New VoidStealer Trojan bypasses Chrome’s stored data protection
The new VoidStealer Trojan utilizes a novel method to bypass Chrome’s App-Bound Encryption, allowing it to hijack sessions and steal user data.
114 articles
The new VoidStealer Trojan utilizes a novel method to bypass Chrome’s App-Bound Encryption, allowing it to hijack sessions and steal user data.
We’ve discovered over two dozen phishing apps mimicking popular crypto wallets right in the official App Store. Here’s a breakdown of the new waves of attacks targeting iPhone and Mac users and their crypto holdings.
The new CrystalX remote access Trojan looks like the prank viruses of the 90s on the surface, but it causes a lot more damage. It spies on all that’s happening on your computer, steals cryptocurrency and accounts, and gives the attacker full control over your device. We break down how it works, and how to avoid becoming a victim.
Intellexa’s Predator spyware can hide camera and microphone usage indicators on iOS devices. Here’s a look at how it pulls it off.
We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone.
We’ve identified a new infostealer named Stealka, which masquerades as pirated software and game mods. It targets data stored inside browsers, locally installed applications, and crypto wallets.
Official gaming websites and platforms may seem safe, but even there gamers occasionally encounter malware. We break down infection cases involving Endgame Gear, Steam, and Minecraft.
We’ve uncovered a new Trojan — Efimer — which steals cryptocurrency via the clipboard. Here’s how it functions, and how you can stay protected.
This marks the second time we’ve found a stealer Trojan in the App Store.
A popular password manager was modified to allow attackers to steal passwords and encrypt users’ data. How to protect home computers and corporate systems from this threat?
Counterfeit smartphones imitating well-known brands and offered online come pre-installed with the powerful Triada Trojan.
Spoiler: nothing good. Along with pirated software, you’ll probably pick up a miner, stealer, or backdoor.
New malware targets magic enthusiasts — sending stolen data to an “astral cloud server”.
If you’ve ever downloaded game cheats from a YouTuber’s “link in the description”, your computer might be infected with a stealer.
We’ve discovered apps in the official Apple and Google stores that steal cryptocurrency wallet data by analyzing photos.
Banshee stealer, a macOS stealer that emerged last year, is now roaming free on the Web, infecting Mac users and gaining new capabilities. How to protect yourself?
At risk are users of modified versions of Spotify, WhatsApp, Minecraft, and other apps from Google Play.
The masterminds behind the colossal botnet encompassing 19 million IP addresses used free VPN services as bait to lure unsuspecting users.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.