GoldenJackal strikes againβtargeting high-profile, air-gapped networks in embassies and government entities with sophisticated #malware like JackalWorm.
Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html
Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html
Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
π₯10π4β‘3π3
π A new spear-phishing campaign in Brazil is using a clever trick to bypass security guardrails and deliver the dangerous Astaroth #malware.
Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
β‘7π€7π5π₯3π2
β οΈ Alert for developers - Three packages found to contain the BeaverTail #malware linked to North Korean cyber campaigns.
Find details here: https://thehackernews.com/2024/10/beavertail-malware-resurfaces-in.html
Find details here: https://thehackernews.com/2024/10/beavertail-malware-resurfaces-in.html
π₯8β‘2π2
β οΈ Russian espionage group UNC5812 is using Telegram to deliver #malware designed to undermine military recruitment in Ukraine.
Threats like SUNSPINNER and CraxsRAT exploit vulnerabilities in #Android and Windows.
Read: https://thehackernews.com/2024/10/russian-espionage-group-targets.html
Threats like SUNSPINNER and CraxsRAT exploit vulnerabilities in #Android and Windows.
Read: https://thehackernews.com/2024/10/russian-espionage-group-targets.html
π12β‘5π2
Researchers have uncovered a malicious Python package posing as a #cryptocurrency trading tool. Downloaded over 1,300 times before removal, this #malware affects Windows and macOS systems.
Read: https://thehackernews.com/2024/10/researchers-uncover-python-package.html
Read: https://thehackernews.com/2024/10/researchers-uncover-python-package.html
π12
β οΈ Alert: SYS01stealer is on the rise! This #malware not only steals data but exploits #Facebook ads to amplify its reach, making it a unique threat for businesses relying on social media for marketing.
Learn more: https://thehackernews.com/2024/10/malvertising-campaign-hijacks-facebook.html
Learn more: https://thehackernews.com/2024/10/malvertising-campaign-hijacks-facebook.html
π11π6
π¨ Hundreds of typosquatted versions targeting npm developers are attempting to deliver cross-platform #malware by employing Ethereum smart contracts for command-and-control (C2) communications.
Read: https://thehackernews.com/2024/11/malware-campaign-uses-ethereum-smart.html
Read: https://thehackernews.com/2024/11/malware-campaign-uses-ethereum-smart.html
β‘5π4π1
π¨ Cyber alert: The CopyRh(ight)adamantys phishing campaign is leveraging copyright themes to spread the Rhadamanthys stealer, while Kaspersky reveals SteelFox #malware, exploiting vulnerable drivers for data theft.
Learn more: https://thehackernews.com/2024/11/steelfox-and-rhadamanthys-malware-use.html
Learn more: https://thehackernews.com/2024/11/steelfox-and-rhadamanthys-malware-use.html
β‘6π₯5π2
North Korean hackers are ramping up attacks on crypto firms with a sophisticated #malware campaign.
Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.
Read more β https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.
Read more β https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
π7π₯4π4β‘3
π¦ π» Researchers unveil CRON#TRAP, a new #malware campaign using a Linux virtual instance to compromise Windows systems.
Read the full article to stay informed π https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
Read the full article to stay informed π https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
π₯9π8π5
Warning -- PXA Stealer, a new Python-based #malware, is targeting European & Asian gov and education sectors, stealing sensitive data like credentials & financial info.
Learn more: https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html
Learn more: https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html
β‘14π€―3π2
π¨ New stealth #malware "BabbleLoader" is bypassing AI detection with a slew of evasive tricks, making it one of the most sophisticated threats in the wild.
Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
π13β‘5π3
π¨ Facebook Ads Manager under attack!
A revamped python-based NodeStealer #malware now targets Facebook business accounts, harvesting credit card data from browsers. It utilizes techniques like Windows Restart Manager to unlock database files, junk code injection, and dynamic execution of Python scripts.
π Find out how: https://thehackernews.com/2024/11/nodestealer-malware-targets-facebook-ad.html
A revamped python-based NodeStealer #malware now targets Facebook business accounts, harvesting credit card data from browsers. It utilizes techniques like Windows Restart Manager to unlock database files, junk code injection, and dynamic execution of Python scripts.
π Find out how: https://thehackernews.com/2024/11/nodestealer-malware-targets-facebook-ad.html
π€10β‘7π7π4π2
Cybercriminals are using Godot Engine, a popular open-source game engine, to spread #malware undetected across Windows, macOS, and Linux devices.
Over 17,000 systems have been infected since June 2024.
Find details here β https://thehackernews.com/2024/11/cybercriminals-exploit-popular-game.html
Over 17,000 systems have been infected since June 2024.
Find details here β https://thehackernews.com/2024/11/cybercriminals-exploit-popular-game.html
π15π₯8π€―4β‘2π€1
Manufacturing & healthcare sectors are being targeted by SmokeLoader #malwareβmodular, evasive, and deadly.
With plugins that steal data, mine crypto, and launch DDoS, no system is safe.
Full story here: https://thehackernews.com/2024/12/smokeloader-malware-resurfaces.html
With plugins that steal data, mine crypto, and launch DDoS, no system is safe.
Full story here: https://thehackernews.com/2024/12/smokeloader-malware-resurfaces.html
π13π5β‘3π€1
Russia-linked APT group Turla has been hijacking the infrastructure of a Pakistani hacking group to spy on Afghan and Indian government targets by deploying custom #malware, TwoDash and Statuezy.
Learn more: https://thehackernews.com/2024/12/russia-linked-turla-exploits-pakistani.html
Learn more: https://thehackernews.com/2024/12/russia-linked-turla-exploits-pakistani.html
π24π₯8π€―6π5β‘2π1
π ZLoader #malware is backβwith a stealthy upgrade. The latest version employs DNS tunneling for encrypted communication, raising the stakes for detection efforts.
This isnβt just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.
Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
This isnβt just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.
Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
π₯15π8π€―2
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ A trusted Windows feature, UI Automation, can be exploited by #malware to bypass EDR detection, execute stealthy commands, and steal data undetected.
π Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
π Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
π20π₯5π€―4β‘3π2
A Russian state-sponsored group, Secret Blizzard, is leveraging other hackersβ #malware to deploy its tools in Ukraine, raising the stakes in cyber warfare.
Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
π14π9π₯7π€―4π±3π2β‘1