
Browse all articles
May 05, 2023
AVLab: Acronis True Image scores best remediation time, 100% detection rate in independent evaluation
AVLab, an AMTSO member and independent testing laboratory based in Poland, evaluated Acronis True Image in their March 2023 test series. We’re pleased to announce that our solution landed in the top three tested products with regards to the "pre-launch score" — measuring malware detection rates before execution — and took the top spot in remediation speed with a time of only four seconds.
May 04, 2023
Raccoon Stealer: A popular and dangerous threat
Raccoon Stealer, also known as Mohazo or Racealer, is an info-stealer malware that first appeared in 2019, and is available as malware-as-a-service (MAAS). Available as MaaS, it has already infected over 100,000 devices in the wild, across organizations and individuals, and became one of the most-mentioned attacks on underground forums.
April 28, 2023
Malware with a “Money Message”
The purpose of Money Message ransomware is to encrypt files on a targeted computer, rendering the victim's system unusable. It was first reported on Twitter by the Zscaler ThreatLabZ research team.
April 26, 2023
Maui: An active and dangerous data wiper
Maui is a wiper that is designed to delete or overwrite data on a computer or digital device, causing damage and disrupting operations. This malware was first discovered by the FBI in May 2021, and is presumed to have been developed under the guidance of North Korea.
March 29, 2023
SwiftSlicer: A simple yet dangerous data wiper
On January 25, 2023, ESET Research found a new data wiper in the network of Ukrinform, Ukraine’s national news agency. Later, the Computer Emergency Response Team of Ukraine (CERT-UA) added that as of January 27, five additional, different malware samples were spotted in the network.
March 06, 2023
IcedID (BokBot): From banking trojan to backdoor
IcedID, also known as BokBot, was initially a banking trojan when it was discovered in 2017. Now it is mostly used as an initial access broker for other malware. This malware typically uses malicious email attachments to infect victims' machines. It has been known to use various types of attachments — such as archives, Word and Excel files — but the latest attacks used OneNote files.
February 13, 2023
CaddyWiper makes Windows machines unusable
CaddyWiper is an example of data-wiping malware, whose purpose is to corrupt the operating system and leave the targeted device unusable. It was first spotted in Ukraine in mid-March 2022 by the ESET research team.












