Categories
Cybersecurity

Dark Tequila Añejo Information Stealing Trojan hits Mexico

Kaspersky researchers released intel on the “Dark Tequila” campaign that’s targeting Mexico with the primary function of stealing financial information. The malware also steals login credentials to popular websites that range from code versioning repositories to public file storage accounts and domain registrars. There are two known methods of infection, spear-phishing and infected USB devices. […]

Categories
Cybersecurity

Emotet Trojan Targets Chinese PUBG players: Trojan hidden in PUBG installation file

Threat actors have injected the Emotet trojan to PLAYERUNKNOWN’S BATTLEGROUNDS installation files. The user might think that the game is being installed (the game install will be shown eventually), but in the background the device immediately starts to show Emotet behavior. It also seems to target Chinese users as the PUBG installation window serves Chinese […]

Categories
Cyberwar

Malware Analysis Report AR18-221A: HIDDEN COBRA Trojan – KEYMARBLE

The United States DHS and FBI have published a Malware Analysis Report (AR18-221A) on a Trojan they name as KEYMARBLE. They believe the Trojan to be associated with malicious cyber activity carried out by the North Korean government that they refer to as HIDDEN COBRA. KEYMARBLE is a Windows executable and its capabilities include obtaining […]

Categories
Cybersecurity

An analysis on the Emotet Trojan and Mealybug [2018]

Mealybug, the group behind Emotet has changed their business model from maintaining the malware to distributer of the malware. This cybercrime as a service has obtained the interest of other threat actor groups. Mealybug is a threat actor group which surfaced in the year 2014. Characteristics Emotet Trojan The Emotet Trojan has the functionality to […]

Categories
Cybersecurity

Calisto Trojan Targets macOS

Researchers at SecureList have been studying a Trojan they have dubbed Calisto that infects macOS. Calisto attempts to pass itself off as Inetego’s security solution for Mac, although it does lack Intego’s signing signature that would make it a valid DMG image. During the installation process, the user is presented with a very convincing license […]