HawkEye keylogger is a formidable trojan known for stealthily stealing vital data from your computer. This malware collaborates with others to snatch passwords from email clients and browsers, making it a potent threat. It spreads through malspam campaigns, targeting business users to compromise accounts and extract sensitive data for malicious purposes.
Recent campaigns used spam servers in Estonia, disguising emails as messages from Spanish banks. They distributed HawkEye Reborn v8.0 and v9.0 through deceptive attachments resembling commercial invoices. When opened, these attachments secretly install Hawkeye while distracting victims with the invoice image.
To infect victims, Hawkeye employs mshta.exe dropped by PhotoViewer, leveraging PowerShell to connect with a command-and-control server for further malware. It ensures persistence with gvg.exe in the Windows Registry, automatically restarting with each boot.
Protect against this threat with a Security Information and Event Management (SIEM) solution, offering constant device monitoring and real-time threat detection, fortifying your defenses against the Hawkeye Keylogger's menace. Watch the video to learn more—three minutes is all it takes!
Conti is a ransomware-as-a-service affiliate program associated with...
3.00
Logging is a fundamental feature of software. A flaw in Log4j...
3.00
On April 29, 2022, the United States government...
3.00
First discovered in 2007, Qakbot is widespread malware used for stealing information...
3.00
Originally developed as a banking trojan in 2014, Emotet malware was...
3.00
Created in 2012 by Raphael Mudge, Cobalt Strike is a remote...
3.00
Mimikatz is an open source application that allows users to view and save...
3.00
Belonging to the Cryptomix ransomware family, Clop ransomware...
3.00
Originally designed by a group of sophisticated cybercriminals as a banking...
3.00
Colonial Pipeline, a jet fuel and gasoline provider for the eastern United...
3.00
A California-based information security and compliance firm, Qualys,...
3.00
Mirai malware infects devices that run on the ARC processor, turning...
3.00
IcedID, aka BokBot, is a banking trojan-type malware that can be used...
3.00
SocGholish is an initial access threat that uses drive-by-downloads that...
3.00
First discovered in 2014, Agent Tesla is an advanced Remote Access...
3.00
First discovered in 2018, Shlayer malware has become one of the most...
3.00
Identified in September 2011, GameOver Zeus is a peer-to-peer (P2P) variant...
3.00
First discovered in 2016, LokiBot is infostealing malware that...
3.00
Sold in underground forums, the NanoCore remote access Trojan...
3.00
Man-in-the-middle (MitM) attacks take place...
3.00
GandCrab ransomware encrypts victims files...
3.00
FormBook is an infostealer malware that steals...
3.00
Shamoon is a dangerous malware program used in...
3.00
Lapsus is a hacking group that gained noto...
3.00
The njRAT, also known as Bladabindi, is...
3.00
The Phorpiex Botnet, initially a worm...
3.00
TeslaCrypt is a ransomware variant...
3.00
You will receive regular updates on the latest news on cybersecurity.
© 2024 Zoho Corporation Pvt. Ltd. All rights reserved.