Get a Pentest and security assessment of your IT network.

News

[Malware Review] Trojan.PWS.KATES.AG

Trojan.PWS.KATES will create a copy of itself and move it to %userprofile%Templatesmemory.memory.tmp. The file access, creation and write times are replaced with those of the user32.dll file. The call to action is triggered once the Trojan is loaded along with the Internet browser the computer owner uses to access web pages. The Trojan also peeps at users passwords and at whatever other critical data they provide on the Internet, shipping it to the malware developers servers.”]

Source: https://www.bitdefender.com/blog/hotforsecurity/malware-review-trojan-pws-kates-ag-browsers-peeping-tom/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months