Having taken a look at AppSuite in one of our last articles, we have started pulling on a few loose threads to see where it would take us. It turns out that there are relationships with other malicious programs –…
Tag: Security Blog G Data Software AG
AppSuite PDF Editor Backdoor: A Detailed Technical Analysis
Some threat actors are bold enough to submit their own malware as false positive to antivirus companies and demand removal of the detection. This is exactly what happened with AppSuite PDF Editor. Initially, automation flagged it as a potentially unwanted…
JustAskJacky: AI causes a Trojan Horse Comeback
Despite what some might want to make you believe, Trojan Horses used to be a rare breed in the last few years. But they are back, thanks to AI and LLMs. This article has been indexed from Security Blog G…
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
“Criminals go where the money flows.” This quote is indeed true among cybercriminals lately, as our team of Security Analysts discovered and examined a resurgence of malware deploying XMRig cryptominer in mid-April this year after a two-year hiatus. This article…
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware
Since March 2025 there has been a noticeable increase in infections and fake applications using validly signed ConnectWise samples. We reveal how bad signing practices allow threat actors to abuse this legitimate software to build and distribute their own signed…
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware
Since March 2025 there has been a noticeable increase in infections and fake applications using validly signed ConnectWise samples. We reveal how bad signing practices allow threat actors to abuse this legitimate software to build and distribute their own signed…
Reborn in Rust: AsyncRAT
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Reborn in Rust: AsyncRAT
Printer company provided infected software downloads for half a year
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Printer company provided infected software downloads for…
Sit, Fetch, Steal – Chihuahua Stealer: A new Breed of Infostealer
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Sit, Fetch, Steal – Chihuahua Stealer: A…
Sit, Fetch, Steal – Chihuahua Stealer: A new Breed of Infostealer
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Sit, Fetch, Steal – Chihuahua Stealer: A…