article thumbnail

A new sophisticated version of the AZORult Spyware appeared in the wild

Security Affairs

A new sophisticated version of the AZORult Spyware was spotted in the wild, it was involved in a large email campaign on July 18. Malware researchers at Proofpoint spotted a new version of the AZORult Spyware in the wild, it was involved in a large email campaign on July 18, just 24 hours it appeared in cybercrime forums on the Dark Web.

Spyware 47
article thumbnail

Security Affairs newsletter Round 261

Security Affairs

Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Spyware 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 10 Malware Strains of 2021

SecureWorld News

Cybercriminals often use malware to gain access to a computer or mobile device to deploy viruses, worms, Trojans, ransomware, spyware, and rootkits. It has been sold on underground hacker forums for stealing browser data, user credentials, and cryptocurrency information. AZORult's developers are constantly updating its capabilities.

Malware 80
article thumbnail

New Android BlackRock malware targets hundreds of apps

Security Affairs

.” The malicious code supports multiple commands, it could launch overlay attacks, log keystrokes, send spam the victims’ contact lists with SMS messages, and prevent victims from using antivirus software. The list of targeted apps includes cryptocurrency wallet applications (i.e.

Malware 89
article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

Also read: Best Antivirus Software of 2022. Restoration is offered in exchange for a ransom, usually in cryptocurrencies. Crimeware and spyware. On the other hand, spyware malware can breach a device and access specific functions like webcams, website history, cookies, or even record conversations on a phone.

Backups 145
article thumbnail

IT threat evolution in Q2 2022. Mobile statistics

SecureList

For instance, J-Lightning Application purported to help users to invest into a Polish oil refinery, a Russian energy company, a Chinese cryptocurrency exchange and an American investment fund. Yemen rose to second place with 17.97%; the Trojan-Spy.AndroidOS.Agent.aas spyware was the threat most often encountered by users in that country.

Mobile 93
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Install an antivirus solution that includes anti-adware capabilities. Additional features of botnets include spam, ad and click fraud, and spyware. If your antivirus software fails to notice a new strain, you can reinstall the browser. Jump ahead: Adware. Bots and botnets. Browser hijacker. Malicious mobile app. RAM scraper.

Malware 105