#malware

[ follow ]
#rubygems
fromwww.theregister.com
10 hours ago

Malware crew TeamPCP open-sources its Shai-Hulud worm on GitHub

“Shai-Hulud: Open Sourcing The CarnageIs it vibe coded? Yes. Does it work? Let results speak. Change keys and C2 as needed. Love - TeamPCP”
Information security
#social-engineering
Information security
fromThe Hacker News
3 weeks ago

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

A social engineering campaign exploits Obsidian to distribute PHANTOMPULSE trojan targeting financial and cryptocurrency sectors.
Information security
fromSecurityWeek
1 day ago

Free OnlyFans Lure Used to Spread Cross-Platform CRPx0 Malware

CRPx0 uses a free OnlyFans lure to deliver stealthy malware that steals cryptocurrency, exfiltrates data, and deploys ransomware via persistence and C2 control.
Information security
fromThe Hacker News
3 weeks ago

Obsidian Plugin Abuse Delivers PHANTOMPULSE RAT in Targeted Finance, Crypto Attacks

A social engineering campaign exploits Obsidian to distribute PHANTOMPULSE trojan targeting financial and cryptocurrency sectors.
Privacy technologies
fromMakeUseOf
2 days ago

Malware is now hiding in Google search ads - here's how to protect yourself

Malicious ads in Google results can deliver Claude Mac malware via Terminal commands, appearing legitimate and running largely in memory.
Information security
fromInfoWorld
2 days ago

Malicious Hugging Face model masquerading as OpenAI release hits 244K downloads

Malicious Hugging Face model repos can impersonate legitimate releases, inflate popularity, and deliver credential-stealing malware to Windows systems through deceptive setup files.
#supply-chain-attacks
Information security
fromtheregister
2 days ago

Checkmarx tackles another TeamPCP intrusion as Jenkins plugin sabotaged

A modified Checkmarx Jenkins AST plugin was published on the Jenkins Marketplace, and untrusted versions must be replaced with the verified release.
Information security
fromTheregister
1 week ago

Ongoing supply chain attacks worm into SAP npm packages

Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
Information security
fromInfoWorld
2 weeks ago

More fake extensions linked to GlassWorm found in Open VSX code marketplace

73 new fraudulent extensions have been added to the Open VSX marketplace, continuing supply chain attacks that download GlassWorm malware.
Information security
fromTheregister
2 weeks ago

Don't pay VECT a ransom - your big files are likely gone

Organizations affected by Trivy and LiteLLM compromises that paid Vect likely received little data recovery, according to Check Point Research.
Information security
fromtheregister
2 days ago

Checkmarx tackles another TeamPCP intrusion as Jenkins plugin sabotaged

A modified Checkmarx Jenkins AST plugin was published on the Jenkins Marketplace, and untrusted versions must be replaced with the verified release.
Information security
fromTheregister
1 week ago

Ongoing supply chain attacks worm into SAP npm packages

Supply chain attacks have compromised multiple npm packages, including those from SAP and Intercom, with credential-stealing malware affecting developers.
Information security
fromInfoWorld
2 weeks ago

More fake extensions linked to GlassWorm found in Open VSX code marketplace

73 new fraudulent extensions have been added to the Open VSX marketplace, continuing supply chain attacks that download GlassWorm malware.
Information security
fromTheregister
2 weeks ago

Don't pay VECT a ransom - your big files are likely gone

Organizations affected by Trivy and LiteLLM compromises that paid Vect likely received little data recovery, according to Check Point Research.
Privacy professionals
fromThe Hacker News
2 days ago

Fake OpenAI Privacy Filter Repo Hits #1 on Hugging Face, Draws 244K Downloads

A typosquatted Hugging Face repo impersonated OpenAI’s Privacy Filter and delivered a Rust-based Windows infostealer via loader scripts and PowerShell execution.
Apple
fromFast Company
4 days ago

