malware-analysis

Preview image for: ClickFix Exploited: Fake Temu Coin Airdrop Unleashes Stealthy RAT Backdoor

ClickFix Exploited: Fake Temu Coin Airdrop Unleashes Stealthy RAT Backdoor

Analysis of a fake Temu Coin airdrop leveraging ClickFix to install a stealthy remote-access backdoor. Learn defense strategies.
Preview image for: YARA-X 1.14.0: Elevating Threat Detection and Forensic Analysis with Precision and Performance

YARA-X 1.14.0: Elevating Threat Detection and Forensic Analysis with Precision and Performance

YARA-X 1.14.0 enhances threat detection with improved performance, advanced module extensibility, refined regex, and critical bug fixes.
Preview image for: Dark Reading Confidential: Unmasking an African Cybercrime Nexus – A Deep Dive into the Interpol-Led Takedown

Dark Reading Confidential: Unmasking an African Cybercrime Nexus – A Deep Dive into the Interpol-Led Takedown

Elite threat hunters, Interpol, and advanced forensics dismantle an African cybercrime syndicate, recovering millions and decrypting malware.
Preview image for: Fake FedEx Delivery Notification Delivers Malicious Payload: A Deep Dive into

Fake FedEx Delivery Notification Delivers Malicious Payload: A Deep Dive into "Donuts" Malware

Analysis of a sophisticated FedEx email scam delivering "Donuts" malware directly, bypassing typical phishing for deeper system compromise.
Preview image for: ATM Jackpotting Attacks: A Decade of Persistent Threat Evolution and Surging Losses in 2025

ATM Jackpotting Attacks: A Decade of Persistent Threat Evolution and Surging Losses in 2025

Unpacking the surge in ATM jackpotting attacks in 2025, costing banks over $20M, and the persistent tactics used by threat actors.
Preview image for: Remcos RAT Unleashed: Advanced Real-Time Surveillance & Evasion Techniques on Windows

Remcos RAT Unleashed: Advanced Real-Time Surveillance & Evasion Techniques on Windows

New Remcos RAT variant elevates real-time surveillance, introducing sophisticated evasion tactics to compromise Windows systems with unprecedented stealth.
Preview image for: DKnife Unveiled: A Deep Dive into Chinese-Made Malware Targeting Routers and Edge Devices

DKnife Unveiled: A Deep Dive into Chinese-Made Malware Targeting Routers and Edge Devices

Technical analysis of DKnife, a sophisticated Chinese malware framework exploiting routers and edge devices for reconnaissance and control.
Preview image for: Global SystemBC Botnet Found Active Across 10,000 Infected Systems: A Critical Threat to Sensitive Infrastructure

Global SystemBC Botnet Found Active Across 10,000 Infected Systems: A Critical Threat to Sensitive Infrastructure

SystemBC botnet infects 10,000 IPs, posing severe risks to government infrastructure. Analysis covers its capabilities and mitigation strategies.
Preview image for: Rising Tide: Chinese APTs Unleash Advanced Malware on Asian Organizations

Rising Tide: Chinese APTs Unleash Advanced Malware on Asian Organizations

Chinese APTs deploy new, high-end cyber weapons against Asian organizations, escalating regional cyber threats and demanding robust defenses.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics