The new Coyote trojan variant attack uses a LNK file to execute a PowerShell command, which helps retrieve a PowerShell script for launching the trojan. This trojan obtains system details and an antivirus product list while attempting to bypass sandbox discovery, says a Fortinet FortiGuard Labs study.
Mobile Indian Cyber Heist: FatBoyPanel And His Massive Data Breach
The zLabs research team discovered a mobile malware campaign targeting Indian bank users. The malware is being distributed through WhatsApp and collects a user’s sensitive