Blog
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
Rocinante: The Trojan Horse That Wanted to Fly
Once installed, the Rocinante malware prompts the victim to grant Accessibility Services and displays phishing screens tailored to different banks to steal personal information.
New Snake Keylogger Variant Slithers Into Phishing Campaigns
The attack starts with a phishing email disguised as a fund transfer notification, with an attached Excel file named “swift copy.xls” that triggers the deployment of Snake Keylogger on the victim's computer upon opening.
FREE GUIDE