Tag Archives | trojan




Pupy – Open-Source Remote Administration Tool AKA RAT

Pupy is an open-source remote administration tool (RAT), that is cross platform and has an embedded Python interpreter, allowing its modules to load Python packages from memory and transparently access remote Python objects. Pupy can communicate using different transports and have a bunch of cool features & modules. On Windows, Pupy uses reflective dll injection […]

Tags: , , , , , , , ,

Posted in: Hacking Tools | Add a Comment

Pirated ‘Watch Dogs’ Game Made A Bitcoin Mining Botnet

Pretty smart idea this one, we wrote about Yahoo! spreading Bitcoin mining malware back in January, but we haven’t really seen any of that type of activity since then. But this, this is a much better target audience – gamers with high powered GPUs! Especially as this is one of most hyped ‘next-gen’ games for […]

Tags: , , , , , , , , , ,

Posted in: Malware | Add a Comment

Linux Backdoor Fokirtor Injects Traffic Into SSH Protocol

Earlier this week we wrote about an Internet Explorer 0-day which used an in-memory drive by attack, which was pretty smart. Now another new type of malware (a backdoor in this case), this time targeting Linux known as Fokirtor. There is no real discussion of the exploit used to plant this backdoor (if it was […]

Tags: , , , , , , ,

Posted in: Cryptography, Exploits/Vulnerabilities, Network Hacking | Add a Comment

Digital Underground Offering Cheap Botnets For Hire

Perhaps even the cyber-criminals are effected by the recent recession – botnets for hire are hitting rock-bottom rates starting at just $2. We reported back in April 2010 about the Texas Man Who Pleaded Guilty To Bot Network For Hire. They are becoming more multi-talented as well rather than just offering bot networks for DDoS […]

Tags: , , , , , , , , , , ,

Posted in: Malware, Phishing, Spammers & Scammers | Add a Comment

China Facing Problems With Android Handsets & Pre-installed Trojans

It seems like the Chinese are always coming up with inventive ways to scam people, this time the people in their own country. Android is of course growing quickly globally and China is no exception with the availability of cheap hardware there the open-source Android OS is a natural choice. The latest scam is some […]

Tags: , , , , , , , , , , , , , , , ,

Posted in: Legal Issues, Malware, Privacy | Add a Comment

Energizer Duo USB Battery Charger Software Has Backdoor Trojan

There has been a number of interested stories lately especially related to hardware, the latest doing the rounds is this one where a seemingly innocuous USB battery charger has been installing some nasty remote control software onto users systems. The charger at fault is the Energizer Duo USB Battery Charger, you’re only at risk if […]

Tags: , , , , , , , , , , ,

Posted in: Legal Issues, Malware | Add a Comment

Facebook Used By Whitewell Trojan To Communicate

Facebook has had it’s fair share of security woes and the latest is the discovery of a new Trojan that uses Facebook to communicate. Interesting that it’s using the Facebook notes feature to communicate depending on title/subject of the note. The actual malware itself is spread through doc/pdf exploits and not through any flaws in […]

Tags: , , , , , , , , , , ,

Posted in: Malware, Privacy | Add a Comment

Windows 7 UAC (User Access Control) Ineffective Against Malware

There have been a few stories about Windows 7, even one about Windows 7 UAC before and now it’s officially on sale I’d expect there to be many more. As always malware and mass infections is a numbers game so the bad guys will always target the most popular and prolific operating systems to increase […]

Tags: , , , , , , , , , , ,

Posted in: Countermeasures, Malware, Windows Hacking | Add a Comment

Nasty Trojan Zeus Evades Antivirus Software

This is one nasty piece of malware, seems like it’s working on a low level as per rootkits, there aren’t many technical details but it may well be operating on a Ring 0 level. The level of detection by AV software is quite scary, especially since the malware is specifically targeting bank login details and […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Malware, Privacy | Add a Comment

Trojan in Counterfeit Copies of Windows 7 Builds Botnet

This latest mass infection is through a vector I really don’t understand, see as though you can legitimately download Windows 7 from Microsoft. I guess people just prefer BitTorrent downloads to HTTP downloads, and whoever had this smart idea capitalized on that. Microsoft should perhaps do something about that and put out a legitimate BitTorrent […]

Tags: , , , , , , , , ,

Posted in: Malware, Windows Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·