Advertisement Β· 728 Γ— 90
#
Hashtag
#malwareattacks
Advertisement Β· 728 Γ— 90
Preview
US charges 31 more suspects linked to ATM malware attacks A Nebraska federal grand jury charged 31 additional defendants for their involvement in an ATM jackpotting operation allegedly orchestrated by members of the Venezuelan gang Tren de Aragua.

US charges 31 more suspects linked to ATM malware attacks
www.bleepingcomputer.com/news/securit...

#Infosec #Security #Cybersecurity #CeptBiro #US #ATM #MalwareAttacks

0 0 0 0
Preview
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer Detour Dog used DNS TXT records and botnets to distribute Strela Stealer via StarFish backdoor.

Detour Dog just flipped the script!

The group once known for shady redirects is now pushing Strela Stealer via hacked WordPress sites + DNS TXT records.

90% of sites look normalβ€”until they quietly fetch malware. #MalwareAttacks #CyberSecurity thehackernews.com/2025/10/deto...

3 5 0 0

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks reconbee.com/china-linked...

#china #chinese #PlugXmalware #Bookwormmalware #malwareattacks #AsianTelecom #ASEANnetworks #potatoattack

0 0 0 0
Preview
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks Cycldek that speaks Chinese read more about China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks

China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks reconbee.com/china-linked...

#china #chinese #PlugXmalware #Bookwormmalware #malwareattacks #AsianTelecom #ASEANnetworks #cyberattack

0 0 0 0
Preview
HiddenGh0st Winos and kkRAT Exploit SEO GitHub Pages in Chinese Malware Attacks which is also known as SwimSnake read more about HiddenGh0st Winos and kkRAT Exploit SEO GitHub Pages in Chinese Malware Attacks

HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks reconbee.com/hiddengh0st-...

#HiddenGh0st #winos #KKRAT #SEO #GitHuB #chinese #chinesemalwareattacks #malwareattacks

1 0 0 0
Preview
20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack 20 npm packages with 2B weekly downloads compromised after maintainer phishing led to crypto-stealing malware.

🚨 20 npm packages with 2 BILLION+ weekly downloads (incl. chalk & debug) were hacked.

A maintainer was phished into giving up 2FA β€” attackers slipped in malware that hijacks wallets & steals crypto. #CyberSecurity #MalwareAttacks thehackernews.com/2025/09/20-p...

10 8 0 0
Preview
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials Coyote malware uses Windows UI Automation to target 75 banks and crypto sites in Brazil, risking credential theft.

ICYMI β€” A new variant of Coyote malware is now abusing Windows accessibility features to steal banking and crypto credentials.

It scans browser windows with UI Automation, targeting 75+ financial institutionsβ€”even offline. #MalwareAttacks #CyberSecurity thehackernews.com/2025/07/new-...

4 7 0 0
Preview
North Korean Hackers Target Fintech and Gaming Firms with Fake Zoom Apps Β A newly uncovered cyber campaign is targeting organizations across North America, Europe, and the Asia-Pacific by exploiting fake Zoom applications. Cybersecurity experts have traced the operation to BlueNoroff, a notorious North Korean state-backed hacking group affiliated with the Lazarus Group. The campaign’s primary focus is on the gaming, entertainment, and fintech sectors, aiming to infiltrate systems and steal cryptocurrency and other sensitive financial data.Β  Attack strategyΒ  The attack begins with a seemingly innocuous AppleScript disguised as a routine maintenance operation for Zoom’s software development kit (SDK). However, hidden within the scriptβ€”buried beneath roughly 10,000 blank linesβ€”are malicious commands that quietly download malware from a counterfeit domain, zoom-tech[.]us.Β  Once the malware is downloaded, it integrates itself into the system through LaunchDaemon, granting it persistent and privileged access at every system startup. This allows the malware to operate covertly without raising immediate alarms. The malicious software doesn’t stop there. It fetches additional payloads from compromised infrastructure, presenting them as legitimate macOS components like β€œicloud_helper” and β€œWi-Fi Updater.”  These files are designed with anti-forensics techniques to erase temporary files and conceal their activity, all while maintaining a hidden backdoor for remote control and data exfiltration. This deceptive approach is particularly dangerous in remote work environments, where minor software issues are often resolved without deep inspectionβ€”making it easier for such malware to slip past unnoticed.Β  Motives behind the attack BlueNoroff’s intent appears financially driven. The malware specifically searches for cryptocurrency wallet extensions, browser-stored login credentials, and authentication keys. In one known incident dated May 28, a Canadian online gambling platform fell victim to this scheme after its systems were compromised via a fraudulent Zoom troubleshooting script.Β  Protection Measures for Organizations Given the growing sophistication of such campaigns, security experts recommend several protective steps:Β  β€’ Independently verify Zoom participants to ensure authenticity.Β  β€’ Block suspicious domains like zoom-tech[.]us at the firewall level.Β  β€’ Deploy comprehensive endpoint protection that can detect hidden scripts and unauthorized daemons.Β  β€’ Invest in reliable antivirus and ransomware protection, especially for firms with cryptocurrency exposure.Β  β€’ Use identity theft monitoring services to detect compromised credentials early.Β  β€’ Train employees to recognize and respond to social engineering attempts.Β  β€’ Secure digital assets with hardware wallets instead of relying on software-based solutions alone.

