Amnesia Stealer

This image is about Amnesia Stealer.

Blog In the current digital environment, cybercriminals are always updating their strategies, using fresh technologies to get around security measures and access systems. The Amnesia Stealer, a sophisticated and dangerous piece of malware, has recently been added to their arsenal, garnering global attention from security experts.   What does Amnesia Stealer entail?   Discovered in […]

X-ZIGZAG RAT

This image is about X-ZIGZAG RAT.

Blog X-ZIGZAG RAT: Unraveling the Tactics of a Sophisticated RAM-Based Threat Cyber threats continue to evolve, and one of the most recent and sophisticated examples is the X-ZIGZAG RAT. Detected by ThreatMon in 2024, this malware targets Windows systems using advanced techniques to evade detection, such as operating entirely in RAM and employing complex sandbox […]

Ailurophile Stealer: A Threatening Information Stealer Malware

This image is about the Ailurophile Stealer.

Blog This blog summarizes the Ailurophile Stealer Technical & Malware Analysis Report. It explains in detail the technical analysis of Ailurophile Stealer and how one can secure oneself against security vulnerabilities. What is Ailurophile Stealer? Ailurophile Stealer is an advanced information-stealing malware that first appeared on ThreatMon on August 15, 2024. The malware is hosted on publicly […]

Kematian Stealer Technical Analysis

Blog In the ever-evolving world of cybersecurity, new threats emerge constantly, challenging our defenses and requiring continuous vigilance. One such threat that has recently come to light is the “Kematian Stealer,” an advanced information-stealing malware. ThreatMon’s Kematian Stealer Technical Analysis Report aims to provide an in-depth analysis of this potent malware, its features, and the […]

Navigating the Threat Landscape: Stealer Logs and Their Impact on Security

This image is about stealer logs and their impact on security.

Blog The new era of the digital domain has brought the world closer together in unprecedented ways, offering a level of ease and expedience that has never before been possible. However, it has also created its own unique set of security-related problems, including one of the most serious and evolving kinds of stealer logs. What […]

PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems

This image is about the 'secretslib' PyPI package dropping a fileless cryptominer on Linux systems.

Blog PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems A PyPI package named “secretslib” has been identified by Sonatype, which describes itself as “secret mapping and verification made easy”. The package secretly runs cryptominers in the memory of the Linux machine, a technique largely used by fileless malware and cryptominers. Secretslib was downloaded 93 […]

Kaspersky Published a Report on Malicious Browser Extensions

This image is about Kaspersky's report on malicious browser extensions.

Blog Kaspersky analyzed threat statistics by processing data voluntarily shared by its users for the period from January 2020 to June 2022. According to this data, during the first half of this year, 1,311,557 users tried to download malicious or unwanted extensions at least once. From January 2020 to June 2022, nearly 70 percent of users […]

Akira: Undetectable Stealer Unleashed

This image is about Akira, an undetectable stealer.

Blog Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password grabber Cookies grabber Bookmarks grabber Crypto wallets and 2fa extensions dump (Grabs 💸 Zcash, 🚀 Armory, 📀 Bytecoin, 💵 Jaxx, 💎 Exodus desktop/extension, 📉 Ethereum, 🔨 Electrum, 🕹 AtomicWallet, 💹 Guarda, ⚡️ Coinbase, 🦊 […]

ChatGPT and Malware Analysis – ThreatMon

This image is about ChatGPT and malware analysis.

Blog What is ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of the GPT (Generative Pre-training Transformer) language model that has been fine-tuned for the task of conversational response generation. Like other GPT models, ChatGPT uses a transformer architecture to process and generate text. However, it […]

TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files

This image is about TA558 APT group using malicious Microsoft Compiled HTML Help files.

Blog Who is TA558? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin America, North America, and Western Europe since 2018. The group sends malicious emails in Portuguese, Spanish, and sometimes English, using lures related to reservations and business themes such as hotel bookings. The emails may […]