full screen background image
Search
Sunday 18 February 2018
  • :
  • :

Category: PDC Malware Reverse Team

Browser Hijack – The journey – Cybersecurity research

A new software test. Something announced as free … but it’s not really for free. Today I wanted to see what level of browser...

Blockchain phishing… Same campaign.. new domain.

I’m happy. If I continue so.. I will become rich … The same blockchain phishing campaign, but with new domain.  ...

Blockchain scamming and more…

Hello. I know … I know I’m very lucky. I was just informed that someone made a payment on my bitcoin address. …or just a...

2x Bitcoin scam – The magic application.

People still want to believe that the money are made easy with some application and without doing anything. Click a button and you get...

Win32/Laziok malware – Cybersecurity research

This topic it is about Win32 / Laziok malware. It does not matter where I found it. His hidden activity is very intense. Seeks to install...

Nigerian Yahoo phishing mail with java script.

The CEO of an institution sent me the email he received this days at the institution’s email address. An invoice from an unrelated...

Greasy Fork script with Coinhive miner.

In November, after some searches, I discovered that a Greasy Fork script had implemented a mining code. This is the PowerCamDestroyer...

11+ infected files from one .exe- Malware research

“I do not think the file is infected …” All of these are a part of the extracted files from a downloaded file. All .exe...

Monero & Stealer binded in the same file.

Looks like someone really wants a lot from the victims. Files with more than one malware. As usual found on an illegal forum. Have fun...

Unfinished Paypal phishing page?

I’m starting to stop trusting hackers … How to start sharing it… if is not done yet ….. or are you just modifying...

Apple ID and Credit Card Phishing – Cybersecurity research

Hello. Today we will be investigating a phishing case. Usually the attack of this type comes by email. An email in which there is a text, a...

RDP (Remote Desktop Protocol) backdoor – Malware analysis

Hello. I found something interesting for today. The form i found the file is the classic one: Hacking forum-> Magic software for Bitcoin...

Fake Java Update – Malware analysis

File hosted on: h**p://www.packagegiftnow.com/ As you already know, some websites have implemented a script that tells you that you have an...

Unseen sample of malware-Modified coding code – DarkWeb TOR project.

Hello. Today I had a nice surprise. I found in the Spam file an email telling me they just sent me an electronic invoice. I have to say...

Security Advice – The Antivirus is just a security helper!

Hello again. Most computer users do not have a specific IT security training. They use simple passwords, save them in computer files, and...

Malware research/reverse – Payload backdoor

Hello. I have some free time and I try to deal with internet safety. I’m just a small drop of the ocean, but I’m here! Today I...

CryptoLocker on hacked website

Hello. Today I will show you a website blocked by Crypto Locker. During my searches I found a website that has encrypted files. All ending...

Malware reverse – RAT backdoor

Hello again. After a few tested files, I found something good to analyze. On hacking or warez forums, you find a lot of infected files....

Are you a lucky cybercrime victim?

Many Internet users download certain programs, even if they know they are illegal or even dangerous. Without clear statistics, I tend to...

Websites mining using users CPU power – Cyber security research

Many of us are trying to make money online from home. One solution would be the websites that offer some software and if you keep it...

Silent miner backdoored – Malware reverse

Today i found new backdoored hacking tool to play with. A new Silent Miner made to infect with remote access some ”hackers”....

Silent minergate miner reverse – Backdoored

  I found some ”free” software on the internet backdoored with that Silent Minergate, so this time i downloaded the...

MyEtherWallet Notification – Email scam

  A new scam. This time, the hacker tries to steal logging data for the Ethereum wallet. A site identical to the original was created...

Hunting Paypal Scammer – Busted 100%

Here’s a new software that promises to increase your revenue. The point is you do not have to believe in miracles. Everything looks...

Fake Paypal – Scam

Here we have the old story…. a email that says you got some money from someone… you are pushing the link and the scam starts!!!...

[2017] Best Bitcoin Doubler x2 100% (with Proofs) – Scam

Surce: Youtube Search: bitcoin doubler Source Link: watch?v=VDgrGJCZZPE Here we have the proof of working bitcoin doubler, but… DO...

Malware on Google Maps spread analisys

Malware spread on Google Maps,Github & Amazon

Everything started from a google search for infected files. The most commun are crack, keygen etc. I’ve found a ‘hide ip...

How to become a slave miner for bitcoins!

This is another video about a hacking tool.The story is simple. If you  want to become rich… just open this tool and everything will...

Reversing a backdoored file

Malware Analisys Basic – Infected Hacking tool

Malware Analisys Basic – Infected hacking tool Everything on the Internet can be infected with some malware. This video it is about...

Malware Analisys Basics / Reversing a backdoored file

How does a computer get infected with a virus or spyware? Not everything on the Internet it is FREE!!! Scan Report of infected file.