RomCom Malware
Stealthy malware used in espionage campaigns and targeted attacks RomCom Malware – Threat Summary Threat TypeRemote Access Trojan (RAT) /…
CurlyComradesAPT Malware
The CurlyComradesAPT malware is a high-level espionage threat tied to state-sponsored cyber operations. Known for its stealthy behavior and multi-layered payloads, this…
Leet Stealer
Leet Stealer is a sophisticated information-stealing Trojan that emerged in late 2024 and evolved into a prominent Malware‑as‑a‑Service (MaaS) by 2025. This malware is…
Plague Backdoor
Plague is a highly evasive Linux backdoor disguised as a malicious PAM (Pluggable Authentication Module). It allows threat actors to silently…
PXA Stealer
PXA Stealer is a Python-based information-stealing malware that has rapidly spread worldwide since late 2024. It targets browsers, crypto wallets, VPN/FTP clients,…
ProWSetup Virus
ProWSetup is a Trojan‑horse malware engineered to look like a harmless Windows task or file compressor installer. It infiltrates unprotected systems—often through…
SHUYAL Stealer
SHUYAL is a newly identified information‑stealing malware designed to silently harvest sensitive data from infected systems. This advanced infostealer specifically targets browser-stored…
CastleLoader Malware
CastleLoader is a sophisticated malware loader discovered in early 2025. It is quickly gaining traction in cybercrime circles due to its modular…
Greedy Sponge
Greedy Sponge is an emerging financially motivated cyber threat group active since early 2021. This syndicate targets medium- to large-sized…
Altrusica Service
Altrusica Service is a stealthy Trojan and CoinMiner that quietly installs itself on a system, typically bundled with free software…
Sigma.exe
Sigma.exe is a Trojan Horse that pretends to be a legitimate Windows process. It sneaks onto unprotected PCs—often via bundled downloads, fake…
Traosk Utils Queue
Traosk Utils Queue is a trojan-style malware that disguises itself as a legitimate Cloudflare verification prompt. Once the user downloads…
Bofamet Stealer
Bofamet Stealer is a sophisticated infostealer malware that harvests sensitive data such as browser credentials, cookies, cryptocurrency wallet details, and system information.…
PureRAT
PureRAT is a sophisticated Remote Access Trojan (RAT) that stealthily infiltrates Windows systems via phishing campaigns. It provides attackers full…
Matanbuchus 3.0
Matanbuchus 3.0 is a powerful Malware-as-a-Service (MaaS) loader emerging in July 2025 that delivers advanced threats such as Cobalt Strike…
InterLockRAT
InterLockRAT is a newly identified Remote Access Trojan (RAT) weaponized by the Interlock ransomware group. This threat uses deceptive techniques…
WinAIHService
WinAIHService is a Trojan that stealthily embeds itself into your system, leveraging persistence mechanisms like scheduled tasks and registry keys. Its goal…
Oyster Backdoor
Oyster, also known as Broomstick or CleanUpLoader, is a stealthy Windows backdoor distributed via malvertising and SEO-poisoned fake websites. Cybercriminals…
DRAT Malware
DRAT (also known as DRAT Remote Access Trojan) is a stealthy and potent remote access Trojan (RAT) that emerged in mid-2025. Delivered…
Qwizzserial Stealer
Qwizzserial is a Kotlin‑based Android stealer trojan that has infected nearly 100,000 devices—particularly in Uzbekistan—by masquerading as legitimate financial or…
NimDoor Malware (Mac)
NimDoor is a high-level trojan—more accurately, a stealthy cyber‑espionage framework—that targets macOS systems, especially within Web3 and cryptocurrency environments. Utilizing…
CryptoBot Malware
macOS users are being lured into fake Zoom extensions or messaging links, unwittingly installing CryptoBot—an info‑stealing Trojan that copies wallet…
SilentRoute Trojan
Cybercriminals are distributing a trojanized version of SonicWall’s SSL VPN NetExtender (version 10.3.2.27), misleading users into installing what appeared to be legitimate…
XDigo Malware
Imagine opening what seems like a routine email attachment, only to unleash a silent thief inside your network. That’s exactly…
PyLangGhost RAT
A recent campaign showcased PyLangGhost’s cunning delivery via job-offer scams, luring cryptocurrency professionals into running a simple PowerShell command—only to…
