6 C
London
Wednesday, November 22, 2017
Home Tags Trojan

Tag: Trojan

Terdot Banking Trojan, inspired by Zeus, can eavesdrop and modify traffic on social media and email in addition to snatching data.
Kaspersky Lab's internal investigation found a backdoor Trojan and other malware on the personal computer of the NSA employee who took home agency hacking tools.
You've grown so much, you @£$ Terdot, a banking Trojan that has been around since mid-2016, has been re-engineered with updated information and credential thievery as well as social media account monitoring functionality.…
Eight apps found infected with a new Trojan family that ups the ante in obfuscation with four payload stages.
IBM researchers uncover a new form of banking malware distributed as a second-stage infection via the Emotet Trojan.
A new banking Trojan dubbed IcedID is is being distributed by a seasoned cybergang or hacker targeting U.S. financial institutions.
A new banking trojan has been discovered by IBM researchers, that is built with custom code, though it uses similar tactics to existing malware attacks.
IBM researchers discover a new banking Trojan that is built with custom code, though it uses similar tactics to existing malware attacks.
The authors of malware use various techniques to circumvent defensive mechanisms and conceal harmful activity. One of them is the practice of hiding malicious code in the context of a trusted process.

Typically, malware that uses concealment techniques injects its code into a system process, e.g. explorer.exe.

But some samples employ other interesting methods. We're going to discuss one such type of malware.
Zeus Panda, a banking Trojan designed to steal credentials, is being distributed via poisoned Google search results.
Threat actors leverage SEO to ensure malicious links rank highly in Google results to infect targets with Trojan.