Tag: malware
-
Depot-Empfehlungen von Herbert Grönemeyer und Hasso Plattners Krypto-Tipps sind Teil globalen Malvertisings
Malvertising erreicht immer größere Dimensionen. Das zeigt eine aktuelle Analyse von 310 koordinierten Malvertisement-Kampagnen der Bitdefender Labs. In 25 Ländern auf sechs Kontinenten und in mehr als fünfzehn Sprachen spielen mindestens zwei bis drei cyberkriminelle Gruppen ihr Betrugsschema über mehr als 26.000 bezahlte Facebook-Anzeigen aus. Russischsprachige Metadaten in den Infrastrukturparametern belegen einen russischen Ursprung. Hinweise…
-
Devs looking for OpenClaw get served a GhostClaw RAT
From password theft to persistence: The second stage malware, internally referred to as “GhostLoader,” is a large JavaScript bundle implementing both an infostealer and a remote access framework. Once launched, GhostLoader installs itself into a hidden directory disguised as an npm telemetry service and sets up persistence mechanisms which include shell configuration hooks that automatically…
-
Russian military hackers revive advanced malware to spy on Ukraine, researchers say
Russian state hacker group APT28 has revived a sophisticated cyber-espionage toolkit to spy on Ukrainian targets, including military personnel, according to a report published Tuesday by cybersecurity firm ESET. First seen on therecord.media Jump to article: therecord.media/russia-apt-28-revives-malware-to-spy-on-ukraine
-
APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
The Russian state-sponsored hacking group tracked as APT28 has been observed using a pair of implants dubbed BEARDSHELL and COVENANT to facilitate long”‘term surveillance of Ukrainian military personnel.The two malware families have been put to use since April 2024, ESET said in a new report shared with The Hacker News.APT28, also tracked as Blue Athena,…
-
SurxRAT Android Malware Uses LLMs for Phishing and Data Theft
Tags: access, android, control, credentials, cyber, cybercrime, data, LLM, malware, phishing, ransomware, theftA new Android Remote Access Trojan (RAT) named SurxRAT, which is being sold as a commercial malware platform through a Telegram-based malware”‘as”‘a”‘service (MaaS) ecosystem. The malware, marketed under the SURXRAT V5 branding, enables cybercriminals to create customized Android malware builds capable of surveillance, credential theft, remote device control, and ransomware-style device locking. The malware appears…
-
Signed malware posing as Teams and Zoom apps drops RMM backdoors
A wave of phishing campaigns that used signed malware posing as popular workplace apps like Microsoft Teams, Zoom, and Adobe Reader to deploy remote monitoring and management (RMM) backdoors. The activity, attributed to an as-yet unidentified threat actor, highlights how trusted branding and valid-looking digital signatures can be abused to gain stealthy, long-term access in…
-
Neue Malware-as-a-Service tarnt sich als RMM-Tool – Malware für 300 Dollar im Monat mieten
First seen on security-insider.de Jump to article: www.security-insider.de/trustconnect-malware-as-a-service-300-dollar-a-7f2c6fa4d2d3ec946877c63c5a5bf01a/
-
Hackers Use Microsoft Teams to Manipulate Employees Into Allowing Remote Access
A newly discovered malware operation is targeting employees at finance and healthcare organizations by posing as internal IT support. Once inside, the attackers deploy a stealthy new tool called the A0Backdoor. Cybersecurity researchers at BlueVoyant have identified a threat group, known as Blitz Brigantine or Storm-1811, using email bombing and Microsoft Teams messages to trick…
-
My Really Fun RSA 2026 Presentations!