North Korean Hackers Target Fintech and Gaming Firms with Fake Zoom Apps #cyberattackstrendingnews #malware #Malwareattacks

0 0 0 0
Preview
These fake AI video generators steal passwords​ | Cybernews Cybercriminals are using fake AI video tools like Kling AI and Luma AI to spread malware, steal data, and exploit millions across Facebook and LinkedIn

Cybercriminals have entered the AI gold rush to spread malware. Fake AI video generators are tempting users and stealing their data.

#cybercrime #cybersecurity #AI #MalwareAttacks cybernews.com/security/ai-...

4 4 0 0
Preview
Fake Zenmap. WinMRT sites target IT staff with Bumblebee malware The Bumblebee malware SEO poisoning campaign uncovered earlier this week aimpersonating RVTools is using more typosquatting domainsi mimicking other popular open-source projects to infect devices used...

#Bumblebee malware SEO poisoning campaign uncovered earlier this week aimpersonating RVTools is using more typosquatting domainsi mimicking other popular open-source projects to infect devices used by IT staff. #MalwareAttacks #CyberSecurity www.bleepingcomputer.com/news/securit...

7 2 0 0
Preview
Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data Golden Chickens launch TerraStealerV2 and TerraLogger; both still developing but actively steal data via OCX payloads.

New malware drop from Golden Chickens: TerraStealerV2 steals browser logins, crypto wallets, and extensions, while TerraLogger silently records keystrokes.

πŸ“¦ Spread via EXE, MSI, LNK, OCX
πŸ“€ Sends data to Telegram + shady domain
#cybersecurity #MalwareAttacks
thehackernews.com/2025/05/gold...

2 3 1 0
Preview
Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool Custom malware hidden in UyghurEdit++ targeted WUC leaders since May 2024, exposing Uyghur diaspora surveillance links to China.

New #CyberAttackAlert!

Senior members of the World Uyghur Congress were targeted by malware hidden in a fake UyghurEdit++ app, Citizen Lab reports (Mar 2025).

β€” Custom-made spyware
β€” Links to China
β€” Started as early as May 2024
#MalwareAttacks thehackernews.com/2025/04/malw...

1 3 0 0
Video

#LotusPanda #MalwareAttacks #SoutheastAsia #Hacking #ThreatsAndVulnerabilities
https://dailynewser.netlify.app

0 0 0 0
Preview
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool UNC5174 uses SNOWLIGHT and VShell to target Linux and macOS systems, exploiting Ivanti flaws for remote control.

πŸ” Targets: 20+ nations | Sectors: Gov, finance, defense
πŸ›  Tactics: Open-source tools, fileless payloads, fake authenticator apps
πŸ‘€ Risk: Remote control, in-memory attacks, hard-to-trace
#MalwareAttacks #CyberSecurity
thehackernews.com/2025/04/chin...

1 1 0 0
Preview
New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations FamousSparrow deployed two enhanced SparrowDoor variants and ShadowPad in July 2024 attacks, signaling active tool development.

New Chinese cyber attack spotted.

FamousSparrow breached a U.S. trade group + Mexican institute using new, modular malware: SparrowDoor + ShadowPad (first use).
#MalwareAttacks #CyberAlerts thehackernews.com/2025/03/new-...

4 3 0 0
Preview
Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps FakeApp campaign leverages .NET MAUI to steal data from Indian, Chinese users via bogus banking and social apps

Malware Alert! Hackers are using Microsoft’s .NET MAUI to build fake banking & social apps targeting Indian and Chinese users.

🎯 Targets include banks, X (Twitter), and photo apps. 🧠 Malware hides in app buttons
#MalwareAttacks
thehackernews.com/2025/03/hack...

