Trojan:Win32/Vigorf.A

Trojan:Win32/Vigorf.A is able to infiltrate the computer system, install additional malware and remain undetected by antivirus programs.

Trojan:Win32/Vigorf.A is a generic detection of Microsoft Defender. This detection commonly identifies a running loader malware that may deal significant harm to the system. In this article, let’s find out how dangerous Vigorf.A is and how to get rid of it. What is Trojan:Win32/Vigorf.A? Trojan:Win32/Vigorf.A is the detection name that Microsoft Defender attributes to dropper/loader… Continue reading Trojan:Win32/Vigorf.A

Trojan:Win32/Znyonm

Trojan:Win32/Znyonm is a sign of backdoor malware active in the system

Trojan:Win32/Znyonm is a detection often seen during the backdoor malware activity in the background. Such malware can escalate privileges, enable remote access, or deploy more payloads. Let’s dive into this malicious program, understand how it works, and see how to remove it. Trojan:Win32/Znyonm Detection Overview Trojan:Win32/Znyonm is a detection associated with backdoor malware, usually the… Continue reading Trojan:Win32/Znyonm

Fortinet RCE Vulnerability Affects FortiClient EMS Servers

Critical vulnerability CVE-2023-48788 in FortiClient EMS, potentially allow remote code execution without authentication.

Fortinet disclosed a critical vulnerability affecting FortiClient EMS products in March 2024. This vulnerability, categorized as an SQL injection, poses a significant cybersecurity threat. Above all, it has the potential to allow remote attackers to execute arbitrary commands on administrative workstations. Fortinet SQLi Vulnerability Causes Remote Code Execution As I mentioned, the vulnerability is classified… Continue reading Fortinet RCE Vulnerability Affects FortiClient EMS Servers

Win32/Wacapew.C!ml Detection Analysis & Recommendations

Win32/Wacapew.C!ml can be a false positive, but I would not recommend ignoring it completely

Win32/Wacapew.C!ml detection refers to programs that have suspicious properties. This can be either a false positive or a detection of a program that has its properties & functions border with ones of a PUA. Let’s look into this and find out what this detection is. What is Win32/Wacapew.C!ml? Program:Win32/Wacapew.C!ml is a heuristic detection designed to… Continue reading Win32/Wacapew.C!ml Detection Analysis & Recommendations

PUABundler:Win32/uTorrent_BundleInstaller

Win32/uTorrent installer often turns out to be the source of numerous problems, including installation of unwanted software.

PUABundler:Win32/uTorrent_BundleInstaller is a Microsoft Defender detection that is associated with the installer of the once popular uTorrent client. It is detected by antiviruses because it contains a fair amount of additional software that is unwanted (PUA). Such programs can pose a security threat to your system. Let’s find out what’s wrong with it. Why is… Continue reading PUABundler:Win32/uTorrent_BundleInstaller

Adobe Reader Infostealer Plagues Email Messages in Brazil

Frauds use forged PDF documents to deploy infostealers

A recent email spam campaign reportedly spreads infostealer malware under the guise of Adobe Reader Installer. Within a forged PDF document, there is a request to install Adobe Reader app, that triggers malware downloading and installation. Considering the language of the said documents, this malicious activity mainly targets Portugal and Brazil. Infostealer Spreads in Fake… Continue reading Adobe Reader Infostealer Plagues Email Messages in Brazil

BianLian Exploits TeamCity Vulnerability to Deploy Backdoors

BianLian cybercriminals deploying PowerShell backdoors for covert system access and control.

BianLian, a group of cybercriminals known for their ransomware attacks, recently caught the attention of the information security community. By exploiting vulnerabilities in the JetBrains TeamCity platform, they managed to carry out multistage cyberattacks. Threat actors reportedly start their attack chain with a Golang-based backdoor, and work their way all the way to the ransomware… Continue reading BianLian Exploits TeamCity Vulnerability to Deploy Backdoors

PUA:Win32/Softcnapp Detection Analysis & Description

Although being an effective security tool, Microsoft Defender may sometimes display false alarms

PUA:Win32/Softcnapp is a generic detection name of Microsoft Defender, assigned to an unwanted program. It sometimes appears as false positive detections of a legit app, like a desktop Viber client, NZXT Cam app, and others. But is it really dangerous? Let’s find out. What is PUA:Win32/Softcnapp? PUA:Win32/Softcnapp is a detection name of an unwanted program,… Continue reading PUA:Win32/Softcnapp Detection Analysis & Description

Microsoft is Hacked, Again by Midnight Blizzard

The company claims being repeatedly hacked with the use of leaked auth secrets

Microsoft acknowledges being hacked for the second time this year, by the same Russia state-sponsored group Midnight Blizzard. The company confirms that this new breach is the outcome of the previous one, as hackers were able to get their hands on access secrets. Microsoft Hacked, Source Code Leaked In its K-8 filing to SEC, Microsoft… Continue reading Microsoft is Hacked, Again by Midnight Blizzard

Phantom Hacker Scams On The Rise, Target Elderly

Scams known as "Phantom hacker" that target seniors are increasing.

Phantom hacker scams is a specific type of fraud that aims at convincing the victim to transfer the funds due to the non-existent hacker threat. Over the last few months, such scams started targeting senior citizens, which can lead to significant financial losses. Let’s have a look at how this works, and how to avoid… Continue reading Phantom Hacker Scams On The Rise, Target Elderly