BTC $59298.0674
ETH $2995.1082
BNB $564.5461
SOL $138.9487
XRP $0.5204
stETH $2988.3022
DOGE $0.1334
TON $5.0410
ADA $0.4575
AVAX $33.8253
TRX $0.1233
wstETH $3489.5418
DOT $7.0008
WETH $2991.4612
WBTC $59224.1780
BCH $430.2076
LINK $13.6208
MATIC $0.7136
UNI $7.1773
ICP $13.4980
LTC $80.7613
DAI $0.9998
FDUSD $1.0014
IMX $2.1335
CAKE $2.5463
RNDR $7.8041
ETC $25.7147
NEAR $6.1799
HBAR $0.0993
MNT $1.0047
PEPE $0.0000
FIL $5.7866
STX $2.0790
OKB $49.2189
ATOM $8.6634
WIF $2.7507
TAO $402.6061
VET $0.0352
MKR $2754.0755
KAS $0.1081
GRT $0.2513
USDE $0.9991
XMR $123.9184
FET $2.0138
XLM $0.1096
INJ $23.5604
AR $32.3518
BTC $59298.0674
ETH $2995.1082
BNB $564.5461
SOL $138.9487
XRP $0.5204
stETH $2988.3022
DOGE $0.1334
TON $5.0410
ADA $0.4575
AVAX $33.8253
TRX $0.1233
wstETH $3489.5418
DOT $7.0008
WETH $2991.4612
WBTC $59224.1780
BCH $430.2076
LINK $13.6208
MATIC $0.7136
UNI $7.1773
ICP $13.4980
LTC $80.7613
DAI $0.9998
FDUSD $1.0014
IMX $2.1335
CAKE $2.5463
RNDR $7.8041
ETC $25.7147
NEAR $6.1799
HBAR $0.0993
MNT $1.0047
PEPE $0.0000
FIL $5.7866
STX $2.0790
OKB $49.2189
ATOM $8.6634
WIF $2.7507
TAO $402.6061
VET $0.0352
MKR $2754.0755
KAS $0.1081
GRT $0.2513
USDE $0.9991
XMR $123.9184
FET $2.0138
XLM $0.1096
INJ $23.5604
AR $32.3518
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Zombinder service discovered on the dark web turns apps into trojanized zombies


    While investigating a new malware campaign targeting Windows and Android devices, Threat Fabric researchers discovered a dark web service called Zombinder used to “modify” legitimate Android apps with a malicious payload. Smartphone applications were infected with Ermac banking trojans, and three malwares were intended for Windows systems - the Erbium and Aurora infostealers, as well as the Laplas clipper.

    According to experts, thousands of systems were affected during this campaign, and Erbium specifically stole data from more than 1,300 victims.

    The experts came to the service by investigating the Ermac Trojan, which infected victims through decoy applications. Once installed and launched, these applications prompt the user to download an update or plugin, which is actually a Trojan.

    Ermac can do the following:

    • Read keystrokes;
    • Use overlays;
    • Steal emails from Gmail;
    • Steal 2FA codes;
    • Steal seed phrases from crypto wallets.

    The researchers say Zombinder is part of an even larger project used by many hacker groups to make their attacks more difficult.

    Author DeepWeb
    Old vulnerabilities in Cisco products got a second life
    The owner of the T-Mobile communication salon was given 10 years in prison

    Comments 0

    Add comment