- Security
- By Ionut Ilascu
- February 19th, 2015
Developer of Blackshades RAT Pleads Guilty, Faces 10 Years in Prison
The second developer is also awaiting his sentence
- Security
- By Ionut Ilascu
- February 2nd, 2015
“Femme Fatale” Lure Foils Syrian Opposition Battle Plans
Skype talks would re-initiate when hackers needed new info
- Advisories
- By Ionut Ilascu
- January 23rd, 2015
Leaked Code for Njw0rm RAT Spawns New Malware
Kjw0rm and Sir DoOom are Njw0rm's evolutionary step
- Security
- By Ionut Ilascu
- January 20th, 2015
League of Legends, Path of Exile Official Releases Laced with Remote Access Trojan
Infected game launcher replaced with valid one after infection
- Incidents
- By Ionut Ilascu
- December 30th, 2014
Havex RAT Authors Self-Sign Malware to Appear from IBM, 64-Bit Version Spotted
Threat actors are expected to continue to modify the threat
- Security Blog
- By Ionut Ilascu
- November 22nd, 2014
Five Arrested in UK for Using Remote Access Trojans
A total of 15 individuals have been arrested across Europe
- Virus alerts
- By Ionut Ilascu
- November 11th, 2014
Uroburos Espionage Group Is Still Active, Relies on New Remote Access Trojan
New obfuscation and anti-analysis mechanisms have been added
- Virus alerts
- By Ionut Ilascu
- October 29th, 2014
Gmail Drafts Used to Exfiltrate Data and Send Malicious Instructions
Malicious communication hides behind legitimate traffic
- Security
- By Ionut Ilascu
- October 15th, 2014
Cyber Espionage Group Leverages at Least Ten Custom Tools in Attacks
Group relies even on rootkit code intended for research
- Oddiverse Blog
- By Laura Sinpetru
- September 15th, 2014
Watch: Introducing the World's First Ratcopter
The Ratcopter is a dead rat fitted with propellers and an on-board computer, was created by two Dutch inventors
- Security
- By Ionut Ilascu
- September 1st, 2014
Enhanced BlackWorm Used by the Syrian Malware Team
Hackers use custom builder that generates flexible binary
- Security
- By Ionut Ilascu
- August 18th, 2014
Over 10,000 Fall Victim to Intensified Cyber Attacks Targeting Syria
Threat actors are more organized and started using more complex malware
- Security
- By Ionut Ilascu
- August 5th, 2014
Yahoo/Gmail Used by Malware for Communication
Use of legitimate communication channels makes it difficult to block
- Security
- By Ionut Ilascu
- August 4th, 2014
Android SandroRAT Poses as Kaspersky Mobile Security
Remote access tool offers complete access to sensitive information
- Security
- By Ionut Ilascu
- July 23rd, 2014
Nigerian 419 Scammers Move Up the Cybercrime Ladder
Companies in Taiwan and South Korea targeted by Nigerian threat actors
- Editorials
- By Ionut Ilascu
- July 6th, 2014
Cyber-Espionage Havex Malware Is More Pervasive than Initially Thought
Havex RAT has been used in multiple spying campaigns
- Security
- By Ionut Ilascu
- July 1st, 2014
Cyber-Attacks On the Rise in Iraq
Researcher notices an increase in botnets in the past two months