<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sun, 12 Apr 2026 21:36:08 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/backdoormalware/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[New Jupyter Malware Is A Blend of Infostealer And Backdoor]]></title><description><![CDATA[As new threats keep emerging, researchers have found new malware in the wild. Identified as Jupyter, the malware isn’t only an infostealing trojan but also possesses full backdoor functionality. Jupyter]]></description><link>http://direct.ecency.com/data-stealingtrojansstealers/@twr/newjupytermalwareisablendofinfostealerandbackdoor-0nx86kq2g6ur2mllmiwd</link><guid isPermaLink="true">http://direct.ecency.com/data-stealingtrojansstealers/@twr/newjupytermalwareisablendofinfostealerandbackdoor-0nx86kq2g6ur2mllmiwd</guid><category><![CDATA[data-stealingtrojansstealers]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 20 Nov 2020 15:10:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/54TLbcUcnRm4Lx9pBqYcBiBEm1uDXVKX6bsDKbXpesrDicfmLBJByirNUDPPSk9fykPPzMViSXE6f6inbofrUuHNKwLh6rZTKSMsemoAzLR9HYS4cFGfaUyqLssauB3dXBEyAT8Ge?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Malicious npm Package Created Backdoor On Target Devices]]></title><description><![CDATA[Another malicious npm package appeared on the official repository that created a backdoor on users’ computers. The package impersonated an otherwise legit package to fool users. npm Package Created Backdoor]]></description><link>http://direct.ecency.com/backdoor/@twr/maliciousnpmpackagecreatedbackdoorontargetdevices-cw54u9cuu1ehoy6po78v</link><guid isPermaLink="true">http://direct.ecency.com/backdoor/@twr/maliciousnpmpackagecreatedbackdoorontargetdevices-cw54u9cuu1ehoy6po78v</guid><category><![CDATA[backdoor]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 04 Nov 2020 18:25:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72RDGs8eAbHFrr6EfYFGHt4sBF76t4eY6FnztSajbbYxY8pztMY4GecrJDWRd5ALJZhnxNWN2cFMbc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lucifer Malware Comes Back Targeting Linux Systems]]></title><description><![CDATA[Lucifer malware emerged a couple of months ago as a typical Windows malware. However, it has now returned with even more power. Researchers have found the new Lucifer malware variants capable to target]]></description><link>http://direct.ecency.com/backdoormalware/@twr/lucifermalwarecomesbacktargetinglinuxsystems-tjbnkl2vzt</link><guid isPermaLink="true">http://direct.ecency.com/backdoormalware/@twr/lucifermalwarecomesbacktargetinglinuxsystems-tjbnkl2vzt</guid><category><![CDATA[backdoormalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 01 Sep 2020 11:30:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/X37EMQ9WSwsNuKMjTPzqrTVdzWyJsSYQeeW5hs5MpYqS57uqhf2fWjowfP4xA9pj7uL2wPbA6WBjTa9D8pnA7Y1E9VuSDqX3npzGN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Researchers Make Decryptor For ThiefQuest Ransomware Publicly Available]]></title><description><![CDATA[ThiefQuest or EvilQuest recently made it to the news following its discovery. The ransomware specifically aimed at Mac devices. Thankfully, following the continuous analyses by the cybersecurity community,]]></description><link>http://direct.ecency.com/appleransomware/@twr/researchersmakedecryptorforthiefquestransomwarepubliclyavailable-0z19rifn3e</link><guid isPermaLink="true">http://direct.ecency.com/appleransomware/@twr/researchersmakedecryptorforthiefquestransomwarepubliclyavailable-0z19rifn3e</guid><category><![CDATA[appleransomware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 14 Jul 2020 14:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/mXkfdToSwHy4h1jQhTWHtNrVigXbdMMCxtK1oTsVhcdZX1o1dQLpb1AMJgKv3KWADiYkMuevtDU4SxeAzjyrKB5yCbwcKUiKzBcWvyqy8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ThiefQuest Ransomware Targets Mac Devices As It Spreads Via Piracy]]></title><description><![CDATA[Heads up Mac users! Don’t fall for the Little Snitch free version offered on different forums. In fact, this applies to every premium software that the provider offers for free. A new ransomware ‘ThiefQuest’]]></description><link>http://direct.ecency.com/backdoormalware/@twr/thiefquestransomwaretargetsmacdevicesasitspreadsviapiracy-sjps5znmwn</link><guid isPermaLink="true">http://direct.ecency.com/backdoormalware/@twr/thiefquestransomwaretargetsmacdevicesasitspreadsviapiracy-sjps5znmwn</guid><category><![CDATA[backdoormalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 07 Jul 2020 17:10:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeXL7n7YbBjpQ6NM6KhL7QJpmn4BVBcXuzwD3YsLzYLQ18XdxyQmUT5M9rJYWGsEGzkhPBrnwL7Si2ai9MdmskZ7t?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Sneaky Glupteba Malware Creates Backdoor In Windows PCs]]></title><description><![CDATA[A new malware ‘Glupteba’ threatens the security of Windows systems. This sneaky malware remains hidden as it continues to create a backdoor in compromised Windows devices. Glupteba Windows Malware Researchers]]></description><link>http://direct.ecency.com/backdoor/@twr/sneakygluptebamalwarecreatesbackdoorinwindowspcs-lv0xonjgzj</link><guid isPermaLink="true">http://direct.ecency.com/backdoor/@twr/sneakygluptebamalwarecreatesbackdoorinwindowspcs-lv0xonjgzj</guid><category><![CDATA[backdoor]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 29 Jun 2020 22:20:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/2N61tyyncFaFf7U8uit3SKEVcMbWFS8dr63tsaSV7Hf4RNu3n1aHBhLTysiSJj1tyovNMLpM2PN85pv5NFeRCRdJe1SnpkabMjBu9X74bhjqho3ur66K7PKEsStzYU9i52So3NEJ1cgv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lucifer Malware Emerges As New Threat To Windows Devices]]></title><description><![CDATA[A new malware dubbed ‘Lucifer’ (or Satan) is actively targeting Windows systems. This malware exploits various vulnerabilities in the system to infect target devices. Lucifer Malware Targeting Windows]]></description><link>http://direct.ecency.com/backdoormalware/@twr/lucifermalwareemergesasnewthreattowindowsdevices-qjekev0xv7</link><guid isPermaLink="true">http://direct.ecency.com/backdoormalware/@twr/lucifermalwareemergesasnewthreattowindowsdevices-qjekev0xv7</guid><category><![CDATA[backdoormalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 26 Jun 2020 12:50:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/EfcLDDAkyqgsZzNugMsWc8TEZPbkgbExfggncdWXqvG5JDbe6v2jdWYw9wAuSHUeZgsAkgSGjWB12aosi6zqDcRZ1ysPc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[New Shlayer Trojan Variant Threatens Mac Devices As It Bypasses macOS Security]]></title><description><![CDATA[Heads up Mac users. A new Mac malware has surfaced online that can infect your device sneakily. This new malware is a variant of the previously discovered Shlayer Trojan for Mac. Shlayer Trojan Malware]]></description><link>http://direct.ecency.com/backdoormalware/@twr/newshlayertrojanvariantthreatensmacdevicesasitbypassesmacossecurity-b672tk5tbw</link><guid isPermaLink="true">http://direct.ecency.com/backdoormalware/@twr/newshlayertrojanvariantthreatensmacdevicesasitbypassesmacossecurity-b672tk5tbw</guid><category><![CDATA[backdoormalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 24 Jun 2020 22:30:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeXL7n7YbBjpQ6NM6KhL7QJpmn4BVBcXuzwD3YsLzYLQ18XdxyQmUT5M9rJYWGsEGzkhPBrnwL7Si2ai9MdmskZ7t?