Tagged articles
7 articles
Page 1 of 1
IT Services Circle
IT Services Circle
Feb 24, 2026 · Information Security

Beware Fake 7‑Zip Installers: How a Trojan Turns Your PC into a Residential Proxy Bot

A malicious fake 7‑Zip installer masquerades as the legitimate open‑source archiver, silently deploying a Trojan that creates a residential‑proxy botnet, modifies system services and firewall rules, and can expose users to legal and privacy risks, while Windows Defender now flags it as Trojan:Win32/Malgent!MSR.

7zipinformation-securitymalware
0 likes · 6 min read
Beware Fake 7‑Zip Installers: How a Trojan Turns Your PC into a Residential Proxy Bot
MaGe Linux Operations
MaGe Linux Operations
Nov 26, 2024 · Information Security

New “Silver Fox” Trojan Variant Targets Chinese Users – Spread, Impact, and Prevention

The National Computer Virus Emergency Response Center reports a new “Silver Fox” Trojan variant distributed via phishing links in WeChat groups, disguised as tax‑related installers, which can hijack systems for remote control and fraud, and provides concrete steps for users and enterprises to defend against it.

Information SecurityPreventionVirus
0 likes · 6 min read
New “Silver Fox” Trojan Variant Targets Chinese Users – Spread, Impact, and Prevention
Open Source Linux
Open Source Linux
Apr 25, 2021 · Information Security

Understanding Remote-Control Trojans: Concepts, Deployment, Communication, and APT Threats

This comprehensive guide explains remote‑control trojans—covering their basic concepts, classifications, infection methods, communication techniques, typical functionalities, their role in APT attacks, and practical detection strategies—providing security professionals with essential knowledge to defend against these sophisticated threats.

APTRemote accessmalware analysis
0 likes · 24 min read
Understanding Remote-Control Trojans: Concepts, Deployment, Communication, and APT Threats
Efficient Ops
Efficient Ops
Dec 18, 2018 · Information Security

How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread

On December 14, Tencent's security intelligence team uncovered a “DriverLife” Trojan that exploited the high‑severity EternalBlue vulnerability to propagate like a worm, infecting up to 100,000 users within two hours, and detailed its infection chain, malicious payloads, and mitigation recommendations.

EternalBlueInformation Securitymalware analysis
0 likes · 7 min read
How the “DriverLife” Trojan Leverages EternalBlue for Rapid Worm‑Like Spread
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Aug 20, 2017 · Information Security

How a Web‑Ad Trojan Exploits IE to Deploy Crypto Mining

Tencent's security lab uncovered a large‑scale trojan spread via pornographic web ads that exploits the CVE‑2016‑0189 IE vulnerability, installs a backdoor, and runs a Zcash mining program, while also distributing Linux malware and controlling numerous C&C servers across Chinese provinces.

CVE-2016-0189IE vulnerabilityInformation Security
0 likes · 8 min read
How a Web‑Ad Trojan Exploits IE to Deploy Crypto Mining
Architect
Architect
Dec 11, 2015 · Information Security

Detailed Analysis of a Targeted Trojan Distributed via a Fake Interview Outline

The article presents a comprehensive technical analysis of a sophisticated Windows trojan that masquerades as a Word document, detailing its delivery method, file extraction process, registry modifications, remote‑control capabilities, and the organized, targeted attack infrastructure behind it.

C2 infrastructureInformation SecurityRemote access
0 likes · 10 min read
Detailed Analysis of a Targeted Trojan Distributed via a Fake Interview Outline