#supply-chain-malware

[ follow ]
Information security
fromThe Hacker News
2 days ago

ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit - and 20 More Stories

New widespread exploitations and undetected malware rapidly increase risk across consumer and enterprise devices while defenders race to patch and investigate.
fromThe Hacker News
1 week ago

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems

"Based on the victim's operating system and whether Qihoo 360 antivirus is running, the package downloads a payload, writes it to the system temp directory, and silently executes it," Socket security researcher Olivia Brown said in a report. "The package appears to return the Ethereum version number, so the victim is none the wiser." A notable aspect of the package is that it is explicitly designed to check for the presence of the "qhsafetray.exe" process,
Information security
Information security
fromTheregister
1 week ago

Browser extensions pushed malware to 4.3M Chrome, Edge users

A seven-year campaign used trusted Chrome and Edge extensions to deploy backdoors and spyware to 4.3 million users, exfiltrating data to servers in China.
#glassworm
fromInfoWorld
1 month ago
Information security

How GlassWorm wormed its way back into developers' code - and what it says about open source security

fromInfoWorld
1 month ago
Information security

How GlassWorm wormed its way back into developers' code - and what it says about open source security

Information security
fromThe Hacker News
2 months ago

North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers

North Korea-linked actors use multi-platform malware including AkdoorTea to target cryptocurrency and Web3 developers via fake recruiter job offers that install backdoors.
fromInfoWorld
2 months ago

QR codes become the vehicle for malware in new technique

The malicious package, fezbox, is disguised as a utility library and has "layers of obfuscation" including the "innovative, steganographic use" of QR codes. Steganography involves embedding secret data into a cover medium so that it goes undetected. "Steganography is the practice of hiding a secret file in plain sight, something for which QR codes are great," wrote Socket researcher Olivia Brown.
Information security
fromThe Hacker News
2 months ago

SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers

"SilentSync is capable of remote command execution, file exfiltration, and screen capturing," Zscaler ThreatLabz's Manisha Ramcharan Prajapati and Satyam Singh said. "SilentSync also extracts web browser data, including credentials, history, autofill data, and cookies from web browsers like Chrome, Brave, Edge, and Firefox." The packages, now no longer available for download from PyPI, are listed below. They were both uploaded by a user named "CondeTGAPIS."
Information security
[ Load more ]