Trojan

Alrucs Service Trojan screenshot

Alrucs Service Trojan

The designator and name "Alrucs Service" represent a generic descriptor for theoretically any executable file present on a Windows computer, which could either be a legitimate file utilized by the applications... Read more

April 3, 2024
Greenbean Banking Trojan Targets Android Users screenshot

Greenbean Banking Trojan Targets Android Users

Greenbean, identified as a banking trojan, specifically targets Android operating systems and has been in existence since at least 2023. This malicious software is designed to focus on acquiring banking and... Read more

February 16, 2024
How To Safely Detect and Remove the Win32/Floxif Trojan Horse Threat from Your PC screenshot

How To Safely Detect and Remove the Win32/Floxif Trojan Horse Threat from Your PC

The Win32/Floxif Trojan Horse is a notorious malware known for its stealthy ability to create unauthorized access points within an infected system, allowing remote control and execution of malicious activities by... Read more

December 15, 2023
AIRAVAT RAT Sneaks Onto Android Devices screenshot

AIRAVAT RAT Sneaks Onto Android Devices

AIRAVAT is a Remote Access Trojan (RAT) designed to target Android devices. This type of malware operates by allowing remote access and control over the compromised devices. AIRAVAT encompasses a wide range of harmful... Read more

September 14, 2023
What is Doplik Malware? screenshot

What is Doplik Malware?

Doplik, a dangerous Trojan Clicker, is a name that signifies its ability to hijack your clicks for malicious purposes. Being a Trojan Horse, Doplik is also capable of gathering various types of information from your... Read more

June 27, 2023
Computer Security Experts Discover NodeStealer Malware Designed To Steal Sensitive Data From an Infected PC screenshot

Computer Security Experts Discover NodeStealer Malware Designed To Steal Sensitive Data From an Infected PC

NodeStealer is a dangerous Trojan horse malware that is designed to steal sensitive information from infected systems. This malware is particularly harmful because it can remain undetected for extended periods of... Read more

May 8, 2023
Narnia RAT Scrapes Various Information from Victims screenshot

Narnia RAT Scrapes Various Information from Victims

Narnia, identified as a remote administration Trojan (RAT), possesses a variety of harmful functionalities, comprising the theft of sensitive data, screen capturing, keystroke logging, and banking information... Read more

April 2, 2024
Atructis Malware screenshot

Atructis Malware

The Atructis malicious app is a cunning Trojan that seeks to quietly infiltrate systems, utilizing sophisticated methods to exfiltrate sensitive data. It may evade conventional security measures, clandestinely... Read more

January 5, 2024
What is the Zegost Trojan Horse? screenshot

What is the Zegost Trojan Horse?

The Zegost Trojan Horse is a malicious software that has been in circulation since approximately 2011. Known for the persistence and ingenuity of its associated threat actors, Zegost utilizes various exploits to... Read more

December 14, 2023
XWorm RAT Malware Could Steal Your PC Data screenshot

XWorm RAT Malware Could Steal Your PC Data

XWorm is a highly dangerous and malicious remote administration/access Trojan (RAT) used by cybercriminals to gain unauthorized access and control over victims' computers. As a RAT, it allows attackers to remotely... Read more

August 4, 2023
What is the Dispout Trojan? screenshot

What is the Dispout Trojan?

Trojan malware is a highly perilous form of malicious software that frequently masquerades as legitimate or harmless files or programs, aiming to deceive users and attain unauthorized entry into their systems. Despite... Read more

June 9, 2023
Beware! AuKill Malware May Secretly Load On Your PC To Gain Remote Access screenshot

Beware! AuKill Malware May Secretly Load On Your PC To Gain Remote Access

AuKill malware, also known as AutoKill Trojan, is a malicious program that belongs to the Trojan horse category. It is designed to silently infiltrate a victim's computer system and perform various malicious... Read more

May 8, 2023
Ousaban Banking Trojan Used in Phishing Attacks screenshot

Ousaban Banking Trojan Used in Phishing Attacks

Security experts are cautioning about a surge in email phishing attacks utilizing the Google Cloud Run service to distribute various banking trojans like Astaroth (also known as Guildma), Mekotio, and Ousaban (aka... Read more

February 26, 2024
How To Stop and Remove QuickTune Computer screenshot

How To Stop and Remove QuickTune Computer

QuickTune Computer is an unwanted code belonging to the Trojan Horse category, designed with the intent to deceive users by posing as harmless software or enticing applications. This type of malware operates by... Read more

December 19, 2023
ValleyRAT Seeks Vulnerable Computers to Give Remote Access to Hackers screenshot

ValleyRAT Seeks Vulnerable Computers to Give Remote Access to Hackers

ValleyRAT is a newly discovered malware that has become a concern within the cybersecurity community. This article explores what ValleyRAT is, its capabilities, potential damage, and how it infiltrates computers.... Read more

September 22, 2023
What is Shafmia Malware? screenshot

What is Shafmia Malware?

Trojan.Shafmia.A poses a significant threat to your device, carrying the potential for extensive harm, including file theft, alteration, and erasure. Moreover, it grants unauthorized access to sensitive information... Read more

July 20, 2023
Why TurkoRat Remote Access Tool is Extremely Dangerous on Your Computer screenshot

Why TurkoRat Remote Access Tool is Extremely Dangerous on Your Computer

In the realm of cybersecurity, new threats emerge regularly, targeting unsuspecting users and organizations alike. One such threat is TurkoRat, a versatile malware that functions as a Trojan horse, password-stealing... Read more

May 24, 2023
Oneetx.exe Trojan Horse May Expose Your PC To Other Malware Infections screenshot

Oneetx.exe Trojan Horse May Expose Your PC To Other Malware Infections

Identifying a Trojan such as Oneetx.exe can be a challenging task for users as they often remain undetected until they have executed their malicious activity. This is the reason why Trojans have a high success rate,... Read more

April 12, 2023
Loading...