Astaroth is back in full force; security researchers discovered that the infamous Trojan malware infected more than 8,000 South American machines in just one week.
Security researchers observed the threat group Cobalt Gang using a downloader known as CobInt to infect and subsequently install additional malware on systems of interest.
Researchers discovered spam campaigns last month that exploited IQY files to flood Japanese users with BEBLOH and URSNIF malware.
Mobile's latest malware threat is more than just a banking Trojan — it's an all-in-one Android attack that combines ransomware, phishing and keylogging to compromise devices.
IBM X-Force researchers discovered that BackSwap, a banking Trojan that had previously only targeted Polish banks, now has its sights set on six banks in Spain.
According to security researchers, the Emotet Trojan is not only still active but has become more sophisticated and persistent in the four years since its initial discovery.
Australian businesses have been targeted in a phishing campaign that uses FTP links to deliver the DanaBot banking Trojan, which is designed to steal financial information and other private data.
An unknown threat actor leaked the source code for the Android malware Exobot, leading to fears of an impending attack similar to the massive DDoS incident that hit domain name provider Dyn in 2016.
According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.
IBM X-Force reported that mobile malware developers uploaded at least 10 malicious downloader apps to the Google Play Store as the first step in a process that fetches BankBot Anubis.