The new Coyote trojan variant attack uses a LNK file to execute a PowerShell command, which helps retrieve a PowerShell script for launching the trojan. This trojan obtains system details and an antivirus product list while attempting to bypass sandbox discovery, says a Fortinet FortiGuard Labs study.
Researchers Flag Crypto-Stealing Malware in Google and Apple Apps
Cybersecurity researchers have discovered a cross-platform malware campaign named “SparkCat” that targets cryptocurrency wallet recovery phrases through malicious mobile apps. Cybersecurity researchers at Kaspersky first