IBM X-Force researchers report an increase in HawkEye v9 keylogger infection campaigns targeting businesses around the world.
Security researchers recently identified two malware distribution campaigns that infect customers of Brazilian financial institutions with banking Trojans.
A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.
A new attack campaign is using Rich Text Format (RTF) files to distribute the Agent Tesla Trojan along with other malware.
Astaroth is back in full force; security researchers discovered that the infamous Trojan malware infected more than 8,000 South American machines in just one week.
Mobile's latest malware threat is more than just a banking Trojan — it's an all-in-one Android attack that combines ransomware, phishing and keylogging to compromise devices.
The Proteus malware enables fraudsters to commandeer devices to act as proxy servers or keyloggers, validate credentials or mine for cryptocurrencies.
According to IBM Trusteer researchers, massively distributed Citadel malware is targeting nonfinancial petrochemical companies in the Middle East.
According to the FBI, financial institutions should protect themselves against malware attacks that have been targeting employees for login credentials.
According to Trusteer researchers, the Citadel platform is being used by a new type of malware called Reveton to deliver code ransom.