If you see this iCloud message on your iPhone, don't click it-it's a scam

Phishing messages impersonate Apple to trick iPhone users into clicking links that steal Apple ID and payment details or deliver malware.
Information security
fromSecurityWeek
5 days ago

In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director Frontrunner

Federal agencies are being pushed to patch critical vulnerabilities within three days due to faster AI-enabled exploitation.
#credential-theft
Information security
fromSecurityWeek
5 days ago

'PCPJack' Worm Removes TeamPCP Infections, Steals Credentials

PCPJack removes TeamPCP artifacts, then deploys a self-propagating credential-stealing framework across cloud environments using modular payloads.
Information security
fromThe Hacker News
1 week ago

Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

A large-scale credential theft campaign targeted over 35,000 users using legitimate email services and code of conduct-themed lures.
Information security
fromSecurityWeek
5 days ago

'PCPJack' Worm Removes TeamPCP Infections, Steals Credentials

PCPJack removes TeamPCP artifacts, then deploys a self-propagating credential-stealing framework across cloud environments using modular payloads.
Information security
fromThe Hacker News
1 week ago

Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries

A large-scale credential theft campaign targeted over 35,000 users using legitimate email services and code of conduct-themed lures.
#cybersecurity
fromTechCrunch
1 week ago
Information security

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

Information security
fromSecurityWeek
1 week ago

Trellix Source Code Repository Breached

Trellix experienced a breach of its source code repository but found no evidence of exploitation or impact on its source code distribution process.
Information security
fromSecurityWeek
1 week ago

DigiCert Revokes Certificates After Support Portal Hack

DigiCert revoked certificates fraudulently obtained through a cyberattack targeting its support portal, affecting multiple customer accounts.
Information security
fromArs Technica
1 week ago

Widely used Daemon Tools disk app backdoored in monthlong supply-chain attack

A minimalistic backdoor and a complex backdoor called QUIC RAT were identified in targeted attacks on various organizations.
Information security
fromTechCrunch
1 week ago

Kaspersky suspects Chinese hackers planted a backdoor into Daemon Tools in 'widespread' attack | TechCrunch

A backdoor in Daemon Tools has been identified, allowing hackers to target thousands of Windows computers and plant additional malware.
Information security
fromComputerworld
1 week ago

Stealthy malware abuses Microsoft Phone Link to siphon SMS OTPs from enterprise PCs

A new .NET trojan and Pheno plugin exploit Microsoft's Phone Link to capture mobile authentication codes from Windows systems without compromising phones.
Information security
fromSecurityWeek
1 week ago

Trellix Source Code Repository Breached

Trellix experienced a breach of its source code repository but found no evidence of exploitation or impact on its source code distribution process.
Information security
fromSecurityWeek
1 week ago

DigiCert Revokes Certificates After Support Portal Hack

DigiCert revoked certificates fraudulently obtained through a cyberattack targeting its support portal, affecting multiple customer accounts.
#supply-chain-attack
Information security
fromSecurityWeek
1 week ago

Government, Scientific Entities Hit via Daemon Tools Supply Chain Attack

A sophisticated supply chain attack targets organizations through malicious code in Daemon Tools software, affecting multiple countries and sectors.
Information security
fromThe Hacker News
1 week ago

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

A supply chain attack on DAEMON Tools has compromised installers to deliver malicious payloads, affecting users globally since April 2026.
Information security
fromTechRepublic
1 week ago

New WhatsApp Flaws Could Affect Billions of Users After Meta Security Patch

Meta patched two WhatsApp vulnerabilities affecting iOS, Android, and Windows users, enhancing security against risky files and links.
Information security
fromThe Hacker News
1 week ago

China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions

A China-nexus APT group, UAT-8302, targets government entities in South America and southeastern Europe using advanced malware like NosyDoor.
#phishing
Information security
fromSecurityWeek
1 week ago

Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations

Microsoft warns of a phishing campaign using a 'code of conduct review' theme targeting organizations in the US.
Information security
fromThe Hacker News
1 week ago

