Trojan.IcedID.ANJ
This Trojan Doesn't Just Spy—It Opens the Door for Full System Takeover If your system is slowing down, freezing unexpectedly,…
SnakeDiskUSB Worm
SnakeDiskUSB Worm – Threat Summary Threat TypeWorm / Malware HybridDetection NamesWorm:VBS/Snakisk.A, VBS:Malware-gen, Worm.VBS.SnakeDiskUSBSymptomsUSB shortcut infection, missing files, slow system, strange…
ChillyHell Backdoor (macOS)
A new macOS threat called ChillyHell is making the rounds, and it’s more dangerous than your average piece of malware. This backdoor…
ZynorRAT Trojan
A new cross-platform Remote Access Trojan called ZynorRAT has emerged, targeting both Windows and Linux systems. Written in Go and controlled via…
kkRAT Trojan
kkRAT Trojan Virus – A Stealthy Backdoor You Shouldn’t Ignore Your PC could be under someone else’s control right now—and…
ZynorRAT Trojan
Warning: ZynorRAT can give attackers remote control over your system via Telegram commands. Immediate action is needed if you suspect…
Eggstreme Fileless Malware
It’s the malware you can’t see—and that’s exactly what makes it dangerous. Eggstreme Fileless Malware operates entirely in system memory, skipping…
Trojan/Donut.e
Stealthy Downloader That Invites Bigger Threats Into Your System Trojan/Donut.e is a downloader malware that sneaks into your system under…
Trojan/Donut.E
If your system shows signs of infection, Trojan/Donut.E may already be letting other malware in. Below, you’ll find clear steps…
Trojan:Win32/Vigorf.A
Trojan:Win32/Vigorf.A may masquerade as legitimate fan-control tools or drivers and can compromise system stability or privacy. Threat Overview FeatureDetailsThreat TypeTrojan…
Stealerium Trojan
Immediate action needed—Stealerium is a stealthy and versatile .NET‑based Trojan with serious data-stealing capabilities. Threat Overview Threat TypeTrojan (Info‑stealer /…
YAAI Trojan
Threat Summary Threat TypeTrojanDetection NamesYAAI (You Are An Idiot Virus), OffizSymptomsBouncing browser windows, repeated taunts (“You are an idiot!”), system freeze requiring…
ValleyRAT Trojan
Urgent threat—this Remote Access Trojan grants stealthy control of your PC. Threat Overview Table CategoryDetailsThreat TypeRemote Access Trojan (RAT) /…
Pdfskills_updater.exe
Pdfskills_updater.exe is a Trojan horse malware that pretends to be a normal Windows update or application. Once installed—often from shady downloads, bundled…
TamperedChef Stealer
TamperedChef is a malicious information-stealer that disguises itself inside seemingly legitimate PDF editors or utility tools. After installation, it remains dormant for weeks,…
DarkCloud Stealer
Warning: DarkCloud is a stealthy infostealer that quietly infiltrates your system and exfiltrates sensitive data—don’t wait to act. Threat Overview DarkCloud…
SoupDealer Loader
Warning: SoupDealer Loader is a stealthy malware loader that grants attackers remote control over your device—acting quickly is essential. Threat Summary…
Raven Stealer Ransomware
Raven Stealer is a stealthy, information-stealing malware written in Delphi and C++ that harvests sensitive data like browser passwords, cookies,…
RedHook Banking Trojan
Beware: This Android malware can hijack your device, steal banking credentials, and give attackers full remote access. Threat Summary FieldDetailsThreat…
Antivirus By FSB Ransomware
Antivirus By FSB is a highly dangerous Android backdoor that pretends to be a legitimate antivirus tool. Once installed, it…
Shamos Stealer
Shamos Stealer is an insidious infostealer—part of the AMOS (Atomic) stealer family—specifically targeting macOS systems. It’s offered as a Malware-as-a-Service (MaaS) by the COOKIE…
Bulehero.php.trojan.downloader
Bulehero.php.trojan.downloader is a malicious PHP script that disguises itself as a legitimate Adobe Reader installer. Its main goal is to…
PDFSkills_Updater.exe Malware
This stealthy updater.exe process runs in the background, spying and altering system behavior without user consent. Threat TypeMalware / Updater…
Noodlophile Malware
The Noodlophile malware campaign is an active and dangerous threat spreading via cracked software, fake downloads, and malicious JavaScript files. Once embedded…
RomCom Malware
Stealthy malware used in espionage campaigns and targeted attacks RomCom Malware – Threat Summary Threat TypeRemote Access Trojan (RAT) /…
