New I2PRAT communicates via anonymous peer-to-peer network

Criminals try to cover their tracks as best they can. This also includes hiding any activities that control the machines they have compromised. Using I2P is one way of doing that, but until recently this has rarely been used.      

Malware Analysis: A Kernel Land Rootkit Loader for FK_Undead

We discovered a Windows rootkit loader [F1] for the malware family FK_Undead. The malware family is known for intercepting user network traffic through manipulation of proxy configurations. To the best of our knowledge the rootkit loader hasn't been officially...