Malicious software, or malware, is a piece software made to damage a computer or a network. Malware operates from within the targeted system and needs to be implanted into it before the execution of its program. Trojan malware is one of the most popular damaging tools, which is usually executed by the misled user themself. An executed trojan can offer hackers the opportunity to access a user’s private information, install some mining malware or encryption malware without the target’s knowledge about it. Malware can be used for various purposes, such as to damage system maintenance, or to gain access to trade secrets or to secret government information. Bitcoin-stealing malware and other cryptocurrency-targeted programs are also widely used alongside the malware for stealing fiat money. The problem of malware for businesses and users becomes more concerning with the growing speed of IT-implementation into daily life.
The SharkBot malware family was first discovered last October and has continued to evolve with new ways to hack into users’ Android-based crypto and bank apps.
Crypto app targeting SharkBot malware resurfaces on Google app store
Dressed up as legitimate desktop software, this sneaky malware has infected thousands of machines across 11 countries, forcing them to unknowingly mine Monero (...
Sneaky fake Google Translate app installs crypto miner on 112,000 PCs
The developer who found the vulnerability requested developers sign their revisions with the GPG key to ensure all their revisions on the project can be verifie...
GitHub faces widespread malware attacks affecting projects, including crypto
Blockchain security firm Halborn has warned users of the latest phishing emails doing the rounds.
Blockchain security firm warns of new MetaMask phishing campaign
The malware targets Zcash and Ethereum wallets alongside Electrum, Atomic Wallet and Coinomi, it takes your browser extension and login data and reads your chat...
PennyWise crypto-stealing malware spreads through YouTube
As the crypto community notices and calls out such scams, the fraudsters tend to turn off replies to their tweets to prevent being exposed as scammers.
Ape-themed airdrop phishing scams are on the rise, experts warn
The scheme, which has been in operation since May 2021, targeted Chinese users through social media groups and fake websites.
13 apps removed after researchers uncover Trojan crypto wallet scheme