EHA
BBTok Banking Malware

New BBTok Banking Malware Generates Victim-Specific Payload

Banking malware is a malicious program that is mainly designed and used by threat actors to steal the following sensitive financial information from victims' computers or mobile devices:- Login credentials Banking details These malware variants can be...
Chinese Hackers use .chm files to Hijack Execution Chain and Deploy Malware

Chinese Hackers use .chm Files to Hijack Execution Chain and Deploy Malware

The Chinese state-backed group TAG-74 is known for conducting intelligence collection on organizations in the following countries:- South Korea Japan Russia The TAG-74 utilizes .chm files to trigger a DLL search order hijack execution chain and deploy malware...
ChatGPT-Powered Malware Analysis

ChatGPT-Powered Malware Analysis

In November 2022, OpenAI launched ChatGPT, an AI-powered chatbot. It's based on OpenAI's GPT-3 family of big language models, and users interact with it via queries. An interactive online malware analysis sandbox ANY.RUN has recently introduced...
APT36 Employing Customized Malware to Attack Indian Government Linux and Windows Servers

APT36 Using Customized Malware to Attack Indian Government Linux and Windows Servers

APT36 is a highly sophisticated APT (Advanced Persistent Threat) group that is known for conducting targeted espionage in South Asia and is strongly linked to Pakistan. While this APT group is known for targeting the...
Interactive Malware Sandbox

Interactive Malware Sandbox – Free File Analysis, Live Malware Hunting & Threat Intelligence

The versatility of malware sandboxes extends beyond behavioral analysis, making them a valuable assets in many contexts. The list of use cases grows even larger when you add a layer of interactivity provided by...
Loda Malware

Loda Malware Attack Windows To Control RDP, Spread Malware, And Log User Inputs

Threat actors have been actively employing Loda, a remote access trojan (RAT) developed in AutoIT, an accessible language for automating Windows computer scripting. The malware may deliver various harmful payloads in addition to keylogging, taking...
Detecting Malicious HTTP Traffic that Hides Within the Real Traffic

Detecting Malicious HTTP Traffic that Hides Under the Real Traffic

The malware generates malicious network behavior, often hiding it in HTTP traffic to avoid detection. So, in cyber security, detecting malicious traffic is one of the critical issues caused by malware. However, besides this, all...
WiKI-Eve Wi-Fi Passwords

WiKI-Eve – Stealing Wi-Fi Passwords by Eavesdropping on Keystrokes

Mobile devices and apps play a growing role in user identification, but password theft, resembling identity theft, invites diverse eavesdropping attacks, including stealthy indirect ones using side-channels. Indirect attacks, like those using side channels (acoustic,...
Threat Actors Modify Malware DGA Patterns to Improve C2 Communication and Complicate Analysis

Threat Actors Modify Malware DGA Patterns to Improve C2 Communication and Complicate Analysis

A Domain Generation Algorithm (DGA) creates numerous domain names, serving as meeting points for malware C&C servers. DGAs help malware evade security measures by generating new, random domains, making it challenging for victims to block...
Pandora Malware Attacks Android TVs via firmware updates and pirated video

Pandora Malware Attacks Android TVs via Firmware Updates and Pirated Videos

A new threat to Android devices named androidpandora has been identified that compromises the devices when pirated video content is installed or during firmware updates. This malware belongs to the variant of Mirai Trojan, which...

Unified Endpoint Management

EHA

Managed WAF

Website

Latest News