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

An active phishing campaign using legitimate RMM software has targeted over 80 organizations since April 2025, enabling persistent remote access.
Information security
fromSecurityWeek
1 week ago

New Bluekit Phishing Kit Features AI Assistant

Bluekit is a sophisticated phishing kit with AI capabilities, automated domain registration, and extensive templates for various online services.
Information security
fromSecurityWeek
1 week ago

Microsoft Warns of Sophisticated Phishing Campaign Targeting US Organizations

Microsoft warns of a phishing campaign using a 'code of conduct review' theme targeting organizations in the US.
Information security
fromThe Hacker News
1 week ago

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

An active phishing campaign using legitimate RMM software has targeted over 80 organizations since April 2025, enabling persistent remote access.
Information security
fromSecurityWeek
1 week ago

New Bluekit Phishing Kit Features AI Assistant

Bluekit is a sophisticated phishing kit with AI capabilities, automated domain registration, and extensive templates for various online services.
Information security
fromTechzine Global
1 week ago

Popular Daemon Tools utility exploited in supply chain attack

Daemon Tools' official website is distributing trojanized installers, enabling a supply chain attack with remote control capabilities since April 8th.
Information security
fromZDNET
1 week ago

Trojan abuses Microsoft Phone Link app to steal your passwords

CloudZ Trojan targets Microsoft Phone Link to steal sensitive information through a plugin, posing a significant threat to users.
#north-korea
Information security
fromThe Hacker News
1 week ago

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

A North Korea-aligned hacking group compromised a gaming platform to target ethnic Koreans in China using a backdoor called BirdCall.
Information security
fromSecurityWeek
3 weeks ago

North Korean Hackers Use AppleScript, ClickFix in Fresh macOS Attacks

North Korean hackers are targeting macOS users in financial organizations using social engineering techniques to install information-stealing malware.
#cybercrime
Information security
fromThe Hacker News
1 week ago

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

A China-based cybercrime group is targeting organizations in Russia and India with a new malware called ABCDoor via phishing emails.
Information security
fromThe Hacker News
1 week ago

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

A China-based cybercrime group is targeting organizations in Russia and India with a new malware called ABCDoor via phishing emails.
Information security
fromTechRepublic
1 week ago

New Global Scam Uses Fake Meeting Links to Run PowerShell Malware

BlueNoroff hackers exploit fake Zoom calls and fileless malware to steal credentials from Web3 and cryptocurrency organizations.
#open-source
Information security
fromDeveloper Tech News
1 week ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
Information security
fromDeveloper Tech News
1 week ago

Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks

The 'Mini Shai-Hulud' worm targets developer credentials across multiple ecosystems, exploiting vulnerabilities in popular packages to steal sensitive information.
#software-supply-chain
Information security
fromThe Hacker News
1 week ago

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.
Information security
fromThe Hacker News
1 week ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
Information security
fromThe Hacker News
1 week ago

Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft

A software supply chain attack campaign uses sleeper packages to push malicious payloads for credential theft and tampering.
Information security
fromThe Hacker News
1 week ago

PyTorch Lightning Compromised in PyPI Supply Chain Attack to Steal Credentials

Malicious versions of the Lightning Python package were released, enabling credential theft through an automated attack chain.
Information security
fromSecurityWeek
1 week ago

Hugging Face, ClawHub Abused for Malware Distribution

Threat actors exploit AI distribution platforms to distribute malware through trojanized shared files, relying on social engineering tactics to deceive users.
Information security
fromSecurityWeek
2 weeks ago

Dozens of Open VSX Extension Clones Linked to GlassWorm Malware

Over 70 extensions in the Open VSX marketplace are likely linked to GlassWorm malware, designed to steal sensitive information and deploy malware.
Software development
fromArs Technica
2 weeks ago

