Posts
Showing posts from January, 2025
Malware
- Get link
- X
- Other Apps
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes. What are the 4 main types of malware? 4 Types of malware Virus. A virus can replicate itself and therefore spreads quickly as it attaches itself to another commonly used, legitimate program on a computer. ... Worm. Like a virus, worms are infectious and are designed by cybercriminals to replicate themselves. ... Botnets. ... Ransomware. 4 Types of malware Malware can go by many names. You’ve probably heard of some or all of the following common types of malware: Virus A virus can replicate itself and therefore spreads quickly as it attaches itself to another commonly used, legitimate program on a computer. A virus can also be transported. If the virus attaches to a music file, for instance, the virus goes with that file if it’s ...
etherium deploy RAT
- Get link
- X
- Other Apps
Cybersecurity researchers have discovered a malicious package on the npm package registry that masquerades as a library for detecting vulnerabilities in Ethereum smart contracts but, in reality, drops an open-source remote access trojan called Quasar RAT onto developer systems. The heavily obfuscated package, named ethereumvulncontracthandler , was published to npm on December 18, 2024, by a user named "solidit-dev-416." As of writing, it continues to be available for download. It has been downloaded 66 times to date. "Upon installation, it retrieves a malicious script from a remote server, executing it silently to deploy the RAT on Windows systems," Socket security researcher Kirill Boychenko said in an analysis published last month. The malicious code embedded into ethereumvulncontracthandler is obscured with multiple layers of obfuscation, leveraging techniques like Base64- and XOR-encoding, as well as minification to resist analysis and detection effort...