CurlyComradesAPT Malware
The CurlyComradesAPT malware is a high-level espionage threat tied to state-sponsored cyber operations. Known for its stealthy behavior and multi-layered payloads, this…
Leet Stealer
Leet Stealer is a sophisticated information-stealing Trojan that emerged in late 2024 and evolved into a prominent Malware‑as‑a‑Service (MaaS) by 2025. This malware is…
Plague Backdoor
Plague is a highly evasive Linux backdoor disguised as a malicious PAM (Pluggable Authentication Module). It allows threat actors to silently…
PXA Stealer
PXA Stealer is a Python-based information-stealing malware that has rapidly spread worldwide since late 2024. It targets browsers, crypto wallets, VPN/FTP clients,…
ProWSetup Virus
ProWSetup is a Trojan‑horse malware engineered to look like a harmless Windows task or file compressor installer. It infiltrates unprotected systems—often through…
SHUYAL Stealer
SHUYAL is a newly identified information‑stealing malware designed to silently harvest sensitive data from infected systems. This advanced infostealer specifically targets browser-stored…
CastleLoader Malware
CastleLoader is a sophisticated malware loader discovered in early 2025. It is quickly gaining traction in cybercrime circles due to its modular…
Greedy Sponge
Greedy Sponge is an emerging financially motivated cyber threat group active since early 2021. This syndicate targets medium- to large-sized…
Altrusica Service
Altrusica Service is a stealthy Trojan and CoinMiner that quietly installs itself on a system, typically bundled with free software…
Sigma.exe
Sigma.exe is a Trojan Horse that pretends to be a legitimate Windows process. It sneaks onto unprotected PCs—often via bundled downloads, fake…
Traosk Utils Queue
Traosk Utils Queue is a trojan-style malware that disguises itself as a legitimate Cloudflare verification prompt. Once the user downloads…
Bofamet Stealer
Bofamet Stealer is a sophisticated infostealer malware that harvests sensitive data such as browser credentials, cookies, cryptocurrency wallet details, and system information.…
PureRAT
PureRAT is a sophisticated Remote Access Trojan (RAT) that stealthily infiltrates Windows systems via phishing campaigns. It provides attackers full…
Matanbuchus 3.0
Matanbuchus 3.0 is a powerful Malware-as-a-Service (MaaS) loader emerging in July 2025 that delivers advanced threats such as Cobalt Strike…
InterLockRAT
InterLockRAT is a newly identified Remote Access Trojan (RAT) weaponized by the Interlock ransomware group. This threat uses deceptive techniques…
WinAIHService
WinAIHService is a Trojan that stealthily embeds itself into your system, leveraging persistence mechanisms like scheduled tasks and registry keys. Its goal…
Oyster Backdoor
Oyster, also known as Broomstick or CleanUpLoader, is a stealthy Windows backdoor distributed via malvertising and SEO-poisoned fake websites. Cybercriminals…
DRAT Malware
DRAT (also known as DRAT Remote Access Trojan) is a stealthy and potent remote access Trojan (RAT) that emerged in mid-2025. Delivered…
Qwizzserial Stealer
Qwizzserial is a Kotlin‑based Android stealer trojan that has infected nearly 100,000 devices—particularly in Uzbekistan—by masquerading as legitimate financial or…
NimDoor Malware (Mac)
NimDoor is a high-level trojan—more accurately, a stealthy cyber‑espionage framework—that targets macOS systems, especially within Web3 and cryptocurrency environments. Utilizing…
CryptoBot Malware
macOS users are being lured into fake Zoom extensions or messaging links, unwittingly installing CryptoBot—an info‑stealing Trojan that copies wallet…
SilentRoute Trojan
Cybercriminals are distributing a trojanized version of SonicWall’s SSL VPN NetExtender (version 10.3.2.27), misleading users into installing what appeared to be legitimate…
XDigo Malware
Imagine opening what seems like a routine email attachment, only to unleash a silent thief inside your network. That’s exactly…
PyLangGhost RAT
A recent campaign showcased PyLangGhost’s cunning delivery via job-offer scams, luring cryptocurrency professionals into running a simple PowerShell command—only to…
GHOSTPULSE Loader
A recent case showed GHOSTPULSE infiltrating corporate networks via ClickFix scam campaigns, ultimately delivering the Sectop RAT directly into memory.…

