Malware analysis

Ghimob Trojan Banker: What it is, how it works and how to prevent it | Malware spotlight

Introduction Malware is a popular term used to classify software with bad proposes that is part of our lives these days. Ghimob Trojan Banker is one of th

Stantinko Trojan: What it is, how it works and how to prevent it | Malware spotlight

The number of threats attacking Linux systems have exploded in recent days. Within this context, a botnet that impacted several countries in the past, includ

Vizom malware: What it is, how it works and how to prevent it | Malware spotlight

The Vizom Trojan is an active piece of malware targeting online banking users in Brazil that takes advantage of the window overlay technique to steal user’s

RansomExx: The malware that attacks Linux OS

RansomExx is the new malware used by criminals to attack both Windows and Linux environments. With companies using a mixed environment of Windows and Linux s

Lazarus’s VHD ransomware: What it is, how it works and how to prevent it | Malware spotlight

Introduction Data encryption malware is one of the most popular malware families in recent years and targets mass volumes of users and companies around the

Drovorub malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction Malware is a threat that has increased exponentially in the last few years, with many sophisticated threads impacting citizens, devices, organi

BlindingCan malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction BlindingCan is a recent malware that has made headlines in the last few months. This malware is used by government-backed hackers from North Ko

Emotet returns in summer 2020 with new improvements

Introduction Emotet is a self-propagating and modular Trojan first discovered in 2014 and a popular cyberthreat out in the world. It was initially developed

Octopus Scanner malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction Octopus Scanner appeared somewhere in 2018. Although its creators are still unknown, the operation of Octopus Scanner has been extensively disc

WastedLocker malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction WastedLocker is the name of a data encryption malware, also called ransomware, which will be analyzed in this article. Systems infected with th