top of page


Conti Ransomware Continues Its Spread With A New Variant “PUTIN”
The Conti ransomware group has become one of the most notorious cybercrime collectives in the world, known for its aggressive tactics and...

SecneurX Threat Analysis
Dec 26, 20223 min read
18 views
0 comments


What is Lucknite Ransomware ?
Secneurx Analyst found Lucknite ransomware in the wild and analyzed the sample. Lucknight ransomware encrypts files and appends its...

SecneurX Threat Analysis
Dec 22, 20223 min read
29 views
0 comments


What is Btnw Ransomware ?
Btnw is a ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that among the prominent ransomware...

SecneurX Threat Analysis
Dec 22, 20223 min read
12 views
0 comments


What is ScareCrow Ransomware ?
ScareCrow ransomware is now emerging as a new ransomware family attack against Windows systems. ScareCrow attacks are relatively...

SecneurX Threat Analysis
Dec 21, 20222 min read
24 views
0 comments


What is Manw Ransomware ?
Manw is a ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that among the prominent ransomware...

SecneurX Threat Analysis
Dec 20, 20223 min read
14 views
0 comments


What is Mppn Ransomware
Mppn is a ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that among the prominent ransomware...

SecneurX Threat Analysis
Dec 12, 20223 min read
37 views
0 comments


What is Juli Ransomware ?
What is Juli Ransomware ? VoidCrypt ransomware shows to be a strange hybrid of corporate-aimed ransomware and one targeted at individuals...

SecneurX Threat Analysis
Dec 12, 20223 min read
16 views
0 comments


New Chaos Ransomware Builder Variant “Puspa2” Discovered in the Wild
Chaos is a customizable ransomware builder that emerged in underground forums, by falsely marketing itself as the .NET version of Ryuk...

SecneurX Threat Analysis
Dec 5, 20223 min read
88 views
0 comments


What is Uyro Ransomware ?
Uyro is a ransomware that belongs to the Djvu/Stop Ransomware family. Analysts at SecneurX observed that among the prominent ransomware...

SecneurX Threat Analysis
Dec 3, 20223 min read
38 views
0 comments


What is Kcvp Ransomware ?
Kcvp is a ransomware that belongs to the Stop/Djvu Ransomware family. Analysts at SecneurX found that Kcvp encrypts files and appends its...

SecneurX Threat Analysis
Dec 1, 20223 min read
25 views
0 comments


What is Ramp Ransomware?
The ramp is ransomware that belongs to the Killnet Ransomware family. SecneurX Malware Analyst found that Ramp encrypts files and appends...

SecneurX Threat Analysis
Nov 7, 20223 min read
119 views
0 comments


SecneurX Mobile Malware Advisory August 2022
Android users are constantly subjected to frauds by apps that they installed from Google Play Store. At SecneurX we have been monitoring...

SecneurX Threat Analysis
Aug 30, 20222 min read
145 views
0 comments


HiddenAds malware discovered in Android apps that are distributed on Google Play Store
SecneurX Analysis Mobile research team have discovered more mobile Apps that are distributed on the Google Play store infecting Android...

SecneurX Threat Analysis
Aug 18, 20222 min read
98 views
0 comments


Agent Tesla: The RAT Spyware and Infostealer
Agent Tesla is a Malware-as-a-Service Trojan that steals user information and exfiltrates it to the threat actors Non-Technical Summary...

SecneurX Threat Analysis
Feb 5, 20223 min read
309 views
0 comments


Raccoon Stealer: The ‘Malware-as-a-Service’ (MaaS) Information Stealer’s Current Surge
Raccoon Stealer is an information stealer that, as its name suggests, steals user credentials and data stored in web browsers, mail...

SecneurX Threat Analysis
Dec 17, 20214 min read
505 views
0 comments


Amphitryon : The Spam Blog (Splog) Supportive Malware
Amphitryon gains entry through a macro and redirects affected users to spam blog sites that are solely created to increase advertisement...

SecneurX Threat Analysis
Dec 1, 20213 min read
559 views
0 comments


SecneurX’s message for Cyber Security Awareness Month - October 2021: Stay Vigilant, Stay Safe.
Cyber Security is a major concern in today's way of life where everyone and everything is connected to the internet. The same devices...

SecneurX Threat Analysis
Oct 23, 20212 min read
154 views
0 comments


Behaviour Analysis of Ransomware Wana Decryptor
Wana Decryptor encrypts data on computers, rendering it inaccessible without a unique decryption key. A ransom is demanded for the...

SecneurX Threat Analysis
Sep 23, 20213 min read
177 views
0 comments


New Remcos RAT - the Remote Access Trojan
The Remote Access Trojan Remcos has features to evade detection. Remcos RAT is a malware that affects systems with Windows OS and gives...

SecneurX Threat Analysis
Sep 17, 20213 min read
2,199 views
0 comments


New version of Neurevt malware identified
The trojan malware Neurevt is back in a new version as an infostealer with spyware and backdoor capabilities About the threat: The...

SecneurX Threat Analysis
Sep 3, 20213 min read
251 views
0 comments


Analysis of Android Malware Joker's new communication techniques
The Joker malware is back in the Google PlayStore and this time with a different communication technique than the usual one. This new...

SecneurX Threat Analysis
Aug 7, 20212 min read
212 views
0 comments


Behavioural Analysis of a sophisticated malware - BIOPASS RAT.
SecneurX has been observing a RAT (Remote Access Trojan) behaviour which is targeting users of Windows systems through the watering hole...

SecneurX Threat Analysis
Jul 31, 20212 min read
190 views
0 comments


Mosaic Loader - Behaviour Analysis
Mosaic loader (as named recently) refers to a malware delivery platform that infects Windows PCs. SecneurX has been tracking malicious...

SecneurX Threat Analysis
Jul 28, 20212 min read
338 views
0 comments


Malicious Android Apps are stealing your Facebook Username and Password (Facestealer)
SecneurX malware analysts have discovered malicious apps on Google Play store that steals Facebook username and password. SecneurX’s...

SecneurX Threat Analysis
Jul 21, 20212 min read
272 views
0 comments
bottom of page