_ .. .. u dF dF 88Nu. u. uL .. x. . u. u. '88bu. .u . .u . u. x. . u. u. '88bu. '88888.o888c .@88b @88R .@88k z88u x@88k u@88c. '*88888bu .u .d88B :@8c uL .d88B :@8c ...ue888b .@88k z88u x@88k u@88c. '*88888bu ^8888 8888 '"Y888k/"*P ~"8888 ^8888 ^"8888""8888" ^"*8888N ud8888. ="8888f8888r .ue888Nc.. ="8888f8888r 888R Y888r ~"8888 ^8888 ^"8888""8888" ^"*8888N 8888 8888 Y888L 8888 888R 8888 888R beWE "888L :888'8888. 4888>'88" d88E`"888E` 4888>'88" 888R I888> 8888 888R 8888 888R beWE "888L 8888 8888 8888 8888 888R 8888 888R 888E 888E d888 '88%" 4888> ' 888E 888E 4888> ' 888R I888> 8888 888R 8888 888R 888E 888E 8888 8888 `888N 8888 888R 8888 888R 888E 888E 8888.+" 4888> 888E 888E 4888> 888R I888> 8888 888R 8888 888R 888E 888E .8888b.888P .u./"888& 8888 ,888B . 8888 888R 888E 888F 8888L .d888L .+ 888E 888E .d888L .+ u8888cJ888 8888 ,888B . 8888 888R 888E 888F ^Y8888*"" d888" Y888*" "8888Y 8888" "*88*" 8888" .888N..888 '8888c. .+ ^"8888*" 888& .888E ^"8888*" "*888*P" "8888Y 8888" "*88*" 8888" .888N..888 `Y" ` "Y Y" `Y" 'YP "" 'Y" `"888*"" "88888% "Y" *888" 888& "Y" 'Y" `Y" 'YP "" 'Y" `"888*"" "" "YP' `" "888E "" .dWi `88E 4888~ J8% ^"===*"`
archive | code | zines | papers | threat collection | apt collection | samples | supporters | contact
Botnets
Adylkuzz Cybereason detects Adylkuzz crypto-currency botnetusing DOUBLEPULSAR exploit in Japan The Adylkuzz Botnet – An Uninvited Guest
Bashlite Bashlite Updated with Mining and Backdoor Commands Neko, Mirai and Bashlite Target Routers,Devices Bashlite IoT malware upgrade lets it target WeMo home automation devices
Bondnet Bondnet Army
BrickerBot “BrickerBot” Results In Permanent Denial-of-Service
Mobile Malware
Android Malware
Acecard The banking trojan – Acecard Acecard Trojan: Android Users of Over 30 Banking and Payment Apps at Risk The evolution of Acecard Android trump card: Acecard
Agent Smith ‘Agent Smith’ infects 25M Android devices “Agent Smith”: The New Virus to Hit Mobile Devices “Agent Smith”: The New Virus to Hit Mobile Devices [Other] Agent Smith Malware Infecting Android Apps, Devices for Adware
iOS Malware
DualToy DualToy: New Windows Trojan Sideloads Risky Apps to Android and iOS Devices
Fusob Ransomware on mobile devices: knock-knock-block KSN Report: Mobile ransomware in 2014-2016 Mobile malware evolution 2015
Pegasus Pegasus for Android A Hacking Group Is Selling iPhone Spyware to Governments
Wirelurker WireLurker Apple Malware Targets Mac OS X Then iOS
X-Agent Fancy Bear Tracks Ukrainian Artillery Pawn Storm Update: iOS Espionage App Found XAgentOSX: Sofacy’s XAgent macOS Tool
XcodeGhost Malware XcodeGhost Infects 39 iOS Apps, Including WeChat, Affecting Hundreds of Millions of Users More Details on the XcodeGhost Malware and Affected iOS Apps Novel Malware XcodeGhost Modifies Xcode, Infects Apple iOS Apps and Hits App Store Update: XcodeGhost Attacker Can Phish Passwords and Open URLs through Infected Apps
YiSpecter YiSpecter: First iOS Malware That Attacks Non-jailbroken Apple iOS Devices by Abusing Private APIs
Ransomware
Trojans
ATM Malware
Cryptocurrency-Mining Malware
Exploit Kits
Industrial Control Systems Malware
MacOS Malware
Point-Of-Sale Malware
.d- . :d-h/ - . `+ +h```yo /- . -/ h. ss :N/ os `d :: .` o+ oyy+ +MMMo /hys /s . /: ho ` /N: sMMNMMy`:N+ ` +d` :/ :y- .Ns /oh-`hMMy`sMMh`-ho+ oN. .y/ `:- -ds` o./My+d..dMMo +MMm.`hosM/`o``od- -:. -o+` ``ym/-m+sMy`-mMN/ /NMN:`sMy+m-/mh.` `/o- :yy: :o:oNdyMms`/NMN: -mMN+ omMyhNs:o: :sy:` ---` `:hdo/ddhMMM+ oNMm- .dMMo`/NMMhdd/+dh/` --- `.+o+-` /+/+dNdNMMN:`sMMh. `hMMy`:NMMMdNdo//. `-+o+-` `-ohho+ydmNMMMm-`hMMy` `sMMh..dMMMNmy+:+yho:` ..` .:/sdmmMMMMd..dMMo +NMm-`hMMMNdmds/:. ..` `.:+++/:--:ohdmMMMMy`:mMN/ .-://+//:-.` /NMN:`sMMMMmdhs/--:/+++:.` `.:+syhddmMMMMs`/NMm:`-+ydmNmmdddmmNmdy+-`-mMN+`oMMMMmdddhs+:.` -:+oydMMMN+`oNMm+sdNMmy+:::----::/sdNNms+mMMo`/NMMMdys+:- ..--::::::/+shNMMN:`sMMMmNMMmhyhdhhNNNNNdhhhyyhNMMmMMMy`:mMMNhs+/::::::--.. ``..-:/+oshdmNMm-`hMMMMMMNdhosMo.yMMMMMm./Mh+ydNMMMMMMd..dMNmdyso+/:-..`` `:+sydMh..dMMMMNs:-` /Mo yMMMMMm :M/ `.:oNMMMMm-`hMdys+:. ``..-:/oyhmy`:mMNsdMMd+. `hN/./ydho.-mh .+dMMmsNMN:`smdyo/:-..`` .-:://+++++omo`/NMm: `/hNMNh/.``+dhs+//ohdo``./ymMNh/` -mMN+`omo+++++//::-. -om+`oMMd. -odNMNds+:+oyyys+/+sdNMNdo- .dMMs`/do- `./h:`yMMh` -/ydmNMMNmmmNMMNNdy+- `yMMy`-h/.` ``-/oohm-.hMMs` .-:+oosoo+/-. sMMd..ddoo/-`` ...` /y.-dMNo +NMm-`y+ `..` +y`:NMMmsssssssssssssssssssssssssssssssssssssssssssssssmMMN/`so` `so :mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm: +y` `hy--:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::--sh` ./////////omd+/sdohMmyMNMMMMMMMMMMMMMMMMMMMMMNMhmMh+hs/+hmo/::::::::. .+o- .`oNs-mssMdmMmMMMMMMMMMNMmMNhMssm-oNs`. -oo. `-:` `hh. o--Nh.NoyMoNmsMymN+Mh+M-hM:-s .yh. `::` -h: `mh`/o Nm d//M+:m dN`++ ym` ` :h- ` :+` yy . -M: o -M: o -M: . sh +/ .. /s oh `M. ys o+ `- .+ h. N` .d +- . `s h o. . -` + :