ShellTea is a backdoor threat that was utilized in attempts to gain control over computers used by the hotel-entertainment industry. The attack happened during March and May of 2019. It is believed that the malicious application's creators are cybercriminals from
Continue reading 0 CommentsBOOSTWRITE Drops CARBANAK and RDFSNIFFER to Attack Banks
Cybercriminals cannot just will malware into attacking operating systems. They need help, and tools like BOOSTWRITE can make things much easier. This infection is a Trojan, and so it slithers into operating systems silently, but once inside, it is meant
Continue reading 0 CommentsSkidmap Attacks Linux Systems to Mine Cryptocurrencies
Skidmap is a malicious application you should watch out for if you are a Linux user. This recently discovered threat appears to be very sophisticated. It can drop a cryptocurrency-mining malware on a system, hide its presence from the user,
Continue reading 0 CommentsPorn Blackmail Removal Guide
Do you know what Porn Blackmail is? Porn Blackmail is a sextortion scam that is used to trick people into thinking they have done something illegal, and now they have to pay to avoid being charged with criminal offence. Needless
Continue reading 0 CommentsThe Summer Olympics Are Just Around the Corner, and Olympic Destroyer Might Be Too
The Winter Olympics held in Pyeongchang, South Korea, are long gone and almost forgotten. In fact, the Summer Olympics that will be held in Tokyo, Japan, are just around the corner. With only a couple of months left, we need
Continue reading 0 CommentsNorth Korea Nuclear Issues Exploited by BabyShark Trojan
BabyShark is a dangerous Trojan infection, and its cutesy name definitely does not reflect its true nature. If it invades an operating system, it can gather information and relay it back to the cybercriminals who created the threat. It appears
Continue reading 0 CommentsVBShower
Do you know what VBShower is? VBShower refers to a series of phishing attacks that are closely related to Cloud Atlas. Cloud Atlas is associated with a number of espionage attacks against various countries in several regions. It is common
Continue reading 0 CommentsOmegle Phishing Virus Is an Instrument of Cyber Attackers
Whether you decide to use Omegle once or you do it frequently, you need to look out for the Omegle Phishing Virus. It is not a formed infection per se, but it is a scheming device that could be used
Continue reading 0 CommentsMonokle Spyware Uses Trojanized Apps to Slither In
Monokle is not a new infection, but malware researchers have recorded its resurgence lately. It is believed that this malicious infection was built back in 2015 and that it started spreading across devices in 2016. Clearly, no one has been
Continue reading 0 Comments