The PrivateLoader pay-per-install malware downloader service was discovered dropping the RisePro information stealer.
RisePro is written in C++ and contains similar functionality found in the Vidar malware family.
Several sets of logs for sell have been stolen by RisePro and uploaded to the illicit underground market Russian Market.
Sign Up For Threat Alerts
Feb 05, 2023
Trigona Ransomware Analysis
Trigona ransomware appeared on the threat landscape in late 2022 and threatens to release stolen...
Feb 02, 2023
Ukraine CERT-UA: Compromised Email Address Used To...
An adversary was discovered using a compromised e-mail address to send phishing emails with a...
Feb 01, 2023
Ukraine Government Sector Targeted With The DolphinCape...
The government sector of Ukraine was targeted with spear-phishing emails with a malicious attachment which...
Feb 01, 2023
Ukraine Government Sector Targeted With The DolphinCape...
The government sector of Ukraine was targeted with spear-phishing emails with a malicious attachment which...
Jan 31, 2023
Multiple Malware Variants Distributed Through Microsoft OneNote
Spear-phishing emails with malicious Microsoft OneNote attachments were discovered delivering variants from the AsyncRAT, Formbook¸...
Jan 30, 2023
Playing Whack-a-Mole With New Dharma Ransomware Variants
The Dharma ransomware family was initially identified in 2016 and operates as a Ransomware-as-a-Service (RaaS)...
Jan 29, 2023
APT15 Targets Multiple Sectors With Turian Backdoor
APT15, also known as Playful Taurus, is an advanced persistent threat (APT) that conducts a...
Jan 26, 2023
Vice Society Ransomware Group Targets Manufacturing Companies
The Vice Society threat group was discovered targeting multiple sectors including manufacturing companies in Brazil....
Jan 26, 2023
US Cert Alert – Alert (AA23-025A) Protecting...
Although this campaign appears financially motivated, the authoring organizations assess it could lead to additional...
Jan 25, 2023
Emotet Malware Makes a Comeback with New...
The Emotet malware operation has continued to refine its tactics in an effort to fly...
Jan 25, 2023
DragonSpark
The DragonSpark attacks represent the first concrete malicious activity where Analysts observe the consistent use...
Jan 25, 2023
PLAY Ransomware
PLAY is simple but heavily obfuscated with a lot of unique tricks that have not...
Jan 24, 2023
Gamaredon Abuses Telegram To Target Ukrainian Government...
The Gamaredon APT group was discovered targeting Ukrainian government entities using the Telegram messaging service...
Jan 23, 2023
NeedleDropper: A New Dropper-as-a-Service Uncovered
Avast's Threat Research Team has since October 2022 been observing a new strain of dropper...
Jan 22, 2023
Aurora Stealer Leverages Shapeshifting Tactics And Popular...
A threat actor was discovered mimicking legitimate websites to host and deliver the 9002 RAT,...