#malware

[ follow ]
Information security
fromIT Pro
1 day ago

A new 'top-tier' Chinese espionage group is stealing sensitive data

A China-linked group, Phantom Taurus, conducts covert cyber-espionage against governments, militaries, and critical infrastructure across Africa, the Middle East, and Asia.
Information security
fromTheregister
6 days ago

Microsoft spots XCSSET strain hiding in Apple dev projects

XCSSET macOS malware variant targets developers via infected Xcode projects, adding stealthy persistence, obfuscation, Firefox data theft, and crypto clipboard hijacking.
Information security
fromKotaku
1 week ago

Malware 'Game' On Steam Stole $32K From Cancer-Stricken Streamer

A malicious update to the Steam game BlockBlasters deployed malware that drained a streamer’s $32,000 in crypto during a cancer fundraiser.
#npm
Information security
fromIT Pro
1 week ago

Hackers are disguising malware as ChatGPT, Microsoft Office, and Google Drive to dupe workers

SMBs in Europe and parts of Africa face malware and PUAs disguised as trusted tools, necessitating stronger employee training, authentication, patching, and secure software sourcing.
Digital life
fromThe Verge
1 week ago

Steam game removed after cryptostealer takes over $150K

A malicious Steam game, BlockBlasters, installed a cryptodrainer that stole over $150,000 from hundreds of players, including $32,000 from a cancer-stricken streamer.
Information security
fromFuturism
2 weeks ago

CrowdStrike Infested With "Self-Replicating Worms"

A self-replicating NPM worm named Shai-Hulud stole access tokens to compromise maintainer accounts and propagate across hundreds of packages, including CrowdStrike-managed modules.
Information security
fromIT Pro
2 weeks ago

Mobile app security is a huge blind spot for developer teams - 93% are confident their applications are secure, but 62% reported breaches last year

Organizations overestimate mobile app security readiness despite widespread breaches, accelerated release pressures, and frequent malware, data loss, and credential-theft incidents.
#phishing
fromIT Pro
1 month ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

fromIT Pro
1 month ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

Information security
fromTheregister
3 weeks ago

Double trouble with CastleRAT malware, now in C and Python

TAG-150 created CastleRAT in Python and C, using ClickFix social engineering to trick users into pasting commands that enable remote access and payload delivery.
Information security
fromWIRED
4 weeks ago

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

Stealerium automates sextortion by detecting porn browsing, screenshotting tabs, capturing webcam photos, and exfiltrating images alongside stolen credentials for blackmail.
Information security
fromZDNET
4 weeks ago

Why you should delete your browser extensions right now - or do this to stay safe

Malicious browser extensions infect millions, disable security features, and present significant privacy and performance risks even when they appear vetted.
Artificial intelligence
fromTechzine Global
1 month ago

Anthropic blocks misuse of Claude for cybercrime

Anthropic blocked attempts to misuse Claude for phishing, malware development, filter circumvention, and influence campaigns, banning accounts and tightening filters to mitigate risks.
fromThe Hacker News
1 month ago

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH but actually contains functionality to discreetly exfiltrate credentials to its creator. "On the first successful login, the package sends the target IP address, username, and password to a hard-coded Telegram bot controlled by the threat actor," Socket researcher Kirill Boychenko said. The deceptive package, named "golang-random-ip-ssh-bruteforce," has been linked to a GitHub account called IllDieAnyway (G3TT), which is currently no longer accessible.
Information security
#insider-threat
fromTheregister
1 month ago

Apache ActiveMQ attackers patch critical vuln after entry

After installing a backdoor to the infected systems, they then downloaded two Java Archive (JAR) files that effectively patched the original vuln.
Information security
#cybersecurity
fromZDNET
1 month ago
Information security

DripDropper Linux malware cleans up after itself - how it works

fromZDNET
1 month ago
Information security

DripDropper Linux malware cleans up after itself - how it works

fromThe Hacker News
1 month ago

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures

The Noodlophile campaign, active for over a year, now leverages advanced spear-phishing emails posing as copyright infringement notices, tailored with reconnaissance-derived details like specific Facebook Page IDs and company ownership information.
Information security
fromTheregister
1 month ago

Solana malware targeting Russian crypto developers

The threat actor known as 'cryptohan' has created npm packages that target the Solana cryptocurrency ecosystem and pretend to 'scan' for Solana SDK components.
Cryptocurrency
Privacy professionals
fromThe Hacker News
1 month ago

Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools

A Chinese-speaking APT actor, UAT-7237, targets web infrastructure in Taiwan using customized open-source tools for prolonged access.
#ransomware
Ruby on Rails
fromThe Hacker News
1 month ago

RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

60 malicious RubyGems packages target unsuspecting users, posing as automation tools to steal credentials.
Privacy technologies
fromThe Hacker News
1 month ago

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

SocGholish malware utilizes Traffic Distribution Systems to redirect users to malicious content and has a Malware-as-a-Service model for cybercriminal operations.
Python
fromThe Hacker News
1 month ago

Webinar: How to Stop Python Supply Chain Attacks-and the Expert Tools You Need

Python packages harbor risks due to rising supply chain attacks, notably through various exploitation techniques like typo-squatting and repo-jacking.
Privacy professionals
fromWIRED
1 month ago

A Single Poisoned Document Could Leak 'Secret' Data Via ChatGPT

Generative AI models can be configured to access personal data sources, posing serious security risks and vulnerabilities to sensitive information.
fromThe Hacker News
1 month ago

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections

"Like a real-world virus variant, this new 'ClickFix' strain quickly outpaced and ultimately wiped out the infamous fake browser update scam that plagued the web just last year."
Privacy professionals
Privacy professionals
fromBoston.com
1 month ago

Emergency communications on South Shore targeted by cyber attack

The South Shore Regional Emergency Communications Center was targeted in a cyber attack, rendering its dispatch software unusable but not disrupting 911 services.
#cyber-espionage
Cryptocurrency
fromThe Hacker News
2 months ago

Soco404 and Koske Malware Target Cloud Services with Cross-Platform Cryptomining Attacks

Two malware campaigns, Soco404 and Koske, exploit cloud vulnerabilities to deliver cryptocurrency miners.
#coyote-trojan
US politics
fromArs Technica
2 months ago

Ukrainians arrest alleged admin of major crime forum XSS

Ukrainian authorities arrested the suspected administrator of the Russian-language crime forum XSS.is, a key player in global cybercrime.
fromThe Hacker News
2 months ago

Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations

A critical security vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770 with a CVSS score of 9.8, has been weaponized in a large-scale exploitation campaign.
Information security
#android
fromThe Hacker News
2 months ago

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

"The BADBOX 2.0 botnet compromised over 10 million uncertified devices running Android's open-source software (Android Open Source Project), which lacks Google's security protections."
Privacy professionals
fromArs Technica
2 months ago

Google finds custom backdoor being installed on SonicWall network devices

The targeted devices are end of life, meaning they no longer receive regular updates for stability and security. Despite the status, many organizations continue to rely on them.
Privacy technologies
Node JS
fromBleepingComputer
2 months ago

North Korean XORIndex malware hidden in 67 malicious npm packages

North Korean threat actors delivered malware through 67 malicious npm packages, affecting over 17,000 downloads.
Apple
fromSecuritymagazine
2 months ago

New ZuRu Malware Variant Targeting Developers

ZuRu is a trojan malware for macOS that spreads through trojanized legitimate software and relies on social engineering tactics.
[ Load more ]