, enabling threat actors to harvest information
Phobos is a ransomware that locks or encrypts files to demand a ransom. It uses AES encryption which leaves no chance to recover the infected files.
Rhysida is a new ransomware strain that emerged in the second quarter of 2023. The first mention of the Rhysida ransomware was in May 2023 by MalwareHunterTeam.
Threat actors have initiated a campaign leveraging Facebook messages to disseminate Snake, a Python-based information stealer.
A newly discovered malware named 'WogRAT' is utilizing an online notepad platform called 'aNotepad' to facilitate its malicious activities.
Zscaler’s ThreatLabz uncovered a disturbing trend: a threat actor deploying fake Skype, Google Meet, and Zoom websites to disseminate malware.
Bitfrost collects the victim's hostname, IP address, and process IDs, then uses RC4 encryption to secure it before transmission to the C2.
BIFROSE malware are backdoors that often arrive on systems either downloaded by users when visiting malicious sites or downloaded by other malware/spyware.
A team of researchers from the Georgia Institute of Technology has created malware specifically tailored to exploit modern programmable logic controllers (PLCs)
© 2025 | CyberMaterial | All rights reserved