Open source package with 1 million monthly downloads stole user credentials

Developers must uninstall version 0.23.3 of elementary-data due to security vulnerabilities and follow specific remediation steps.
Information security
fromSecurityWeek
2 weeks ago

China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

GopherWhisper is a newly identified APT using legitimate services for command-and-control communication and data exfiltration, primarily targeting a Mongolian government entity.
Information security
fromSecurityWeek
2 weeks ago

US Federal Agency's Cisco Firewall Infected With 'Firestarter' Backdoor

A US federal agency was infected with malware due to vulnerabilities in Cisco firewalls linked to a China-backed espionage campaign.
#bitwarden
Information security
fromSecurityWeek
2 weeks ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
Information security
fromSecurityWeek
2 weeks ago

Bitwarden NPM Package Hit in Supply Chain Attack

The Bitwarden CLI NPM package was compromised, enabling credential theft through a malicious payload targeting various cloud services and GitHub repositories.
Information security
fromTechCrunch
2 weeks ago

Vercel says some of its customers' data was stolen prior to its recent hack | TechCrunch

Vercel experienced a data breach affecting customer accounts, with evidence of prior compromises suggesting broader security implications.
Information security
fromThe Hacker News
2 weeks ago

Vercel Finds More Compromised Accounts in Context.ai-Linked Breach

Vercel identified additional compromised customer accounts linked to a security incident involving unauthorized access to its internal systems.
#npm
Information security
fromInfoWorld
2 weeks ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromTheregister
2 weeks ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Information security
fromInfoWorld
2 weeks ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromTheregister
2 weeks ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
Information security
fromTechRepublic
3 weeks ago

Malicious TikTok Downloader Extensions Quietly Compromised 130K Users

Browser extensions disguised as TikTok video downloaders are compromising user data, highlighting vulnerabilities in enterprise security.
Information security
fromSecurityWeek
3 weeks ago

Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Google Antigravity's vulnerabilities have attracted both security researchers and cybercriminals, leading to risks of remote code execution and malware delivery.
Information security
fromThe Hacker News
3 weeks ago

Mustang Panda's New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles

A new variant of LOTUSLITE malware targets India's banking sector, focusing on espionage rather than financial gain.
Information security
fromThe Hacker News
3 weeks ago

SystemBC C2 Server Reveals 1,570+ Victims in The Gentlemen Ransomware Operation

The Gentlemen ransomware group uses SystemBC malware to target over 1,570 victims, employing sophisticated tactics for initial access and lateral movement.
Information security
fromTheregister
3 weeks ago

macOS ClickFix attacks deliver AppleScript stealers

A ClickFix campaign targets macOS users with an AppleScript infostealer that collects sensitive data from various browsers and cryptocurrency wallets.
Information security
fromSecurityWeek
3 weeks ago

Dozens of Malicious Crypto Apps Land in Apple App Store

Over two dozen fake cryptocurrency apps targeting iOS users have been found in the Apple App Store, aimed at stealing recovery phrases and private keys.
Information security
fromTechRepublic
3 weeks ago

Over 800 Android Apps Targeted in PIN-Stealing Trojan Campaign

Hackers exploit Android's overlay feature to capture PINs and monitor user interactions across over 800 apps using banking trojans.
Information security
fromThe Hacker News
3 weeks ago

Researchers Detect ZionSiphon Malware Targeting Israeli Water, Desalination OT Systems

ZionSiphon malware targets Israeli water treatment systems, showcasing a trend in politically motivated attacks on critical infrastructure.
Information security
fromThe Hacker News
3 weeks ago

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

Threat actors exploit vulnerabilities in TBK DVR and TP-Link routers to deploy Mirai-botnet variants, targeting IoT devices for large-scale attacks.
Information security
fromTechRepublic
3 weeks ago

Malicious WordPress Plugins with Backdoors Compromise Thousands of Websites

Malicious WordPress plugins with backdoors compromised thousands of websites, demonstrating a supply-chain attack and leading to their permanent removal.
[ Load more ]