#credential-theft

[ follow ]
#malware
Information security
fromSecurityWeek
5 days ago

'PCPJack' Worm Removes TeamPCP Infections, Steals Credentials

PCPJack removes TeamPCP artifacts, then deploys a self-propagating credential-stealing framework across cloud environments using modular payloads.
Information security
fromSecurityWeek
5 days ago

'PCPJack' Worm Removes TeamPCP Infections, Steals Credentials

PCPJack removes TeamPCP artifacts, then deploys a self-propagating credential-stealing framework across cloud environments using modular payloads.
Ruby on Rails
fromThe Hacker News
23 hours ago

RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded

RubyGems temporarily disabled new account registrations after a major malicious attack involving hundreds of packages, some carrying exploits.
Information security
fromtheregister
1 day ago

Cache-poisoning caper turns TanStack npm packages toxic

Eighty-four malicious TanStack npm package versions stole credentials, self-propagated, and wiped disks after poisoning GitHub Actions caches and extracting npm OIDC tokens.
Information security
fromSecurityWeek
1 day ago

TanStack, Mistral AI, UiPath Hit in Fresh Supply Chain Attack

A coordinated Mini Shai-Hulud supply chain attack compromised 170+ packages, stealing tokens and credentials and spreading via CI publishing of malicious package versions.
#supply-chain-attacks
Information security
fromThe Hacker News
1 day ago

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

TeamPCP modified npm and PyPI packages to run obfuscated environment profiling and credential stealing, exfiltrating data via external domains and GitHub token abuse.
fromTheregister
2 months ago
Information security

Supply chain breaches fuel cybercrime cycle, report says

Cybercriminals are industrializing supply chain attacks into a self-reinforcing ecosystem combining package compromise, credential theft, identity attacks, and ransomware.
Information security
fromThe Hacker News
1 day ago

Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages

TeamPCP modified npm and PyPI packages to run obfuscated environment profiling and credential stealing, exfiltrating data via external domains and GitHub token abuse.
Information security
fromThe Hacker News
1 day ago

cPanel CVE-2026-41940 Under Active Exploitation to Deploy Filemanager Backdoor

A critical cPanel flaw enables authentication bypass and remote control, with attackers deploying Filemanager backdoors, credential-stealing web shells, and cross-platform malware.
Information security
fromInfoWorld
2 days ago

Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads

Malicious Hugging Face model repos can impersonate legitimate releases, inflate popularity, and deliver credential-stealing malware to Windows systems through deceptive setup files.
#phishing
Information security
fromThe Hacker News
1 week ago

Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

A large-scale credential theft campaign targeted over 35,000 users using legitimate email services and code of conduct-themed lures.
Information security
fromThe Hacker News
2 months ago

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

Starkiller is a phishing suite that proxies legitimate login pages through attacker infrastructure to bypass MFA and capture credentials at scale.
Privacy technologies
fromTechzine Global
2 months ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
Information security
fromSecurityWeek
2 days ago

Over 500 Organizations Hit in Years-Long Phishing Campaign

Operation HookedWing has stolen over 2,000 credentials from 500+ organizations using long-running, adaptive phishing infrastructure and targeted lures across many sectors.
Information security
fromThe Hacker News
1 week ago

Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

A large-scale credential theft campaign targeted over 35,000 users using legitimate email services and code of conduct-themed lures.
Information security
fromThe Hacker News
1 month ago

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner

A phishing campaign targets French-speaking corporations with fake resumes, deploying malware for credential theft and cryptocurrency mining.
Privacy technologies
fromTechzine Global
2 months ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
Information security
fromTNW | Security
5 days ago

Hugging Face and ClawHub compromised with hundreds of malicious AI models and agent skills as supply chain attacks target AI infrastructure

Hugging Face and ClawHub were compromised with malicious models and skills that steal credentials, open backdoors, and hijack agents for cryptocurrency mining.
Information security
fromThe Hacker News
5 days ago

New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

PamDOORa is a PAM-based Linux backdoor that enables persistent SSH access using a magic password and TCP port, while harvesting credentials from legitimate users.
Information security
fromThe Hacker News
5 days ago

PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems

PCPJack steals credentials from exposed cloud and application services, exfiltrates data via attacker infrastructure, spreads worm-like, and aims for illicit revenue.
Information security
fromTechCrunch
5 days ago

Hackers hack victims hacked by other hackers | TechCrunch

Hackers compromised systems previously infected by TeamPCP, removed TeamPCP tools, then used the access to spread code, steal credentials, and exfiltrate data.
#cybersecurity
Information security
fromThe Hacker News
1 week ago

Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

CloudZ RAT and Pheno plugin facilitate credential theft by exploiting Microsoft Phone Link, allowing interception of sensitive mobile data without malware on devices.
Information security
fromThe Hacker News
1 week ago

SAP npm Packages Compromised by "Mini Shai-Hulud" Credential-Stealing Malware

A new supply chain attack campaign targets SAP-related npm packages with credential-stealing malware, affecting multiple versions and compromising developer environments.
#software-supply-chain
Information security
fromThe Hacker News
1 week ago

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.
Information security
fromThe Hacker News
1 week ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
Information security
fromThe Hacker News
1 week ago

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.
Information security
fromThe Hacker News
1 week ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
Information security
fromSecurityWeek
2 weeks ago

Incomplete Windows Patch Opens Door to Zero-Click Attacks

Incomplete patching of Windows vulnerabilities led to new zero-click attack vectors, enabling credential theft without user interaction.
Information security
fromSecurityWeek
2 weeks ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
Node JS
fromSecurityWeek
1 month ago

Guardarian Users Targeted With Malicious Strapi NPM Packages

A supply chain attack targeting the Strapi ecosystem involved 36 malicious NPM packages delivering various harmful payloads.
Information security
fromInfoQ
1 month ago

Open Source Security Tool Trivy Hit by Supply Chain Attack, Prompting Urgent Industry Response

A malicious release of the Trivy vulnerability scanner exposed critical weaknesses in software supply chain security, allowing for potential credential theft.
#litellm
fromInfoWorld
1 month ago
Information security

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

Information security
fromInfoWorld
1 month ago

PyPI warns developers after LiteLLM malware found stealing cloud and CI/CD credentials

Compromised LiteLLM packages executed a three-stage payload targeting sensitive data in cloud environments before being removed from PyPI.
#android-malware
Information security
fromThe Hacker News
1 month ago

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Perseus, a new Android malware evolved from Cerberus and Phoenix, actively targets users through dropper apps for device takeover and financial fraud, with primary focus on Turkey and Italy.
Information security
fromThe Hacker News
1 month ago

New Perseus Android Banking Malware Monitors Notes Apps to Extract Sensitive Data

Perseus, a new Android malware evolved from Cerberus and Phoenix, actively targets users through dropper apps for device takeover and financial fraud, with primary focus on Turkey and Italy.
Information security
fromMail Online
1 month ago

Urgent warning to all Gmail users over scam using security checks

A sophisticated scam mimics Google's security tool to steal Gmail credentials and device data through fake verification prompts and malicious PWA installation.
#seo-poisoning
fromSecurityWeek
1 month ago
Information security

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
Information security
fromThe Hacker News
2 months ago

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Storm-2561 uses SEO poisoning to distribute fake VPN clients that steal credentials by redirecting users to malicious websites hosting digitally signed trojans.
Information security
fromSecurityWeek
1 month ago

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
Information security
fromThe Hacker News
2 months ago

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Storm-2561 uses SEO poisoning to distribute fake VPN clients that steal credentials by redirecting users to malicious websites hosting digitally signed trojans.
#malware-distribution
Information security
fromTheregister
2 months ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
fromTheregister
2 months ago
Information security

Malware-laced OpenClaw installers get Bing AI search boost

Scammers exploited OpenClaw's popularity by creating fake installers on GitHub that appeared in Bing AI search results, distributing information stealers and malware to unsuspecting users.
Information security
fromTheregister
2 months ago

Credential-stealing crew spoofs Ivanti, Fortinet, Cisco VPNs

Storm-2561 cybercriminals distribute fake VPN clients through manipulated search results to steal user credentials via malicious MSI installers.
Information security
fromInfoQ
2 months ago

