Back to Feed

Tag

Malware

52 items tagged #malware

Articles

APT-C-23 is back to targeting in Israel using Micropsia? 🤔 Found a possible interesting sample f...

APT-C-23 resurfaces targeting Israel with Micropsia malware.

New macOS stealer campaign uses Script Editor in ClickFix attack

New campaign delivers Atomic Stealer to macOS via Script Editor in ClickFix variant attack.

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

New Chaos malware variant targets misconfigured cloud deployments, adds SOCKS proxy capability.

tl;dr North Korean state-sponsored hacker accidentally detonates information stealer malware. St...

North Korean state-sponsored hacker accidentally exposes stolen data and credentials.

‼️ A threat actor is advertising a Session ID hijacking service, claiming the ability to hijack a...

Threat actor advertises Session ID hijacking service for $5,000 USD in Monero.

‼️ Threat actor c00lssh is offering anonymous offshore VPS/RDP hosting services with various band...

Threat actor c00lssh advertises bulletproof VPS/RDP hosting services starting at $5.

systemautoupdater[.]com mon.systemautoupdater[.]com 23.27.141[.]44 🤔 🤷‍♂️ https://t.co/ExbR94BUE2

Suspicious domains and IP address associated with system updater malware infrastructure identified.

Evasive Masjesu DDoS Botnet Targets IoT Devices

Masjesu DDoS botnet targets IoT devices across Vietnam, Brazil, India, Iran, Kenya, and Ukraine.

Python Supply-Chain Compromise - Schneier on Security

Malicious .pth file discovered in litellm v1.82.8 PyPI package executes on Python startup.

New ClickFix Attack Uses Node.js Malware via Tor to Steal Crypto

ClickFix campaign uses fake CAPTCHAs to deploy Node.js RAT malware via Tor to steal crypto.

Financial cyberthreats in 2025 and the outlook for 2026

Kaspersky 2025 financial threat report shows infostealers surge while banking malware declines, with phishing shifting

Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs

Iran-linked hackers disrupt U.S. critical infrastructure by targeting internet-exposed PLCs.

> Be United States government > Say state-sponsored Iranian Threat Actors targeting PLCs &...

US government warns of Iranian state-sponsored threat actors targeting industrial PLCs.

Daily Dose of Dark Web Informer - April 7th, 2026

Daily dark web threat intelligence digest covering breaches, CVEs, and threat actor activity.

DOJ Disrupts Russian Military Intelligence DNS Hijacking Operation Through Court Order https://t...

DOJ disrupts Russian military intelligence DNS hijacking operation via court order.

Storm-1175 Deploys Medusa Ransomware at 'High Velocity'

Microsoft attributes Medusa ransomware deployments to Storm-1175 exploiting N-day and zero-day vulnerabilities.

Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware

REF1695 group deploys Monero mining malware via fake non-profit installers since late 2023.

Max severity Flowise RCE vulnerability now exploited in attacks

Max-severity RCE vulnerability CVE-2025-59528 in Flowise AI platform actively exploited.

‼️ Threat actor JINKUSU advertises OMNITRIX IMAP service offering email account monitoring, attac...

Threat actor JINKUSU advertises OMNITRIX IMAP service for unauthorized email monitoring and manipulation.

Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign

APT28 exploits MikroTik and TP-Link routers in global DNS hijacking campaign for credential theft.

APT28 exploit routers to enable DNS hijacking operations

APT28 exploits routers to hijack DNS and conduct credential-stealing man-in-the-middle attacks.

We have found 2 WHQL-signed kernel drivers exposing arbitrary code execution via IOCTL on \Device...

Two WHQL-signed Windows kernel drivers found with arbitrary code execution vulnerability via IOCTL.

pcTattleTale stalkerware maker sentence includes fine, supervised release

pcTattleTale stalkerware maker Bryan Fleming sentenced to $5K fine and supervised release.

CVE-2026-35616: FortiClient EMS Pre-Auth API Bypass Under Active Exploitation

CVE-2026-35616: FortiClient EMS pre-auth API bypass actively exploited in the wild.

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea

DPRK-linked Kimsuky group uses GitHub as C2 in multi-stage LNK-based attacks on South Korean targets.

