Malware analysis

NetWire malware: What it is, how it works and how to prevent it | Malware spotlight

NetWire is a remote access Trojan focused on password stealing and keylogging, as well as including remote control capabilities. This threat has been used by

Nworm malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction In April 2020, the creators of the TrickBot malware released a module for TrickBot called Nworm. TrickBot is a banking Trojan that targets Wind

MalLocker Android ransomware: What it is, how it works and how to prevent it | Malware spotlight

Introduction Malware is persistent presence in our life. In the past few months, several pieces of different malware families were identified as affecting m

Troystealer malware: What it is, how it works and how to prevent it | Malware spotlight

We are living in an era where malware is part of our daily lives. Emergent campaigns are increasing, each more sophisticated and harder to detect than the la

Inside the Lyceum/Hexane malware

The Lyceum/Hexane Cybercrime Group Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating with

Tycoon malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction It has been said that a picture is worth a thousand words. In the world of malware, a picture is worth an infection — in other words, a picture

LockBit malware: What it is, how it works and how to prevent it | Malware spotlight

Introduction LockBit is a data encryption malware in operation since September 2019 and a recent Ransomware-as-a-Service (RaaS), in which developers are in c

Purple Fox malware: What it is, how it works and how to prevent it

Without question, there has been a marked die-off in the usage of Exploit Kits (EK). The Purple Fox exploit kit is a type of malware that is defying this rec

Ransomware deletion methods and the canary in the coal mine

Introduction  Ransomware is an emergent threat. Every week, there is a new and notable outbreak of this class of data encryption malware. From Ragnar Locker

USBCulprit malware: What it is, how it works and how to prevent it

Introduction  Info stealers have been a part of the attacker arsenal since the early days of malware. Less common is a malware that can steal information fro