GHOSTPULSE Loader
A recent case showed GHOSTPULSE infiltrating corporate networks via ClickFix scam campaigns, ultimately delivering the Sectop RAT directly into memory.…
GolangGhost RAT
A recent surge in job-offer phishing campaigns targeting macOS users has revealed GolangGhost, a Remote Access Trojan (RAT) crafted in…
Sakura RAT
Sakura RAT is a Java-based Remote Access Trojan (RAT) that enables attackers to stealthily control infected systems. While typically considered…
Sorillus RAT
Sorillus RAT is a sophisticated Java-based remote access trojan (RAT) marketed as malware‑as‑a‑service. It targets Windows, macOS, and Linux systems,…
BrowserVenom
BrowserVenom is a sophisticated form of trojan proxyware, recently uncovered spreading via fake DeepSeek-R1 installers and malvertising campaigns. Its primary function…
Blitz Malware
Blitz malware is a potent two-stage Trojan targeting Windows PCs, delivered via back‑doored game cheats. The first stage installs a…
EDDIESTEALER Malware
EDDIESTEALER is a newly identified, Rust-based information stealer that poses a significant threat to Windows users. Disguised as legitimate software,…
Noodlophile Stealer Trojan
Noodlophile Stealer is a newly discovered malware threat that emerged in 2025, targeting users through fake AI platforms. Cybercriminals are…
Trojan.MSIL.Agent.YCL
Trojan.MSIL.Agent.YCL is a high-risk malware threat that disguises itself as a legitimate Adobe Reader installer. Once executed, it functions as…
Octalyn Stealer Malware
Octalyn Stealer is a sophisticated information-stealing Trojan that has recently emerged as a significant threat to Windows users. Written in…
NodeSnake RAT
NodeSnake RAT is a potent Remote Access Trojan (RAT) that targets Windows systems, enabling attackers to gain unauthorized control over…
TetraLoader Malware
TetraLoader is a sophisticated loader-type malware written in the Rust programming language. It has been actively deployed in targeted cyber-espionage…
Bionom Query Utils
Bionom Query Utils is a deceptive application classified as a potentially unwanted application (PUA) that poses significant risks to system…
NETXLOADER
NETXLOADER is a dangerous .NET-based malware loader actively used by the Qilin (Agenda) ransomware group. This threat is engineered to…
Skitnet Malware (Bossnet)
Skitnet, also known as Bossnet, is a sophisticated multi-stage backdoor malware developed by the threat actor LARVA-306. First observed in…
MaksStealer
MaksStealer is a stealthy information-stealing Trojan that masquerades as a performance enhancement tool or cheat modification for Hypixel SkyBlock, a…
Chihuahua Stealer
A Sophisticated .NET-Based Infostealer Targeting Browsers and Cryptocurrency Wallets Chihuahua Stealer is a newly identified .NET-based information-stealing malware that poses a…
Tasksche.exe Malware
The tasksche.exe file is a malicious executable associated with the infamous WannaCry ransomware. Disguised as a legitimate Windows process, it serves as…
TransferLoader
TransferLoader is a newly identified malware loader that poses a significant threat to cybersecurity. First detected in early 2025, this…
TerraLogger Trojan Malware
TerraLogger is a stealth-based keylogger malware attributed to a sophisticated cybercriminal group. This malware is engineered to secretly monitor and record…
Paklog Keylogger
Paklog Keylogger is a dangerous malware strain designed to secretly monitor and record keystrokes on an infected device. Cybercriminals use…
Tasjoc Tools Quato PUP
The Tasjoc Tools Quato application is a deceptive and harmful program that poses significant risks to your system's security. Disguised…
Crowq Utils Sol PUA
While researching suspicious websites and software installers, cybersecurity experts have identified a new digital threat: Crowq Utils Sol. Though it…
CurlBack RAT
Remote Access Trojans (RATs) are among the most dangerous types of malware because they grant cybercriminals full control over infected…
GRAPELOADER Virus (APT29 Malware)
The GRAPELOADER virus is a sophisticated piece of malware used primarily by the Russian-linked APT29 threat actor group, also known…