Dr. Web discovers Linux Trojan [Linux.BackDoor.Irc.16] Using Mozilla Rust language

Linux.BackDoor.Irc.16 is a typical program that execute commands by cyber criminals through the Internet Relay Chat protocol. It is connected to the public chat channel specified in its configuration and awaits its instructions. It...

CallJam – Latest Android Malware on Google Play Store

Today, there are lost of malicious application available online and it is a tough thing to keep your Android smartphone and tablets safe from them. However, Google has put lots of effort to keep...

Open Sale of GovRAT 2.0 Has Begun – Built to Attack On US Government

Bestbuy and POM both hackers are best known for selling  GovRAT 2.0 on TheRealDeal website . GovRAT 2.0 is a improved version of GovRAT, has been used by hackers to target Government agencies in...

Gugi, Mobile Banker Trojan Rising in Russia

A banking Trojan so called Trojan-Banker.AndroidOS.Gugi.c, in short Gugi that appear on the threat landscape during 2015 which is discovered by kaspersky initially. The Trojan is spreading across Russia presently having infected 93 percent...

Secret Revealed : ‘DualToy’ Trojan Responsible For Sideloading Apps on Android and iOS Devices

Being activated on January 2015, DualToy has been notified as a dangerous Trojan infection that along with damaging the targeted computer system also contain the capability of compromising some other devices. This infection at...

“CRY” Ransomware converts the files in .PNG & Uploads to Free Image Uploading sites

Recently a brand new ransomware is discovered by the MalwareHunter team that known by Crylocker. This ransomware is spotted by the researchers in end of the August 2016. Cry ransomware uses UDP instead of...

Darktrack(RAT) is Free : One of the Best among Free & Commercial Remote Access...

RAT stands for Remote Access Trojan which has been developed by Luckyduck. Luckyduck delivers various commercial RATs but among all Darktrack is one of the most popular and best freely offered RAT in this...

Mal/Miner-C aka PhotoMiner targets Seagate Device

Years aren't far away when the coin mining was quite a bubbling rumor. Several malicious infection supposed to use the junked devices to mine theses cryptocurrencies against to make the profit from victims. And...

Philadelphia upgraded version of Stampado offers free decryption

As due to change in world economic system, communication system is changed means it converted to digitization. It is the time of digitization therefore people stored their sensitive information in hard drives of system...

Shark Ransomware Re-branded as Atom Affiliate Network Attracting Hackers

Owing to excessive tarnishing that kept Shark ransomware at receiving ends, its developers were forced to come up with some thing different. This is quite evident from the Atom model, which is yet another...