Search Results

malware
GuptiMiner Malware Antivirus Updates Infostealers Compromised Systems

Hackers weaponise antivirus updates with GuptiMiner malware

North Korean hackers have been utilising the updating system of eScan antivirus to attach backdoors into major corporate networks and deploy cryptocurrency miners using the GuptiMiner malware. According to researchers, GuptiMiner is a highly advanced threat capable of executing DNS requests to the attacker’s DNS servers, extracting payloads from images, signing its payloads, and performing...
Continue Reading
SoumniBot Android Malware APK Infostealer

Decoding the evasion techniques of SoumniBot Android malware

Security experts are concerned about the clever evasion strategies and covert operation of a recently found Android banking malware called ‘SoumniBot.’ Different to conventional malware, SoumniBot utilises less frequent obfuscation tactics. It does this by taking advantage of flaws in the Android manifest extraction and parsing process in order to avoid detection and carry out...
Continue Reading
PowerShell Script Artificial Intelligence AI Malware Scully Spider Gang

Malicious PowerShell script deploys an AI-written malware

A new cybercriminal campaign has recently launched an attack using a sophisticated PowerShell script that researchers suspect crafted with the assistance of artificial intelligence (AI) technology such as ChatGPT, Gemini, or CoPilot. Based on reports, threat actors employed this script in an email campaign last March, targeting numerous organisations in Germany to spread the Rhadamanthys...
Continue Reading
eXotic Visit Malware Campaign Pakistan India AndroidOS

A malware campaign called eXotic Visit targets Pakistan and India

An Android malware campaign dubbed eXotic Visit has raised concerns among South Asian users, especially in India and Pakistan. Based on reports, this malicious operation has been operating since November 2021. Unlike common cyber threats linked to known groups, this campaign appears independent. The perpetrators behind eXotic Visit have distributed malware through various channels, such...
Continue Reading
PyPI Malware Campaign Supply Chain Attacks Data Repository

PyPI halts new user registration to address malware attacks

The Python Package Index (PyPI) has temporarily suspended new user registrations and created fresh projects to address the increasing number of malware campaigns against it since it has become a primary target for various threat actors. Hackers frequently use this platform to upload deceptive or face packages to infect and compromise software developers and potentially...
Continue Reading
MidJourney Malware Cyberattack AI Service Social Media

Hackers fake AI service MidJourney to spread malware

Hackers exploit Facebook’s advertising platform to distribute malware to unsuspecting users using promotional posts offering AI services, such as MidJourney. Threat actors also impersonate popular Artificial Intelligence (AI) services like OpenAI’s SORA, ChatGPT-5, and DALL-E to bait victims. Based on reports, these malicious campaigns begin with hacked Facebook profiles posing as genuine AI services. Hackers...
Continue Reading
Visa JSOutProx Malware Financial Institutions RAT

Visa clients targeted by a new variant of JSOutProx malware

Visa has published a warning regarding numerous detections of a new variant of the JSOutProx malware. Based on reports, the new variant now targets financial organisations and VISA clientele. Parties that received the alert posted by Visa’s Payment Fraud Disruption (PDF) units include card issuers, processors, and acquirers. The malicious campaign is allegedly a new...
Continue Reading
DarkGate Malware MS Windows Microsoft Vulnerability

DarkGate malware campaign exploits a new MS Windows bug

The notorious DarkGate malware operators allegedly executed a malicious cybercriminal campaign last January using a tactic that exploits a Microsoft Windows vulnerability. Based on reports, the exploit is a zero-day vulnerability that targets unsuspecting users through deceptive software installers, adding to the latest threat that emerged this year in the digital landscape.   The DarkGate...
Continue Reading
Magnet Goblin Cybercriminals Malware One Day Flaw Unpatched Software

Magnet Goblin exploits one-day flaws to launch malware

A malicious cybercriminal group known as Magnet Goblin has been active recently after exploiting vulnerabilities that allowed them to start their operation. Based on reports, the group’s latest antics target servers and edge devices that are susceptible to their tactics of abusing 1-day bugs. This group, active since January 2022, has been using unpatched software...
Continue Reading
ScreenConnect Malware KimsukyAPT Critical Vulnerability

ScreenConnect bugs allowed Kimsuky to launch malware

The advanced persistent threat (APT) group Kimsuky has executed a recent cybercriminal operation by exploiting newly discovered bugs on ScreenConnect. Based on reports, this assault capitalises on vulnerabilities within the ConnectWise ScreenConnect software, unleashing a variant of the infamous BabyShark malware, now dubbed ToddlerShark. The cybercriminal campaign exploits these flaws to acquire unauthorised access and...
Continue Reading
1 2 3 201