# Tags
Ficker Stealer Malware tricks people into getting passwords

Ficker – An Info-Stealer Malware that tricks people to get their passwords

Credential stealer malware is the most prevalent types of malware used in cyber-attacks. We have seen a lot of new stealer malware in the wild. The main objective of all credential stealer malware is to collect all confidential and sensitive information like user credentials and financial information. Ficker Stealer is a family of information-stealing malware […]

Beware! Hackers target users with fake COVID-19 vaccine registration app

Have you received an SMS with a link that says, “Register for vaccine using COVID-19 app”? Well, beware! It’s fake – and probably riddled with malware. The government of India started with the COVID-19 vaccination drive for everyone above 18, but consumers are facing problems in booking a slot due to a shortage in vaccines. […]

Alert! Wormable Android malware is spreading through social media applications

Autoreply is a convenient feature through which users can send a custom message as an automatic reply for unanswered incoming email, SMS, WhatsApp messages, and more. There are many applications on Google Play Store which offers such functionality. We have recently noticed malicious applications which are abusing this particular functionality. Fig 1. Content used for […]

Fake app REVIEWS AND RATINGS

Malicious malware impacting reviews and ratings of application

COVID-19 pandemic has confined a big part of the population indoors, doing their work and daily chores online. This has had a direct impact on mobile app usage trends, especially among on-demand mobile apps. Mobile applications have become a necessity for varied purposes, including video conferencing, communicating, attending online classes, streaming services, playing games, ordering […]

Zloader: Entailing Different Office Files

Zloader aka Terdot – a variant of the infamous Zeus banking malware is well known for aggressively using “.xls”, “.xlsx” documents as its initial vector to deliver its payload. Despite this, recently we have come across “.docm” file which is being used by Zoader family to perform its initial activity. This shows adversaries like to […]