Talking to a malware author is a rare occurrence, something most analysts hear about but rarely experience themselves. Identifying the individual behind a malware campaign is often one of the most difficult aspects of threat research. In this case, what…
Category: Security Blog G Data Software AG
Sweet Minecraft Mods – The Dark Tale of SugarSMP Scam, Malware & Extortion
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Sweet Minecraft Mods – The Dark Tale…
Sweet Minecraft Mods – The Dark Tale of SugarSMP Scam, Malware & Extortion
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Sweet Minecraft Mods – The Dark Tale…
Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
The vector is deceptive. The Loader is sophisticated and at this point, it’s already game over. This article has been indexed from Security Blog G Data Software AG Read the original article: Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
NIS-2: What the end of the registration period means for management teams
March 6, 2026, marks the end of the registration period for companies that fall under the NIS-2-Directive. Registration with the “Bundesamt für Sicherheit in der Informationstechnik” (BSI) will transform the regulatory transition period into a binding supervisory situation. This will…
Use of LLMs for Malware Analysis: Doing it the right way
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Blog G Data Software AG Read the original article: Use of LLMs for Malware Analysis: Doing…
Free Games, Costly Consequences
PiviGames, a popular Spanish gaming platform is well-known in the gaming community for providing download links to pirated PC games. Such a platform offers attractive content and it has built a reputation within the gaming community over the years. However,…
“Managed SOC from G DATA CyberDefense is expert protection for everyone, around the clock from Germany”
Oberberg-Online Informationssysteme GmbH is a long-standing G DATA sales partner and relies on the Managed Security Operations Centre (SOC) solution from the German cyber defence specialist. In our series ‘The minds behind G DATA Managed SOC’, Dirk Zurawski talks about…
Testing with live malware: Good Intentions, Problematic Execution
Using AI to contain threats is a logical step in technological development. Testing countermeasures is also a good idea to ensure they work as intended. It becomes problematic, however, when real malware is used for testing. This article has been…
OpenClaw: Hit the ground running, with security lagging behind
OpenClaw has cause quite the stir among AI enthusiasts during the past few weeks – and it has also been cause for a few more gray hairs among security experts. But what is the whole hoopla about with OpenClaw? This…
Officials sound the alarm: Phishing attacks on politicians, journalists via Signal messenger
Attackers believed to be state-sponsored are currently attempting to take control of Signal accounts belonging to politicians, journalists, and other high-profile individuals in Germany and across Europe. In doing so, they pose, for example, as a Signal support chatbot. This…
Browser Hijacking: Three Technique Studies
If you are searching for technical information on how browser hijacking works, some generic removal instructions is all you’ll probably find. Let’s change that. This article has been indexed from Security Blog G Data Software AG Read the original article:…
Lumma Stealer: Danger lurking in fake game updates from itch.io and Patreon
After patches on mainstream gaming platforms like Steam, indie game platforms as well as Patreon have become the latest platforms for distributing malware. This article has been indexed from Security Blog G Data Software AG Read the original article: Lumma…
Arkanix Stealer: Newly discovered short term profit malware
Recently, we stumbled upon a new stealer named Arkanix. This stealer possibly belongs to the short-lived category of stealers which aim for short-term quick financial gains. This article has been indexed from Security Blog G Data Software AG Read the…
BlockBlasters: Infected Steam game downloads malware disguised as patch
A 2D platformer game called BlockBlasters has recently started showing signs of malicious activity after a patch release on August 30. While the user is playing the game, various bits of information are lifted from the PC the game is…
AppSuite, OneStart & ManualFinder: The Nexus of Deception
Having taken a look at AppSuite in one of our last articles, we have started pulling on a few loose threads to see where it would take us. It turns out that there are relationships with other malicious programs –…
AppSuite, OneStart & ManualFinder: The Nexus of Deception
Having taken a look at AppSuite in one of our last articles, we have started pulling on a few loose threads to see where it would take us. It turns out that there are relationships with other malicious programs –…
AppSuite PDF Editor Backdoor: A Detailed Technical Analysis
Some threat actors are bold enough to submit their own malware as false positive to antivirus companies and demand removal of the detection. This is exactly what happened with AppSuite PDF Editor. Initially, automation flagged it as a potentially unwanted…
JustAskJacky: AI causes a Trojan Horse Comeback
Despite what some might want to make you believe, Trojan Horses used to be a rare breed in the last few years. But they are back, thanks to AI and LLMs. This article has been indexed from Security Blog G…
Digging Gold with a Spoon – Resurgence of Monero-mining Malware
“Criminals go where the money flows.” This quote is indeed true among cybercriminals lately, as our team of Security Analysts discovered and examined a resurgence of malware deploying XMRig cryptominer in mid-April this year after a two-year hiatus. This article…