Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Trojan

Below you will find reports with the tag of “Trojan”

image from 2021 Mid-year Threat Landscape Report

2021 Mid-year Threat Landscape Report

This report represents Deep Instinct’s current view of the threat landscape and trends seen between the period January – June 2021 and provides concrete data to verify the credibility of these developments. The information was sourced from our repositories which are routinely analyzed as we continuously protect our customers from unending and varied attacks.

(more available)
Added: March 7, 2023
image from 2022 Cyber Threat Landscape Report

2022 Cyber Threat Landscape Report

This report represents Deep Instinct’s current view of the threat landscape, showcasing trends seen throughout the course of the past year and providing concrete, actionable data to verify the credibility of these developments. The information was sourced from our data repositories, which are routinely analysed as part of protecting our customers from ceaseless attacks.

(more available)
Added: March 7, 2023
image from Threat Report T2 2022

Threat Report T2 2022

In T2 2022, we saw the continuation of the sharp decline of Remote Desktop Protocol (RDP) attacks, which likely continued to lose their steam due to the Russia-Ukraine war, along with the post- COVOD return to offices and overall improved security of corporate environments. Even with declining numbers, Russia IP addresses continued to be responsible for the large portion of RDP attacks.

(more available)
Added: February 22, 2023
image from Threat Report T3 2022

Threat Report T3 2022

The final months of 2022 were bustling with interesting ESET research findings. Our researchers discovered a MirrorFace spearphishing campaign against high-profile Japanese political entities, and new ransomware named RansomBoggs that targets multiple organizations in Ukraine and has Sandworm’s fingerprints all over it. ESET researchers also discovered a campaign conducted by the infamous Lazarus group that targets its victims with spear-phishing emails containing documents with fake job offers; one of the lures was sent to an aerospace company employee.

(more available)
Added: February 22, 2023
image from Mobile Banking Heists: The Global Economic Threat

Mobile Banking Heists: The Global Economic Threat

In this report, we examine 10 prolific banking trojans targeting Android mobile apps of users worldwide, detailing their features and capabilities. We also detail what makes each malware family different highlighting the unique and advanced malicious features that make each banking trojan family unique. A complete list of all 639 financial applications covering banking, investment, payment, and cryptocurrency services and the different banking trojan families targeting each is provided in Appendix A.

(more available)
Added: June 21, 2022
image from 2021 Cyber Security Threat Trends

2021 Cyber Security Threat Trends

The data used in this report comes from Cisco Umbrella, Cisco’s cloud delivered security service that includes DNS-layer security, secure web gateway, firewall, cloud access security broker (CASB) functionality, and threat intelligence.

(more available)
Added: December 9, 2021
image from ESET Threat Report Q4 2020

ESET Threat Report Q4 2020

This report reflects on the key threats that emerged or expanded in the 4th quarter of 2020.

Added: February 24, 2021
image from 2020 State of Encrypted Attacks

2020 State of Encrypted Attacks

This report shares key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.

Added: December 1, 2020
image from BlueVector Threat Report Q1 2018

BlueVector Threat Report Q1 2018

From the report, “To put the relentlessness of attacks and the attackers perpetrating them into perspective, it has been reported that the global cybercrime economy generates an annual profit of $1.5 trillion or roughly the same as Russia’s GDP. To use an old cybersecurity adage, attackers only need to succeed once to compromise your network, defenders need to succeed every time. These facts and the events of Q1 2018 reinforce the reality that threat actors have no intention of scaling back their attacks. It is important not to be distracted by coverage given to one attack vector or class of attack – distraction has been a powerful tool in the arsenals of attackers for centuries… just think about why malware trojans are so named.”