‼️DF owner, Knox, is claiming to be selling a complete database backup and source code from Breac...

BreachForums database and source code offered for sale by DF owner Knox.

Automated Credential Harvesting Campaign Exploits React2Shell Flaw

UAT-10608 exploits React2Shell flaw in Next.js apps for automated credential theft.

Why Simple Breach Monitoring is No Longer Enough

Infostealers harvesting billions of credentials and session cookies render traditional breach monitoring ineffective.

How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers

TeamPCP compromised LiteLLM PyPI packages to inject infostealer malware targeting developer credentials.

Guardarian Users Targeted With Malicious Strapi NPM Packages

36 malicious NPM packages posing as Strapi plugins targeted Guardarian users.

North Korean Hackers Target High-Profile Node.js Maintainers

North Korean UNC1069 targets Node.js maintainers with social engineering to compromise NPM packages.

Traffic violation scams switch to QR codes in new phishing texts

Scammers deploy QR code phishing texts impersonating state courts to steal payment and personal data.

‼️ New BreachForums-like clone: Clearnet: pwnforums[.]st Dark Web: http://pwnfrm7rbf6kyerigxi...

BreachForums clone 'pwnforums' launched on clearnet and dark web.

Hackers exploit React2Shell in automated credential theft campaign

Hackers exploit React2Shell CVE in Next.js apps to steal credentials from 766 compromised hosts.

Axios npm hack used fake Teams error fix to hijack maintainer account

North Korean UNC1069 compromised Axios npm maintainer via social engineering to publish malicious package versions.

UNC1069 Targets Node.js Maintainers via Fake LinkedIn, Slack Profiles

UNC1069 targets Node.js maintainers via fake LinkedIn/Slack profiles to compromise npm packages.

‼️🇷🇺 Forum IP Leak ▪️Forum: Rehub ▪️IP: 5[.]175[.]247[.]131 ▪️Ports: 22, 25 ▪️ASN: 213501 Oni...

Russian darknet forum Rehub infrastructure details leaked including IP and domain.

🚦SentinelOne’s AI EDR autonomously stops a zero-day attack, Axios Supply Chain Attack Spreads Ac...

SentinelOne AI EDR blocks zero-day; Axios supply chain attack hits npm/PyPI; Chrome zero-day exploited.

‼️ New Ransomware Group: Krybit krybitxdpxohsmjooeb3gbgpmdddreh6mnflzac6bnezz74b7yje67yd[.]onion...

New ransomware group Krybit emerges with multiple Tor infrastructure.

‼️ New Ransomware Group: Krybit krybitxdpxohsmjooeb3gbgpmdddreh6mnflzac6bnezz74b7yje67yd[.]onion...

New ransomware group Krybit emerges with Tor-based infrastructure.

Latin America and the Caribbean Cybercrime Landscape

Insikt Group report on 2025 LAC cybercrime landscape reveals 452 ransomware incidents targeting Brazil, Mexico,

China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

China-linked TA416 targets European governments with PlugX malware and OAuth phishing.

‼️ "Incogniton," a multi-accounting anti-detect browser, is being promoted on a popular cybercrim...

Incogniton anti-detect browser promoted on cybercrime forum with free tier.

North Korean Hackers Abuse GitHub to Spy on South Korean Firms

North Korean hackers abuse GitHub to spy on South Korean firms using LNK files and PowerShell.

In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware

SecurityWeek roundup: Android rootkit, ChatGPT data leak, water facility ransomware, FBI breach.

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

UNC1069 social engineered Axios npm maintainer to publish trojanized package versions.

New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

SparkCat malware variant found on iOS and Android app stores steals crypto wallet recovery phrases.

Unit 42 identified a campaign targeting military entities with NATO, diplomatic, and military lur...

Unit 42 uncovers campaign targeting military entities using NATO exercise and defense conference lures.

How SentinelOne’s AI-powered EDR stops the Axios NPM supply chain attack autonomously and at mach...

SentinelOne's AI-powered EDR detected Axios NPM supply chain attack within 89 seconds of suspected North Korean

Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization

Iranian threat actors shift from custom wiper malware to identity abuse and MDM weaponization.

Events