Malware

The XCSSET info-stealing malware is back, targeting macOS users and devs

The XCSSET info-stealing malware is back, targeting macOS users and devs 2025-02-17 at 19:50 By Zeljka Zorz A new, improved variant of the XCSSET macOS malware has been spotted “in limited attacks” by Microsoft’s threat researchers. XCSSET macOS malware XCSSET in information-stealing and backdoor-injecting malware targeting Mac users. It’s usually distributed via infected Xcode projects […]

React to this headline:

Loading spinner

The XCSSET info-stealing malware is back, targeting macOS users and devs Read More »

New FinalDraft Malware Spotted in Espionage Campaign

New FinalDraft Malware Spotted in Espionage Campaign 2025-02-17 at 15:49 By Ionut Arghire A newly identified malware family abuses the Outlook mail service for communication, via the Microsoft Graph API. The post New FinalDraft Malware Spotted in Espionage Campaign appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source React to

React to this headline:

Loading spinner

New FinalDraft Malware Spotted in Espionage Campaign Read More »

North Korean hackers spotted using ClickFix tactic to deliver malware

North Korean hackers spotted using ClickFix tactic to deliver malware 2025-02-13 at 18:34 By Zeljka Zorz North Korean state-sponsored group Kimsuky (aka Emerald Sleet, aka VELVET CHOLLIMA) is attempting to deliver malware to South Korean targets by leveraging the so-called “ClickFix” tactic. A relatively new tactic The ClickFix social engineering tactic has been dubbed thus

React to this headline:

Loading spinner

North Korean hackers spotted using ClickFix tactic to deliver malware Read More »

Over 3 million Fortune 500 employee accounts compromised since 2022

Over 3 million Fortune 500 employee accounts compromised since 2022 2025-02-13 at 07:03 By Help Net Security More than three million employee-linked corporate accounts were compromised between 2022 and 2024 across Fortune 500 companies, according to Enzoic. This surge is fueled by the widespread use of corporate email addresses for personal accounts and the growing

React to this headline:

Loading spinner

Over 3 million Fortune 500 employee accounts compromised since 2022 Read More »

BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites

BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites 2025-02-13 at 06:19 By rohansinhacyblecom Key Takeaways Overview On January 31, 2025, Cyble Research and Intelligence Labs (CRIL) identified a sample lnat-tv-pro.apk (13341c5171c34d846f6d0859e8c45d8a898eb332da41ab62bcae7519368d2248) being distributed via a phishing site “hxxps://tvipguncelpro[.]com/” impersonating iNat TV – online streaming platform from Turkey posing a serious threat to unsuspecting

React to this headline:

Loading spinner

BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites Read More »

OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials

OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials 2025-02-11 at 13:40 By Eduard Kovacs A hacker recently offered to sell 20 million OpenAI credentials, but the data likely comes from information stealers, not the AI firm’s systems. The post OpenAI Finds No Evidence of Breach After Hacker Offers to

React to this headline:

Loading spinner

OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials Read More »

Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys

Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys 2025-02-07 at 14:22 By Zeljka Zorz A ViewState code injection attack spotted by Microsoft threat researchers in December 2024 could be easily replicated by other attackers, the company warned. “In the course of investigating, remediating, and building protections against this activity, we observed an insecure

React to this headline:

Loading spinner

Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys Read More »

Crypto-stealing iOS, Android malware found on App Store, Google Play

Crypto-stealing iOS, Android malware found on App Store, Google Play 2025-02-05 at 13:25 By Zeljka Zorz A number of iOS and Android apps on Apple’s and Google’s official app stores contain a software development kit (SDK) that allows them to exfiltrate cryptowallets’ seed recovery phrases, Kaspersky researchers have found. “The infected apps in Google Play

React to this headline:

Loading spinner

Crypto-stealing iOS, Android malware found on App Store, Google Play Read More »

22 New Mac Malware Families Seen in 2024

22 New Mac Malware Families Seen in 2024 2025-02-04 at 19:03 By Eduard Kovacs Nearly two dozen new macOS malware families were observed in 2024, including stealers, backdoors, downloaders and ransomware.  The post 22 New Mac Malware Families Seen in 2024 appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

22 New Mac Malware Families Seen in 2024 Read More »

Developers Targeted With Malware Disguised as DeepSeek Package

Developers Targeted With Malware Disguised as DeepSeek Package 2025-02-04 at 14:03 By Eduard Kovacs Python developers looking to integrate DeepSeek into their projects were targeted with malicious packages delivered through PyPI. The post Developers Targeted With Malware Disguised as DeepSeek Package appeared first on SecurityWeek. This article is an excerpt from SecurityWeek View Original Source

React to this headline:

Loading spinner

Developers Targeted With Malware Disguised as DeepSeek Package Read More »

