Two more malicious Python packages in the PyPI

We used our internal automated system for monitoring open-source repositories and discovered two other malicious Python packages in the PyPI. They were masquerading as one of the most popular open-source packages named “requests“. Continue reading Two more malicious Python packages in the PyPI

Threat in your browser: what dangers innocent-looking extensions hold for users

In this research, we observed various types of threats that mimic useful web browser extensions, and the number of users attacked by them. Continue reading Threat in your browser: what dangers innocent-looking extensions hold for users

IT threat evolution in Q2 2022. Mobile statistics

In Q2 2022, we detected 405,684 mobile malware installation packages, of which 55,614 packages were related to mobile banking trojans, and 3,821 packages were mobile ransomware trojans. Continue reading IT threat evolution in Q2 2022. Mobile statistics

IT threat evolution Q2 2022

ToddyCat APT and WinDealer man-on-the-side attack, Spring4Shell and other vulnerabilities, ransomware trends and our in-depth analysis of the TTPs of the eight most widespread ransomware families. Continue reading IT threat evolution Q2 2022

New DawDropper Malware Targeting Android Devices via Play Store

By Waqas
According to Trend Micro researchers, the DawDropper aims at stealing user data, in particular from banking apps on…
This is a post from HackRead.com Read the original post: New DawDropper Malware Targeting Android Devices via Play Store
Continue reading New DawDropper Malware Targeting Android Devices via Play Store

QBot Malware Exploiting Windows Calculator to Compromise Devices

By Deeba Ahmed
According to researcher “ProxyLife” on Twitter, QBot malware, aka QakBot, has been exploiting the Windows 7 Calculator app…
This is a post from HackRead.com Read the original post: QBot Malware Exploiting Windows Calcul… Continue reading QBot Malware Exploiting Windows Calculator to Compromise Devices

APT ToddyCat

ToddyCat is a relatively new APT actor responsible for multiple sets of attacks against high-profile entities in Europe and Asia. Its main distinctive signs are two formerly unknown tools that we call ‘Samurai backdoor’ and ‘Ninja Trojan’. Continue reading APT ToddyCat