New Android malware allows immediate ATM withdrawals through your phone

New Android Malware Threats Smartphone banking has undoubtedly made transactions easier, but it’s also opened the door for cybercriminals. In recent years, instances of Android malware stealing passwords, intercepting one-time passwords (OTPs), and even controlling phones remotely have surged. Some scams rely on fake banking apps, while others employ phishing messages that prompt users to […]
Google alerts Android users about fraudulent VPN apps that conceal harmful malware.

Warning on Fake VPN Apps Affecting Android Users Google has issued a warning to Android users about a surge in fake VPN applications that are introducing malware to devices. These seemingly harmless apps, which are marketed as privacy tools, are actually equipped with malicious software capable of stealing personal information, banking credentials, and enabling remote […]
Fraudulent AI apps resembling ChatGPT and DALL·E conceal harmful malware risks

App stores might seem secure, but reality tells a different story. Beneath the surface of legitimate apps lies a sea of imposters designed to take advantage of users’ trust. This isn’t new—we’ve seen it with games and productivity tools, but the rise of artificial intelligence has given fraudsters a fresh playground. The surge in AI […]
Malware scam on TikTok tricks users with fake software activation instructions to collect personal information.

Cybercriminals are using TikTok again to ensnare unsuspecting users. This time, they’re promoting malware disguised as free activation guides for various software, including Windows, Microsoft 365, Photoshop, and even fake versions of Netflix and Spotify Premium. Security expert Xavier Mertens uncovered this scheme, noting that similar tactics have been observed before. According to reports, these […]
Russian hackers employ counterfeit CAPTCHA tests to distribute harmful malware

Russian state-sponsored hackers are increasing their cyberattacks, utilizing a new form of malware that disguises itself as fake CAPTCHA tests. This group, referred to as Star Blizzard or ColdRiver, is employing ClickFix attacks, deceiving users into activating harmful software masked as a simple “I’m not a robot” verification check. These tactics signal a fresh wave […]
Over 3,000 YouTube videos distribute malware hidden as fake software downloads

YouTube has become an immensely popular platform for everything from entertainment to education. It’s hard to find a life skill—from cooking to studying—where there isn’t a helpful YouTube video. However, a recent study from Check Point has uncovered a troubling side to this platform: a hidden network of malware distribution. Hackers are taking advantage of […]
Android users advised to remove Klopatra malware posing as a streaming app

Malware aimed at Android devices is evolving rapidly. Cybercriminals are using increasingly deceptive tactics, from phony banking apps to phishing schemes, all designed to trick users into revealing sensitive information. Recently, security experts have highlighted a new threat: deceptive apps that look authentic but can completely hijack your device. They’ve issued warnings to Android users […]
North Korean Hackers Utilize ‘EtherHiding’ to Store Malware on Ethereum and BNB Blockchains

Simply put Researchers from Google’s Threat Intelligence Group have identified North Korean hackers utilizing malware called EtherHiding. This malware allows for stealthy and untraceable delivery of malicious code through smart contracts. Pro-regime hackers have already siphoned off over $2 billion this year alone, largely from a hack involving the Bybit exchange. Google’s Threat Intelligence Group […]
Nation-state hackers spread malware using secure blockchains

Smart Contract Malware Insights Creating or adjusting a smart contract usually costs under $2 per transaction. This is a noteworthy reduction in both costs and efforts when compared to traditional malware distribution methods. The EtherHiding technique observed involved social engineering, particularly using fake job listings to attract targets, many of whom were developers of cryptocurrency […]
Cybercriminals use fake Mac repair websites to distribute Shamos malware

A new and concerning malware campaign has emerged, specifically targeting Mac users globally. Researchers from Crowdstrike have identified a variant called Shamos, linked to a cybercrime group known as Cookie Spider. This attack employs Clickfix tactics, which entice victims, looking for Mac troubleshooting advice, to visit fake websites or GitHub repositories. These fraudulent sites urge […]