Category Archives: Badware News
Android Users Beware: MonitorMinor Can Be Used to Spy on You
Have you used MonitorMinor to spy on someone? Or did you discover it installed on your own device? In the latter case, someone was using the app to spy on you. In any case, this tool is unreliable, incredibly intrusive, and quite possibly, illegal to use. That is because this application gives the spy – which is the person using it – immense power. It can help them read messages and emails, record audio, and spy on the victim via the camera. Without a doubt, this is not the tool that could be installed and used willy-nilly. ...
ShellTea
ShellTea is a malicious application that could be used for attacks on PoS (Point-of-Sale) systems that remain to be one of the top cybercriminals’ targets. This sophisticated tool might be able to hide from standard analysis tools by hashing most of its functions. Consequently, detecting it may not be an easy task. While hiding in a system, it can perform various tasks, such as launch executable files, execute PowerShell commands, spy on the victim, and so on. If you want to know who could be targeted by this threat, how the malware works, and how it could be spread, we invite you to read our full report. If you have any questions, you can ask them in the comments section located at the end of this page. ...
WatchBog Attacks Linux Systems and Threatens Windows Systems Too
Vulnerabilities within your operating system can help WatchBog and thousands of other malicious infections to slither in. According to recent statistics, new malware is released every 7 seconds, and more and more infections emerge every single year. At the same time, more and more security tools and measures become available to users, and that means that cybercriminals have to be smart and come up with new ways to attack operating systems. Now, we start seeing malware that might cross over from one operating system to the next. ...
'My Trojan Captured All Your Private Information Email' Scam
'My Trojan Captured All Your Private Information Email' Scam is an old spam email campaign that is designed to trick gullible users into doing whatever the schemers want them to do. The good news is that your computer is not infected if you receive this spam email. The bad news is that such spam campaigns are very good at steering unsuspecting users into the direction they want. Although there usually isn’t anything to remove when you want to get rid of 'My Trojan Captured All Your Private Information Email' Scam, you should still employ the basic cybersecurity measures. ...
Cybercriminals Drop a Monero Miner onto Linux Systems Using Skidmap Malware
Linux users need to listen up – a malicious Trojan capable of injecting and concealing a cryptocurrency miner is off the leash. Skidmap is its name, and the actors behind this threat are unknown. It is also unknown if they have specific targets or if they are going after any vulnerable operating system. Without a doubt, vulnerable systems that have not been updated and whose security backdoors and flaws had not been fixed are the ones that are most likely to be susceptible to this malware. Unfortunately, the infection slithers in silently, it uses different functionalities to conceal itself, and it acts without alerting the user or security systems. Due to this, it might stay unnoticed for a long time. Once it is detected, the removal of this infection must not be delayed. Unfortunately, deleting Skidmap is not a walk in the park. ...
Porn Blackmail
Porn Blackmail is not a direct computer infection. It is a scam that tries to push scared users into clicking a link they receive in a spam email. If you receive this message, it doesn’t mean that your computer has been infected with anything. Although it would be a good idea to scan your system with a reliable antispyware scanner to make sure that everything is okay. To put it simply, you do not need to remove Porn Blackmail because it is not on your computer. All you have to do is delete the email that carries it and be done with it. ...
Torii Botnet
Botnets have been known to malware researchers for a long time, but such sophisticated botnets as Torii Botnet are not uncovered every day. Avast researchers say that it differs from ordinary botnets they have analyzed during their career quite a lot. First of all, they have pointed out that Torii Botnet is much more sophisticated if compared to older malware that has been placed under the botnet category. What else distinguishes it from similar threats is that it uses advanced techniques to infect devices. Third, researchers suspect that this malicious application might be used to launch any commands on affected devices. ...
Spear-Phishing Attacks Spread FreeHosting APT PowerSploit Poison Ivy
Although Poison Ivy has been around for quite some time now, it keeps adapting and using new attack methods and security backdoors to spread and take over vulnerable operating systems. Last year, we saw that the attackers behind this threat were using health.pro.demo30@gmail.com and wisers.data@gmail.com email addresses to expose regular users to a malicious script. Without a doubt, these email addresses have been disabled since, but the same method could still be used, which is why it is extremely important to be cautious about spam emails that are employed in phishing attacks. ...
How Vermin RAT Spies Upon Ukrainian Government Agencies
Do you know what a cyber espionage tool is? It is a piece of malware that enables cyber criminals to access targeted operating systems to spy on them without the owner’s knowledge. Vermin RAT (remote access tool) is one of these tools, and it was found to be targeted at the Ukrainian government agencies, along with Quasar and Sobaken, two other infections that appear to be variants of the same malware. All three of these threats are distributed and used in the same ways, and they are equally as malicious and dangerous for the security of secret government information. ...
Zippyshare
Researchers at 411-spyware.com have not found a malicious application named Zippyshare, but they have found a dubious website having this name – Zippyshare.net. At first glance, it seems to be an ordinary file-sharing website, but if you look at it closer, you will see that it contains a bunch of fake buttons and annoying pop-ups. It is not the only drawback of Zippyshare. Specialists say that it might be responsible for redirections to unreliable third-party websites too. You should not visit this website if you can. We cannot allow you to download applications from this website too. ...