Tags: ai, apt, automation, cyber, cybersecurity, data, detection, google, governance, guide, lessons-learned, malware, soc, strategy, threatThis blog is perhaps a little bit more like an ad, so if you don’t want to check the ads, consider not reading it. a very cyber image (Gemini) But this year at RSA 2026, I’m speaking on three topics: securing AI, using AI for SOC, and sharing lessons about how Google applies AI and other technologies…
-
Ambivalenz: Malware-Erkennungen gesunken blockierte schädliche URLs zugenommen
Tags: malwareFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/ambivalenz-malware-erkennung-abnahme-blockierung-schad-urls-zunahme
-
Microsoft Teams phishing targets employees with A0Backdoor malware
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
Microsoft Teams phishing targets employees with A0Backdoor malware
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
Microsoft Teams phishing targets employees with backdoors
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
‘InstallFix’ Attacks Spread Fake Claude Code Sites
A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces. First seen on darkreading.com Jump to article: www.darkreading.com/cloud-security/installfix-attacks-fake-claude-code
-
CleanMyMac Imposter Site Installs SHub Stealer on Macs
A fake CleanMyMac site tricks macOS users into installing SHub Stealer malware that steals credentials and crypto wallets. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/cleanmymac-imposter-site-installs-shub-stealer-on-macs/
-
Chinese Cyber Threat Lurks In Critical Asian Sectors for Years
An undefined Chinese-speaking actor wields a combo of custom malware, open source tools, and LOTL binaries against Windows and Linux, likely for spying. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/chinese-cyber-threat-critical-asian-sectors
-
âš¡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware
Another week in cybersecurity. Another week of “you’ve got to be kidding me.”Attackers were busy. Defenders were busy. And somewhere in the middle, a whole lot of people had a very bad Monday morning. That’s kind of just how it goes now.The good news? There were some actual wins this week. Real ones. The kind…
-
Iran’s MuddyWater Hackers Target US Firms with New Dindoor Backdoor
Researchers say Iran’s MuddyWater hackers targeted US companies and an Israeli software firm’s department in a cyber campaign using the Dindoor malware – All this amid the ongoing conflict. First seen on hackread.com Jump to article: hackread.com/iran-muddywater-hackers-us-dindoor-backdoor/
-
BoryptGrab Malware Abuses GitHub to Steal Browser and Crypto Wallet Data
A new Windows stealer dubbed BoryptGrab is being distributed through a large, ongoing campaign abusing fake GitHub repositories that pose as free tools, game cheats, and popular utilities. The malware focuses on stealing browser data, cryptocurrency wallet information, and system details, while also grabbing screenshots, common files, Telegram data, Discord tokens, and stored passwords. Attackers created more…
-
Cyber Espionage Group CL-UNK-1068 Linked to China Targets Asian Infrastructure
Tags: china, cyber, espionage, government, group, infrastructure, law, malware, open-source, technology, threatA highly sophisticated cyber espionage group, designated as CL-UNK-1068, has been actively targeting critical infrastructure across South, Southeast, and East Asia since at least 2020. Originating from China, the threat actors focus on high-value sectors, including aviation, energy, government, law enforcement, technology, and telecommunications. The attackers use a versatile mix of custom malware, open-source utilities,…
-
Fake Claude Code install pages highlight rise of >>InstallFix<< attacks
Users looking for Anthropic’s Claude Code agentic AI coding tool are being tricked via fake Claude Code install pages into running malware, Push Security researchers … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/09/fake-claude-code-install-pages-installfix-attacks/
-
Fake Claude Code install pages highlight rise of >>InstallFix<< attacks
Users looking for Anthropic’s Claude Code agentic AI coding tool are being tricked via fake Claude Code install pages into running malware, Push Security researchers … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/09/fake-claude-code-install-pages-installfix-attacks/
-
MaaS VIP Keylogger Campaign Uses Steganography to Steal Credentials at Scale
A large-scale spear-phishing campaign distributing aVIP Keyloggervariant sold as Malware-as-a-Service (MaaS). The campaign employs steganography, in-memory execution, and modular payload design to evade defenses while harvesting credentials across browsers, email clients, and collaboration tools. Researchers observed fraudulent purchase-order emails that encouraged victims to open an attached RAR file. The compressed archive contained an executable disguised…
-
ClipXDaemon Malware Targets Crypto Users in Linux X11 Sessions
ClipXDaemon is a new Linux malware family that hijacks cryptocurrency clipboard data in X11 sessions, operating fully offline without any command”‘and”‘control (C2) infrastructure. It reuses a ShadowHS-style loader built with the public bincrypter framework but delivers a completely different, autonomous financial payload. ShadowHS used an obfuscated shell loader to deploy an in”‘memory hackshell for long”‘term…
-
Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering attackers a way to push malware to downstream customers, inject arbitrary code, and harvest sensitive data.The extensions in question, both originally associated with a developer named “akshayanuonline@gmail.com” (BuildMelon), are listed below -QuickLens – Search Screen with First…
-
ClipXDaemon Malware, a Stealthy Cryptocurrency Clipboard Hijacker on Linux
Security researchers have identified a new Linux malware strain called ClipXDaemon, a stealthy threat designed to target cryptocurrency users by manipulating copied wallet addresses. First seen on thecyberexpress.com Jump to article: thecyberexpress.com/clipxdaemon-linux-malware/

