IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

trojans

CronRat Magecart malware uses 31st February date to remain undetected
Cronrat strikes Linux
malware

CronRat Magecart malware uses 31st February date to remain undetected

The malware allows for server-side payment skimming that bypasses browser security
26 Nov 2021
What is Emotet?
Trojan horse on a red laptop screen with blind justice in front of it
hacking

What is Emotet?

A deep dive into one of the most infamous and prolific strains of malware
16 Nov 2021
Mekotio trojan continues to spread despite its operators’ arrests
Red horse image imposed atop a circuitboard
trojans

Mekotio trojan continues to spread despite its operators’ arrests

Hackers have used it in 100 more attacks since arrests
4 Nov 2021
“Trojan Source” hides flaws in source code from humans
Toy horse on a digital screen to symbolise the attack of the Trojan virus
trojans

“Trojan Source” hides flaws in source code from humans

Organizations urged to take action to combat the new threat that could result in SolarWinds-style attacks
2 Nov 2021
Android Trojan charges millions of victims €36 per month
The Google Play Store application as shown on a smartphone display
trojans

Android Trojan charges millions of victims €36 per month

Up to 10 million users across 70 countries are thought to have been affected
30 Sep 2021
What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
27 Aug 2021
Fake AnyDesk Google ads deliver malware
Malware under a magnifying glass
malware

Fake AnyDesk Google ads deliver malware

Malware pushed through Google search results
28 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Trojan virus within binary code
Security

Hackers use open source Microsoft dev platform to deliver trojans

Microsoft's Build Engine is being used to deploy Remcos password-stealing malware
14 May 2021
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
trojans

Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web

The source code for the authenticator-breaking malware is available for free on underground forums
18 Sep 2020
Qbot malware surges into the top-ten most common business threats
Trojan virus within binary code
trojans

Qbot malware surges into the top-ten most common business threats

An evolved form of the banking Trojan was distributed by number one-ranking Emotet in a campaign that hit 5% of businesses globally
9 Sep 2020
BlackRock banking Trojan targets Android apps
Toy horse on a digital screen to symbolise the attack of the Trojan virus
trojans

BlackRock banking Trojan targets Android apps

Trojan steals login credentials and credit card information and has targeted more than 300 apps
27 Jul 2020
Researchers detail Tetrade family of Brazilian banking trojans
Toy horse on a digital screen to symbolise the attack of the Trojan virus
hacking

Researchers detail Tetrade family of Brazilian banking trojans

Researchers predict banking trojans will continue to evolve and take on new targets
16 Jul 2020
Four steps to exterminating RATs controlling your computer
Red horse image imposed atop a circuitboard
trojans

Four steps to exterminating RATs controlling your computer

Unless actively pursued, damaging remote access trojans have the ability to live years undetected
29 Apr 2020
Decade of the RATs - remote access trojans
whitepaper
Whitepaper

Decade of the RATs - remote access trojans

Cross-platform APT espionage attacks targeting Linux, Windows and Android
27 Apr 2020
Threat groups relying on trojanized apps to spread surveillanceware
malware

Threat groups relying on trojanized apps to spread surveillanceware

Apurva Kumar shows how Monokle is spreading its surveillanceware
24 Apr 2020
National Crime Agency brings down prolific Trojan marketplace
Trojan
trojans

National Crime Agency brings down prolific Trojan marketplace

Imminent Methods sold IM-RAT malware for as little as $25
2 Dec 2019
Malware spread through the Windows update mechanism
Trojan
trojans

Malware spread through the Windows update mechanism

By using the Windows update delivery system, the malicious traffic of this trojan can evade firewalls
10 Sep 2019
Trickbot now uses Excel to steal passwords and browser data
The Microsoft Excel app on a mobile phone with headphones plugged in
malware

Trickbot now uses Excel to steal passwords and browser data

The banking trojan has pivoted from stealing victims’ financial details to credentials and web history
12 Nov 2018
Infected Android apps back on Google Play after name change
A red Android mascot
malware

Infected Android apps back on Google Play after name change

Symantec discovers seven malicious apps sneaked back onto Google Play with different names
14 May 2018
Cryptocurrency miners: the latest tool for cyber criminals
digital currency

Cryptocurrency miners: the latest tool for cyber criminals

Learn more about the new form of cyber crime that is being driven by cryptocurrency fever
13 Feb 2018
76% of local governments suffered a cyber attack in 2017
cyber attacks

76% of local governments suffered a cyber attack in 2017

Many IT professionals are unsure how to combat the rise in attacks
8 Feb 2018
Free Trojan kit includes a backdoor that spies on hackers
Security

Free Trojan kit includes a backdoor that spies on hackers

The flaw allows a single author to wrestle control of infected systems away from hackers
1 Sep 2017