AI-Powered Bot Compromises GitHub Actions Workflows Across Microsoft, DataDog, and CNCF Projects

An autonomous AI bot exploited GitHub Actions workflows across major open-source repositories, achieving remote code execution and stealing credentials with write permissions between February 21-28, 2026.
#supply-chain-attack
Information security
fromThe Hacker News
2 months ago

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

UNC6426 exploited stolen GitHub tokens from the nx npm supply chain compromise to completely breach a victim's cloud environment and exfiltrate data within 72 hours.
Information security
fromThe Hacker News
2 months ago

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

UNC6426 exploited stolen GitHub tokens from the nx npm supply chain compromise to completely breach a victim's cloud environment and exfiltrate data within 72 hours.
Information security
fromThe Hacker News
2 months ago

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Five malicious Rust crates disguised as time utilities steal .env files containing API keys and secrets, exfiltrating data to threat actor infrastructure.
Information security
fromThe Hacker News
2 months ago

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Threat actors exploit FortiGate firewall vulnerabilities and weak credentials to access configuration files containing service account credentials and network topology information, targeting healthcare, government, and managed service providers.
Information security
fromTheregister
2 months ago

Crooks compromise WordPress sites, spread infostealers

Attackers compromised legitimate WordPress sites including a US Senate candidate's website to distribute infostealer malware through fake Cloudflare CAPTCHA pages that trick users into running malicious commands.
Information security
fromSecurityWeek
2 months ago

ClickFix Attack Uses Windows Terminal to Evade Detection

A new ClickFix attack variant bypasses Run dialog protections by instructing victims to use Windows Terminal for executing malicious PowerShell commands that lead to Lumma Stealer infections.
fromPCWorld
2 months ago

Phishing scammers weaponize ICE ragebait

The email seen by at least some customers of the Emma email platform was a phishing scam. Hackers hoped to inspire instant panic with the words, 'As part of our commitment to supporting U.S. Immigration and Customs Enforcement (ICE), we will be adding a Support ICE donation button to the footer of every email sent through our platform.'
Information security
Information security
fromTheregister
2 months ago

Microsoft spots ClickFix scam spreading Lumma infostealer

A new ClickFix scam variant tricks Windows users into pasting malware commands into Windows Terminal, deploying the Lumma credential-stealing infostealer to compromise browser vaults.
#phishing-as-a-service
Privacy technologies
fromSecurityWeek
2 months ago

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
Privacy technologies
fromSecurityWeek
2 months ago

Tycoon 2FA Phishing Platform Dismantled in Global Takedown

Europol and Microsoft led a coordinated takedown of Tycoon 2FA, a phishing-as-a-service platform responsible for 62% of phishing attempts blocked by Microsoft and affecting 96,000 victims worldwide.
Information security
fromTheregister
2 months ago

Scattered Lapsus$ Hunters seeks women to defraud helpdesks

Scattered Lapsus$ Hunters recruits women for social engineering attacks against IT helpdesks, offering $500-$1,000 per successful call to exploit gender bias in security training.
Information security
fromSecurityWeek
2 months ago

The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI

Over half of tracked vulnerabilities require no authentication, while AI amplifies attacker capabilities and supply chain breaches surge fourfold, creating expanding security risks.
Information security
fromTravel + Leisure
2 months ago

This New Travel Con Is So Real Looking It's Tricking Even the Most 'Scam Aware' Travelers-Here's How to Stay Safe

Urgent, personalized texts impersonating airlines or hotels trick travelers into clicking counterfeit links or calling scammers to steal login, payment, and travel-identifying information.
fromSecurityWeek
2 months ago

Hundreds of FortiGate Firewalls Hacked in AI-Powered Attacks: AWS

Over 600 Fortinet FortiGate firewall instances have been hacked in an AI-powered campaign that exploits exposed ports and weak credentials, AWS reports. The attacks, observed between January 11 and February 18, did not target known vulnerabilities. Instead, they focused on the exploitation of exposed device configurations across globally dispersed appliances. According to AWS, the campaign was carried out by an unsophisticated threat actor that relied on multiple commercial gen-AI services to implement known attack techniques.
Information security
Information security
fromDataBreaches.Net
2 months ago

