Tag

Trojan

All articles tagged with #trojan

SonicWall NetExtender Trojanized to Steal VPN Credentials in Remote Attacks

Originally Published 6 months ago — by BleepingComputer

Featured image for SonicWall NetExtender Trojanized to Steal VPN Credentials in Remote Attacks
Source: BleepingComputer

SonicWall warns of a trojanized version of its NetExtender VPN client distributed via spoofed websites, designed to steal VPN credentials and configuration data, with detection tools now able to block the malicious installers. Users are advised to download software only from official sources and scan files before installation.

"Discovery of New Moon Orbiting Mars"

Originally Published 1 year ago — by IFLScience

Featured image for "Discovery of New Moon Orbiting Mars"
Source: IFLScience

Astronomers have confirmed the existence of a new trojan asteroid, 2023 FW14, in the orbit of Mars, making it the 17th trojan asteroid discovered around the Red Planet. Unlike other trojans, this new companion might be in an unstable orbit, leading to intriguing possibilities about its past. The confirmation of the asteroid as belonging to the Martian trojan comes from the Gran Telescopio Canarias (GTC), and its spectrum provides important insights into its origin. This discovery provides valuable information about our understanding of celestial mechanics and the reliability of theoretical models.

"Astronomers Discover New 'Trojan' Asteroid Sharing Orbit with Mars"

Originally Published 1 year ago — by Phys.org

Featured image for "Astronomers Discover New 'Trojan' Asteroid Sharing Orbit with Mars"
Source: Phys.org

Astronomers have confirmed the existence of a new "Trojan" asteroid, 2023 FW14, that shares its orbit with Mars, bringing the total number of known Trojans accompanying Mars to 17. This asteroid displays differences in its orbit and chemical composition, suggesting it may be a captured asteroid of a primitive type. The observations were made using the Gran Telescopio Canarias, and the findings have been published in Astronomy & Astrophysics, providing valuable insights into the dynamics and characteristics of these celestial objects.

"GoldPickaxe Trojan: Stealing iOS Users' Facial Data for Bank Account Break-Ins"

Originally Published 1 year ago — by 9to5Mac

Featured image for "GoldPickaxe Trojan: Stealing iOS Users' Facial Data for Bank Account Break-Ins"
Source: 9to5Mac

The GoldPickaxe trojan, believed to be the world's first iOS trojan, can steal biometric data and compromise bank accounts. It has been targeting users in Vietnam and Thailand by mimicking financial institution apps. To protect against it, users should avoid installing apps through TestFlight unless from a trusted developer, be cautious with MDM profiles, refrain from sharing personal information, verify financial account concerns directly with the institution, and keep their iPhone updated with the latest software.

"Chinese Hackers Target iOS Users with Deepfake Trojan to Steal Face ID Banking Data"

Originally Published 1 year ago — by 9to5Mac

Featured image for "Chinese Hackers Target iOS Users with Deepfake Trojan to Steal Face ID Banking Data"
Source: 9to5Mac

A new trojan called GoldDigger is targeting iOS users to steal sensitive data, including facial recognition data, ID documents, and SMS, which can be used to create deepfakes and gain access to victims’ bank accounts. The trojan was initially distributed through Apple’s TestFlight and later through a Mobile Device Management profile. While it mainly targets users in Vietnam and Thailand, it poses a threat to users worldwide. Apple has been informed about the trojan, and users are advised to avoid installing apps from untrusted sources.

Mac users beware: Proxy malware spreads through pirated software

Originally Published 2 years ago — by BleepingComputer

Featured image for Mac users beware: Proxy malware spreads through pirated software
Source: BleepingComputer

Cybercriminals are targeting Mac users with a new proxy trojan malware, disguised as popular copyrighted macOS software available on warez sites. The malware infects computers and turns them into traffic-forwarding terminals for illegal activities. Kaspersky discovered the campaign, which offers trojanized versions of image editing, video compression, data recovery, and network scanning tools. The trojan is distributed as PKG files, which can execute scripts during installation, granting dangerous permissions. The trojan disguises itself as a legitimate system process and connects to a command and control server to receive instructions. The same infrastructure also hosts proxy trojan payloads for Android and Windows, suggesting a wide-ranging attack.

Beware of Malware in Super Mario Fan Games

Originally Published 2 years ago — by Security Affairs

Featured image for Beware of Malware in Super Mario Fan Games
Source: Security Affairs

Threat actors are spreading a trojanized Super Mario Bros game installer for Windows to deliver multiple malware, including an XMR miner, SupremeBot mining client, and the Open-source Umbral stealer. Attackers target gamers because they often use powerful hardware for gaming, which is excellent for mining cryptocurrencies. The malware also deploys a stealer component to illicitly acquire sensitive information from the victims’ systems, aiming to generate additional financial profits.

Global Supply Chain Cyberattack Targets 3CX VoIP App

Originally Published 2 years ago — by BleepingComputer

Featured image for Global Supply Chain Cyberattack Targets 3CX VoIP App
Source: BleepingComputer

Hackers are using a trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client to target the company's customers in a supply chain attack. The attackers are targeting both Windows and macOS users of the compromised 3CX softphone app. The malware is capable of harvesting system info and stealing data and stored credentials from Chrome, Edge, Brave, and Firefox user profiles. The trojanized version of 3CX's desktop client will connect to attacker-controlled domains. Multiple customers have reported that the VoIP client app was marked as malicious by various security software.