Netcrook Logo

Tag: Malware

161 article(s)

Malware for Hire: How Google Crushed the IPIDEA Proxy Network

30 Jan 2026 news

Google led a global crackdown on IPIDEA, a sprawling proxy network that secretly hijacked millions of devices for cybercrime. Learn how malware-laced apps turned ordinary users into unwitting accomplices—and why vigilance is vital.

#Malware | #Cybercrime | #Google

How Matanbuchus Malware Outsmarts Antivirus with Modular Evasion

29 Jan 2026 news

Matanbuchus, a notorious Malware-as-a-Service, has reinvented itself with modular upgrades and advanced evasion tactics. Learn how this evolving threat bypasses antivirus defenses and enables ransomware attacks.

#Matanbuchus | #Malware | #Ransomware

eScan Antivirus Update Server Breach: Supply Chain Attack Delivers Malware Worldwide

29 Jan 2026 news 🌍 Asia

A supply chain compromise of eScan’s update servers delivered malicious payloads to users globally, disabling antivirus protection and leaving thousands in urgent need of manual remediation.

#eScan | #supply chain attack | #malware

Hijacked Google Ads Deliver Mac Malware Disguised as Disk Cleaners

29 Jan 2026 news 🌍 North America

Cybercriminals are leveraging hijacked Google Ads accounts to distribute malware disguised as Mac cleaning utilities, using Apple-themed landing pages and sophisticated obfuscation techniques to compromise macOS systems.

#Malware | #Google Ads | #macOS

Matanbuchus Malware Evolves to Outsmart Antivirus: Inside Its Stealth Tactics

29 Jan 2026 news

The Matanbuchus malware is rewriting the rules of digital stealth, constantly morphing its code and delivery techniques to evade antivirus tools and enable ransomware campaigns. Learn how this shape-shifting threat operates—and how defenders can respond.

#Matanbuchus | #malware | #cybersecurity

eScan Antivirus Update Server Breach: How Hackers Turned Protection Into a Threat

29 Jan 2026 news 🌍 Asia

In January 2026, hackers hijacked eScan’s update servers to push malware to unsuspecting users, demonstrating the dangers of supply chain attacks on trusted cybersecurity tools.

#eScan | #malware | #supply chain attack

Google Search Turned Trap: Inside the SEO Poisoning Malware Epidemic

28 Jan 2026 news 🌍 Asia

Hackers are exploiting Google search with SEO poisoning, placing fake sites at the top of results to deliver stealth malware alongside real software. Discover how the attack chain works, who's at risk, and how to stay safe.

#SEO poisoning | #malware | #cybercrime

CoolClient Reloaded: Mustang Panda’s New Infostealers Target Governments

28 Jan 2026 news 🌍 Asia

Mustang Panda’s latest CoolClient malware variant is targeting Asian and Russian government networks with advanced infostealers and stealthy data exfiltration techniques, raising the stakes in global cyber-espionage.

#Mustang Panda | #cyber-espionage | #malware

Stanley Toolkit Exposes Chrome Users to Stealth Phishing Attacks

28 Jan 2026 news 🌍 Europe

A new toolkit called Stanley is turning Chrome extensions into undetectable phishing tools, letting attackers overlay fake pages on real sites while keeping the real URL visible. Even Google’s review process can’t stop these malicious add-ons, making browser-based attacks more dangerous than ever.

#Malware | #Phishing | #Browser Extension

Inside ClickFix: Fake CAPTCHAs and Microsoft Scripts Fuel a New Breed of Stealth Malware

28 Jan 2026 news

ClickFix attacks now use fake CAPTCHAs, Microsoft App-V scripts, and trusted web services to distribute advanced malware like Amatera Stealer. Discover how these sophisticated campaigns outsmart security tools by blending into legitimate workflows.

#ClickFix | #Cybersecurity | #Malware