A single compromised account gave hackers access to 1.2 million French banking records - DataBreaches.Net

Stolen credentials from one government official allowed attackers to access France's FICOBA database, exposing over 1.2 million bank accounts and sensitive financial data.
Information security
fromThe Hacker News
2 months ago

Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users

Massiv is an Android trojan that enables device takeover and credential theft via overlays, screen streaming, keylogging, SMS interception, and remote control for financial fraud.
fromComputerworld
2 months ago

Exploit available for new Chrome zero-day vulnerability, says Google

Gene Moody, field CTO at Action1, explained that, in this vulnerability, a browser frees an object, but later continues to use the stale reference memory location. Any attacker who can shape heap layout with controlled content can potentially replace the contents of that freed memory with data they control. Because this lives in the renderer, and is reachable through normal page content, he said, the trigger surface is almost absolute.
Information security
Information security
fromTechRepublic
2 months ago

Fake CAPTCHA Scam Tricks Windows Users Into Installing Malware

Fake CAPTCHA pages trick Windows users into running malicious PowerShell that deploys StealC malware to steal credentials, wallets, and system data.
Information security
fromTechzine Global
2 months ago

Lumma Stealer back despite previous police action

Lumma Stealer infections are increasing, using ClickFix social-engineering and memory-only CastleLoader to deploy credential-stealing malware that exfiltrates passwords, wallets, and system data.
Information security
fromThe Hacker News
2 months ago

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

A malicious Outlook add-in hijacked an abandoned add-in's domain, served a fake Microsoft login, and stole over 4,000 credentials in a supply chain takeover.
fromThe Hacker News
3 months ago

From Ransomware to Residency: Inside the Rise of the Digital Parasite

To be clear, ransomware isn't going anywhere, and adversaries continue to innovate. But the data shows a clear strategic pivot away from loud, destructive attacks toward techniques designed to evade detection, persist inside environments, and quietly exploit identity and trusted infrastructure. Rather than breaking in and burning systems down, today's attackers increasingly behave like Digital Parasites. They live inside the host, feed on credentials and services, and remain undetected for as long as possible.
Information security
Information security
fromInc
3 months ago

Platforms Can't Stop Live Pirates with Yesterday's Tools

Real-time fraudulent live streams impersonate brands and executives to steal credentials and money, exploiting platforms' inadequate live-moderation and causing rapid financial and reputational harm.
Information security
fromThe Hacker News
3 months ago

Mandiant Finds ShinyHunters Using Vishing to Steal MFA and Breach SaaS Platforms

ShinyHunters-linked actors use vishing and fraudulent credential sites to steal SSO and MFA credentials, access cloud SaaS data, and escalate extortion tactics.
Information security
fromInfoWorld
3 months ago

Crooks are hijacking and reselling AI infrastructure: Report

Threat actors are probing and hijacking exposed corporate LLM and MCP endpoints to steal compute, exfiltrate data, and resell API access for profit.
Information security
fromTheregister
3 months ago

Crims hit the easy button for IT helpdesk scams

Custom voice-phishing kits sold on dark-web channels enable attackers to spoof authentication flows, intercept credentials and MFA codes, and orchestrate live helpdesk social-engineering.
Information security
fromTheregister
3 months ago

Phishing attacks abuse SharePoint, target energy orgs

Attackers used SharePoint-based phishing to steal credentials, compromise energy-sector email accounts, and send hundreds of phishing messages from hijacked inboxes.
Information security
fromTechzine Global
3 months ago

Skeleton Key campaign exploits trusted RMM tools

Attackers hijack legitimate remote monitoring and management (RMM) tools, using stolen credentials and signed enterprise software to maintain stealthy persistent backdoors.
Information security
fromTheregister
3 months ago

Mandiant releases credential cracker, to kill bad protocol

Mandiant released rainbow tables that enable Net-NTLMv1 credentials to be cracked within 12 hours on consumer hardware, urging organizations to disable the legacy protocol.
fromArs Technica
3 months ago