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Many Users Hacked Via Fake Google Chrome Update From Compromised WordPress Websites]]></title><description><![CDATA[Hackers are exploiting various websites to conduct phishing attacks. These websites redirect users to fake sites prompting a malicious Chrome update. Fake Chrome Update Distributing Backdoor Analysts from]]></description><link>http://direct.ecency.com/backdoor/@twr/manyusershackedviafakegooglechromeupdatefromcompromisedwordpresswebsites-vvzcf4uf60</link><guid isPermaLink="true">http://direct.ecency.com/backdoor/@twr/manyusershackedviafakegooglechromeupdatefromcompromisedwordpresswebsites-vvzcf4uf60</guid><category><![CDATA[backdoor]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 30 Mar 2020 11:05:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pL5QgN8TiSPmncCKgPK5zu2cMNAwZR5tYwFwt5JjvUJSL4VwHqGAhzFe84JZ8DpLig2C5PtnwadxuzRPBcWCVhTeVuT6YjiQg9RHTVTpNt8RNW?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Researchers Uncovered Malware That Drops Six Variants in One Hit]]></title><description><![CDATA[Researchers have uncovered a new malware campaign which they dub the “Hornets Nest”. What makes this attack notable is the deployment of six different malware variants in one go. These include cryptominers,]]></description><link>http://direct.ecency.com/backdoor/@twr/researchersuncoveredmalwarethatdropssixvariantsinonehit-knzjdjty5u</link><guid isPermaLink="true">http://direct.ecency.com/backdoor/@twr/researchersuncoveredmalwarethatdropssixvariantsinonehit-knzjdjty5u</guid><category><![CDATA[backdoor]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 23 Dec 2019 06:35:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/TZjG7hXReeVrGWPFDdJYx2UdTqopUBe2Lp13Qo1CsZ5M1hwXVj5L2G7TKD8oAaMZeDDXHqg46Y6RQQB5N32jVtUUvoBf6cFS4c6z1nArGLurQqitUzWGPau18XgWiA5zde1K92DiU4nCRL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lazarus Group Target Users Via Fake Company Serving Cryptocurrency Malware]]></title><description><![CDATA[The infamous Lazarus Group, allegedly from North Korean origin are back in action. Researchers have found the attackers to be targeting Windows and Mac users with a new strategy. Specifically, the Lazarus]]></description><link>http://direct.ecency.com/backdoormalware/@twr/lazarusgrouptargetusersviafakecompanyservingcryptocurrencymalware-oa9hztbcl2</link><guid isPermaLink="true">http://direct.ecency.com/backdoormalware/@twr/lazarusgrouptargetusersviafakecompanyservingcryptocurrencymalware-oa9hztbcl2</guid><category><![CDATA[backdoormalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 16 Oct 2019 19:20:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruvKvh668FyFDthV4M117w2aub16wmxRSCfcc9yeY4MF4gwzJzjVahL4L6oXD1pgq3z3iw34qphQ4AHecg26X6trAXfcDxejA97N8siSS?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Love You Malspam infecting victims in Japan ahead of Valentines Day]]></title><description><![CDATA[Love you malware changes tactics as it targets Japan and spreads the ransomware Gandcrab 5.1. Malspam campaign, “Love you,” named after its attachment’s subject title, has a known affiliation with the]]></description><link>http://direct.ecency.com/backdoormalware/@twr/loveyoumalspaminfectingvictimsinjapanaheadofvalentinesday-xbs0k885yj</link><guid isPermaLink="true">http://direct.ecency.com/backdoormalware/@twr/loveyoumalspaminfectingvictimsinjapanaheadofvalentinesday-xbs0k885yj</guid><category><![CDATA[backdoormalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 31 Jan 2019 13:32:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP3vrQovkik6e66T8hnLhLPdqV7nVJzeRr5Sdvch7efXk337Lsrya9rEqtmuZp4XxZHNgvz3RJyn2A126KdKmxBFKJbiFMKMzfYUGva?