webmanager


Ursnif – dangerous Trojan used to steal sensitive data by recording users’ keystrokes   Ursnif virus is malware that specializes in banking credentials and other information-stealing by using a variety of methods. Released in 2006, malware has seen a fair share of updates and is constantly returning with new campaigns […]

Ursnif virus


Cerberus virus is the memory-resident Android trojan that can fully control the device and steal financial data Cerberus virus – a threat that criminals use for accessing mobile phones and taking actions remotely without any indication for the user. This banking trojan[1] relies on the accelerometer sensor to delay the launch […]

Cerberus virus


Agent Tesla is a dangerous Trojan used by criminals to collect banking information, logins, Wi-Fi passwords, and other credentials Agent Tesla is a Trojan infection, which exhibits traits of an info-stealer, spyware, keylogger, and RAT[1]. Its history stretches back to 2014 when it has first been introduced as a commercial […]

Agent Tesla




QakBot – relatively old banking malware that resurfaces with new tricks QakBot malware is a banking Trojan that targets financial information QakBot malware is a banking Trojan that targets financial information QakBot, more known as Qbot, is a Trojan that was first identified by researchers back in 2009[1]. Despite its relatively […]

Qakbot


Nefilim ransomware – a file locking malware that threatens to publish the data publicly Nefilim ransomware is a re-branded name of Nemty ransomware – it operates ransomware-as-a-service scheme for propagation Nefilim ransomware is a re-branded name of Nemty ransomware – it operates ransomware-as-a-service scheme for propagation Nefilim ransomware is a […]

Nefilim ransomware







njRat is a multi-functional Remote Access Trojan that can log keystrokes and disable anti-malware software on the host machine njRat, also known as Bladabindi, is a Microsoft .NET framework-based Remote Access Trojan and a sophisticated backdoor that possesses a variety of capabilities which allow the attacker to take over the computer […]

njRat