(more available)
Added: February 5, 2019
image from Threat Actors Target Government of Belarus Using CMSTAR Trojan

Threat Actors Target Government of Belarus Using CMSTAR Trojan

Palo Alto Networks Unit 42 has identified a series of phishing emails containing updated versions of the previously discussed CMSTAR malware family targeting various government entities in the country of Belarus. We first reported on CMSTAR in spear phishing attacks in spring of 2015 and later in 2016. In this latest campaign, we observed a total of 20 unique emails between June and August of this year that included two new variants of the CMSTAR Downloader. We also discovered two previously unknown payloads. These payloads contained backdoors that we have named BYEBY and PYLOT respectively.

(more available)
Added: November 15, 2018
image from Insider Information An intrusion campaign targeting Chinese language news sites

Insider Information An intrusion campaign targeting Chinese language news sites

This report reveals a campaign of reconnaissance, phishing, and malware operations that use content and domains made to mimic Chinese language news websites

(more available)
Added: November 12, 2018
image from Qadars Banking Trojan: A Notoriously Sophisticated Crimware Trojan

Qadars Banking Trojan: A Notoriously Sophisticated Crimware Trojan

The Qadars Banking Trojan has been observed globally targeting well-known banks since 2013. The research in this white paper provides a detailed analysis of the banking trojan, discussing the obfuscation techniques, domain generation algorithm (DGA), communication protocols and data formatting, and social engineering techniques employed by the trojan.

(more available)
Added: October 26, 2018
image from Blackmoon Banking Trojan Overview

Blackmoon Banking Trojan Overview

The Blackmoon Banking Trojan was thought to be shut down in 2016. However, it has re-emerged. This paper provides a brief analysis of the revamped trojan.

(more available)
Added: October 24, 2018
image from The Current State Of Mobile Malware

The Current State Of Mobile Malware

This report will take you through the most common malware infection vectors, the different types of mobile malware currently plaguing organizations, and how to take the appropriate steps to protect your mobile estate.

(more available)
Added: October 22, 2018
image from Cyber Threats To The High Tech And IT Industry

Cyber Threats To The High Tech And IT Industry

Get a threat outlook for high tech and IT sectors as their relevance to economic, intelligence and security concerns make them more valuable targets.

(more available)
Added: October 18, 2018
image from Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

Remote Access Trojan KONNI Targeting North Korea Technical Analysis And Solution

This report looks at a remote access Trojan named KONNI that was targeting North Korea.

Added: October 18, 2018
image from SecureWorks Threat Intelligence Executive Monthly Report October 2016

SecureWorks Threat Intelligence Executive Monthly Report October 2016

This report from October 2016 takes a look at the Mirai botnet, VULNS, breach responses, and some new security initiatives.

(more available)
Added: October 17, 2018
image from Joao Malware Analysis

Joao Malware Analysis

This report provides analysis and information related to Joao Malware which has attacked video gamers.

Added: October 16, 2018
image from "VPN Filter" Botnet: A Sophoslabs Analysis

"VPN Filter" Botnet: A Sophoslabs Analysis

This report provides a technical investigation of the malicious components involved in the attack that infected over 500,000 routers and network storage devices.

(more available)
Added: October 15, 2018
image from 2015 Threat Report

2015 Threat Report

The report introduces the Chain of Compromise as an analytical concept to help readers, particularly those working in cyber security and information technology roles, understand how attackers compromise security using different combinations of tactics and resources. Some of 2015’s most prominent threats, such as exploit kits, ransomware, and DNS hijacks, are discussed in relation to this model, demonstrating how users become compromised by modern cyber attacks.

(more available)
Added: October 15, 2018
image from Beware Of The 64-Bit Malware

Beware Of The 64-Bit Malware

The 64-bit Windows operating system is increasing its market share and becoming the prevalent system in most business environments. Its growing popularity is also attracting more attackers and slowly reshaping the Windows threat landscape. Cybersecurity teams must gain a deep understanding of 64-bit systems, and the different malware variants that can infiltrate and attack them, especially as the threat expands into additional operating systems, such as Linux and macOS.

(more available)
Added: October 15, 2018
© Cyentia Institute 2025
Library updated: June 21, 2025 20:08 UTC (build b1d7be4)