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Iranian Cyber Espionage Group APT-39 linked to Middle East attacks]]></title><description><![CDATA[FireEye has dubbed and exposed Iranian cyber espionage group APT39, as actors of a series of attacks on the Middle East. After 5 years of observing its patterns and behaviours, it found links between APT39,]]></description><link>http://direct.ecency.com/advancedpersistentthreat/@twr/iraniancyberespionagegroupapt-39linkedtomiddleeastattacks-xqrtzrssgc</link><guid isPermaLink="true">http://direct.ecency.com/advancedpersistentthreat/@twr/iraniancyberespionagegroupapt-39linkedtomiddleeastattacks-xqrtzrssgc</guid><category><![CDATA[advancedpersistentthreat]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 31 Jan 2019 11:42:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJaNXywTd35FmuBgqmH1XbTzf75TEmRcrEVSAAd2g5nM5HKhxRpZ9j17hJcLL2dcbuG7nRc91RKdaAFze7jJUvWUzPgvNoYWf96jdofFU2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[NanoCore Trojan Malware Cannot be Killed By Users]]></title><description><![CDATA[Most people are now familiar with how destructive and damaging computer viruses such as a Trojan can be. Many are dealt with by antivirus software, though there are a few that are designed to circumvent]]></description><link>http://direct.ecency.com/anitvirus/@twr/nanocoretrojanmalwarecannotbekilledbyusers-ngj298e2ni</link><guid isPermaLink="true">http://direct.ecency.com/anitvirus/@twr/nanocoretrojanmalwarecannotbekilledbyusers-ngj298e2ni</guid><category><![CDATA[anitvirus]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Thu, 17 Jan 2019 21:24:18 GMT</pubDate><enclosure url="https://images.ecency.com/p/3HaJVw3AYyXBMfv2WPWWJdHwQGsHXsdjdPAXMmN2EtsWmfBWDxSrLzFxCGQQSTPweuTy1Z4ce3wycBUGaVV1ii1mJ7hDFdu5KDeTzTY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[ZombieBoy: New Crypto-Mining Malware Exploits Multiple CVEs]]></title><description><![CDATA[A new cryptomining malware called Zombieboy is on the prowl. Recently, this new addition to the cryptomining dynasty has clocked in at $1,000 per month. James Quinn, an independent security researcher]]></description><link>http://direct.ecency.com/backdoormalware/@twr/zombieboynewcrypto-miningmalwareexploitsmultiplecves-5wualyxfbq</link><guid isPermaLink="true">http://direct.ecency.com/backdoormalware/@twr/zombieboynewcrypto-miningmalwareexploitsmultiplecves-5wualyxfbq</guid><category><![CDATA[backdoormalware]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 01 Aug 2018 18:30:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/6VvuHGsoU2QCXKReotjsYKyXxnPgpu24pi2Fqi5joWVqf3cso17PyD8LbcyEkxUWhkirdmQwjQDoWojRVp5tiSUp4PXRH5BrByaZjL72qT9JiWZ5Gxn6wHdTQhkxW2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[FELIXROOT Backdoor Has Resurfaced In Environmental Spam Campaign]]></title><description><![CDATA[After having disappeared for a few months, the FELIXROOT, a backdoor that is capable of dropping additional malware and executing espionage was discovered in a new malspam campaign. Weaponized lure documents]]></description><link>http://direct.ecency.com/backdoor/@twr/felixrootbackdoorhasresurfacedinenvironmentalspamcampaign-eue7bkbncb</link><guid isPermaLink="true">http://direct.ecency.com/backdoor/@twr/felixrootbackdoorhasresurfacedinenvironmentalspamcampaign-eue7bkbncb</guid><category><![CDATA[backdoor]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 30 Jul 2018 13:30:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJaNXywTd35FmuBgqmH1XbTzf75TEmRcrEVSAAd2g5nM5HKhxRpZ9j17hJcLL2dYhVctrdaZEvNZRNqbg75yPGr9Mi2wDKiL9j4R7V995Y?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>