Mandiant releases rainbow table that cracks weak admin password in 12 hours

Microsoft released NTLMv1 in the 1980s with the release of OS/2. In 1999, cryptanalyst Bruce Schneier and Mudge published research that exposed key weaknesses in the NTLMv1 underpinnings. At the 2012 Defcon 20 conference, researchers released a tool set that allowed attackers to move from untrusted network guest to admin in 60 seconds, by attacking the underlying weakness. With the 1998 release of Windows NT SP4 in 1998, Microsoft introduced NTLMv2, which fixed the weakness.
Information security
fromTechCrunch
3 months ago

Supreme Court hacker posted stolen government data on Instagram | TechCrunch

Moore accessed those systems using stolen credentials of users who were authorized to access them. Once he gained access to those victims' accounts, Moore accessed and stole their personal data and posted some online to his Instagram account: @ihackthegovernment. In the case of the Supreme Court victim, identified as GS, Moore posted their name and "current and past electronic filing records."
Information security
Information security
fromTheregister
4 months ago

North Korea turns QR codes into phishing weapons

North Korean-linked hackers use malicious QR codes (quishing) to steal credentials and session tokens, bypass multi-factor authentication, and maintain access to targeted organizations.
#npm
Information security
fromThe Hacker News
4 months ago

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Two malicious Google Chrome extensions named 'Phantom Shuttle' intercept traffic, inject credentials, act as MITM proxies, and exfiltrate data after paid subscriptions.
#npm-supply-chain
fromIT Pro
5 months ago
Information security

Shai-Hulud malware is back with a vengeance and hit more than 19,000 GitHub repositories so far - here's what developers need to know

fromIT Pro
5 months ago
Information security

Shai-Hulud malware is back with a vengeance and hit more than 19,000 GitHub repositories so far - here's what developers need to know

Information security
fromTheregister
4 months ago

China's Ink Dragon hides out in European government networks

Ink Dragon expanded espionage into European government networks, using compromised servers as relay nodes, stealing credentials and updating backdoors to blend with Microsoft cloud activity.
Information security
fromTheregister
4 months ago

SantaStealer bags credentials and crypto wallets

SantaStealer is a modular credential- and wallet-stealing infostealer advertised as undetectable despite samples lacking robust anti-analysis and evasion techniques.
Information security
fromComputerWeekly.com
4 months ago

What is driving the rise of infostealer malware? | Computer Weekly

Infostealer malware increasingly breaches credentials and session data, enabling account takeover, MFA bypass, fraud, and resale, driven by lax corporate and personal device security.
Information security
fromThe Hacker News
4 months ago

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Four new phishing kits — BlackForce, GhostFrame, InboxPrime AI, and Spiderman — enable large-scale credential theft and MFA bypass using MitB and evasion techniques.
Information security
fromAbove the Law
5 months ago

Incident Response Has Become A Law Firm Survival Skill - Above the Law

Law firms face targeted cyberattacks; preparedness and practiced incident response, clear leadership, and fast decisions prevent compounded damage and regulatory, ethical, and malpractice risks.
Information security
fromIT Pro
5 months ago

The most prominent infostealers and how businesses can protect against them

Infostealers increasingly harvest credentials that enable major breaches and ransomware, with strains like Stealerium and Lumma driving widespread, adaptable, multi-vector attacks.
Information security
fromThe Hacker News
5 months ago

Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More

Everyday development and collaboration tools can be weaponized to steal credentials, backdoor packages, and enable widespread supply-chain and account compromise.
Information security
fromsfist.com
5 months ago

Anthropic Says Its AI Chatbot Was Used By Chinese Hackers for Large-Scale Cyber Attack

Anthropic's Claude chatbot was used by state-sponsored Chinese hackers to automate large-scale cyberattacks against about 30 American companies.
Information security
fromZDNET
6 months ago

Google spots malware in the wild that morphs mid-attack, thanks to AI

AI-powered large language models are being used in active cyberattacks to create adaptive malware that dynamically rewrites code, steals credentials, and evades detection.
[ Load more ]