DeepSeek’s popularity exploited to push malicious packages via PyPI

DeepSeek’s popularity exploited to push malicious packages via PyPI 2025-02-03 at 15:33 By Zeljka Zorz Two malicious packages leveraging the DeepSeek name have been published to the Python Package Index (PyPI) package repository, and in the 30 minutes or so they were up, they have been downloaded 36 times. The malicious packages The attack started

React to this headline:

Loading spinner

DeepSeek’s popularity exploited to push malicious packages via PyPI Read More »

DeepSeek’s popularity exploited by malware peddlers, scammers

DeepSeek’s popularity exploited by malware peddlers, scammers 2025-01-29 at 15:18 By Zeljka Zorz As US-based AI companies struggle with the news that the recently released Chinese-made open source DeepSeek-R1 reasoning model performs as well as theirs for a fraction of the cost, users are rushing to try out DeepSeek’s AI tool. In the process, they

React to this headline:

Loading spinner

DeepSeek’s popularity exploited by malware peddlers, scammers Read More »

Europeans targeted with new Tor-using backdoor and infostealers

Europeans targeted with new Tor-using backdoor and infostealers 2025-01-28 at 15:04 By Zeljka Zorz A financially motivated threat actor has been targeting German and Polish-speaking users with info-stealing malware and TorNet, a previously undocumented .NET backdoor that leverages the Tor network to evade detection. The phishing email The attacker sends out fake money transfer confirmations

React to this headline:

Loading spinner

Europeans targeted with new Tor-using backdoor and infostealers Read More »

Juniper enterprise routers backdoored via “magic packet” malware

Juniper enterprise routers backdoored via “magic packet” malware 2025-01-23 at 20:05 By Zeljka Zorz A stealthy attack campaign turned Juniper enterprise-grade routers into entry points to corporate networks via the “J-magic” backdoor, which is loaded into the devices’ memory and spawns a reverse shell when instructed to do so. “Our telemetry indicates the J-magic campaign

React to this headline:

Loading spinner

Juniper enterprise routers backdoored via “magic packet” malware Read More »

Defense strategies to counter escalating hybrid attacks

Defense strategies to counter escalating hybrid attacks 2025-01-23 at 07:33 By Zeljka Zorz In this Help Net Security interview, Tomer Shloman, Sr. Security Researcher at Trellix, talks about attack attribution, outlines solutions for recognizing hybrid threats, and offers advice on how organizations can protect themselves against hybrid attacks. What are the most promising technologies or

React to this headline:

Loading spinner

Defense strategies to counter escalating hybrid attacks Read More »

China-aligned PlushDaemon APT compromises supply chain of Korean VPN

China-aligned PlushDaemon APT compromises supply chain of Korean VPN 2025-01-22 at 08:04 By Help Net Security ESET researchers have uncovered a supply chain attack targeting a South Korean VPN provider, carried out by PlushDaemon, a newly identified China-aligned APT group. In this cyberespionage campaign, the attackers compromised the legitimate installer, replacing it with a malicious

React to this headline:

Loading spinner

China-aligned PlushDaemon APT compromises supply chain of Korean VPN Read More »

FBI removed PlugX malware from U.S. computers

FBI removed PlugX malware from U.S. computers 2025-01-15 at 14:24 By Help Net Security The Justice Department announced on Tuesday that, alongside international partners, the FBI deleted “PlugX” malware from thousands of infected computers worldwide. As described in court documents unsealed in the Eastern District of Pennsylvania, a group of hackers sponsored by the People’s

React to this headline:

Loading spinner

FBI removed PlugX malware from U.S. computers Read More »

Banshee Stealer variant targets Russian-speaking macOS users

Banshee Stealer variant targets Russian-speaking macOS users 2025-01-09 at 19:48 By Zeljka Zorz The Banshee Stealer is a stealthy threat to the rising number of macOS users around the world, including those in Russian-speaking countries, according to Check Point researcher Antonis Terefos. Banshee Stealer was first publicly profiled in August 2024, a month after its

React to this headline:

Loading spinner

Banshee Stealer variant targets Russian-speaking macOS users Read More »

Researchers reveal OT-specific malware in use and in development

Researchers reveal OT-specific malware in use and in development 2024-12-17 at 16:43 By Zeljka Zorz Malware that’s made specifically to target industrial control systems (ICS), Internet of Things (IoT) and operational technology (OT) control devices is still rare, but in the last few weeks security researchers have identified two salient threats based on samples uploaded

React to this headline:

Loading spinner

Researchers reveal OT-specific malware in use and in development Read More »

Malvertising on steroids serves Lumma infostealer

Malvertising on steroids serves Lumma infostealer 2024-12-17 at 14:30 By Zeljka Zorz A large-scale malvertising campaign distributing the Lumma infostealer malware via intrusive “ads” leading to fake CAPTCHA pages has been tied by researchers to a threat actor abusing the Monetag ad network. The campaign from the users’ perspective Internet users usually land on one

React to this headline:

Loading spinner

Malvertising on steroids serves Lumma infostealer Read More »

Scroll to Top