5 3 0 0
Preview
Have I Been Pwned adds 284M accounts stolen by infostealer malware ​The Have I Been Pwned data breach notification service has added over 284 million accounts stolen by information stealer malware and found on a Telegram channel.

Have I Been Pwned data breach notification service has added over 284 million accounts stolen by information stealer malware and found on a Telegram channel. #MalwareAttacks #CyberCrime www.bleepingcomputer.com/news/securit...

27 17 0 0
Preview
5 Active Malware Campaigns in Q1 2025 NetSupport RAT spread via fake CAPTCHAs, Lynx stole 170GB, and AsyncRAT used Python payloads in Q1 2025.

πŸ›‘ Cybercriminals are using the ClickFix technique to spread the NetSupport RAT in 2025. Embedded in fake CAPTCHA pages, this RAT grants attackers full control, stealing sensitive data and spying in real-time.
#CyberCrime #MalwareAttacks
thehackernews.com/2025/02/5-ac...

4 6 1 0
Preview
Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware Ghostwriter deploys malware-laced Excel files, steganography, and obfuscated macros to target Ukraine and Belarus.

A new malware campaign targets Belarusian activists and the Ukrainian military, using Excel files to deliver PicassoLoader.

The malicious Excel file tricks users into enabling obfuscated macros, which deploy a stealthy RAT and additional payloads. #UkraineRussiaWar #MalwareAttacks

6 7 0 0
Preview
2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT A large-scale malware campaign exploited a vulnerable Windows driver to bypass security and deploy HiddenGh0st RAT.

🚨 Cyberattackers are using a vulnerable Windows driver to evade detection and deliver the #Gh0stRAT malware.

Thousands of modified driver variants, including RogueKiller’s truesight.sys, are now actively bypassing defenses. #MalwareAttacks #CyberAttacks thehackernews.com/2025/02/2500...

7 7 0 0
Preview
SpyLend Android malware downloaded 100,000 times from Google Play An Android malware app called SpyLend has been downloaded over 100,000 times from Google Play, where it masqueraded as a financial tool but became a predatory loan app for those in India.

An Android malware app called SpyLend has been downloaded over 100,000 times from #GooglePlay, where it masqueraded as a financial tool but became a predatory loan app for those in India. #MalwareAttacks #SpyLend #CyberSecurity #Android www.bleepingcomputer.com/news/securit...

6 2 0 0
Preview
Cracked Garry’s Mod, BeamNG.drive games infect gamers with miners A large-scale malware campaign dubbed "StaryDobry" has been targeting gamers worldwide with trojanized versions of cracked games such as Garry's Mod, BeamNG.drive, and Dyson Sphere Program.

A large-scale malware campaign dubbed "StaryDobry" has been targeting gamers worldwide with trojanized versions of cracked games such as Garry's Mod, BeamNG.drive, and Dyson Sphere Program. #MalwareAttacks #Trojan #Gamers
www.bleepingcomputer.com/news/securit...

7 2 2 0
Preview
Microsoft spots XCSSET macOS malware variant used for crypto theft A new variant of theΒ XCSSET macOS modular malware has emerged in attacks that target users' sensitive information, including digital wallets and data from the legitimate Notes app.

A new variant of the XCSSET macOS modular malware has emerged in attacks that target users' sensitive information, including digital wallets and data from the legitimate Notes app. #MalwareAttacks #cybersecurity www.bleepingcomputer.com/news/securit...

5 4 0 0
Preview
ASP.NET Core | Open-source web framework for .NET Build web apps and services that run on Windows, Linux, and macOS using C#, HTML, CSS, and JavaScript. Get started for free on Windows, Linux, or macOS.

Microsoft: Thousands of Leaked ASP.NET Keys Are Threatening Web Servers Through Code Injection Attacks #Cybersecurity #MicrosoftSecurity #Microsft #ASPdotNET #IIS #ViewState #MalwareAttacks #RemoteCodeExecution #Infosec #CyberThreats #MicrosoftThreatIntelligence

https://buff.ly/4jLJSiJ

0 0 0 0
Preview
Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report The DeepData malware framework was seen exploiting a Fortinet VPN client for Windows zero-day that remains unpatched.

Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report
www.securityweek.com/fortinet-vpn...
#Infosec #Security #Cybersecurity #CeptBiro #Fortinet #VPN #ZeroDay #MalwareAttacks

0 0 0 0
Preview
Government Sector Suffers 236% Surge in Malware Attacks Malware-related attacks against global government organizations increased 236% year-on-year in Q1 2024, according to SonicWall

Government Sector Suffers 236% Surge in Malware Attacks
www.infosecurity-magazine.com/news/governm...
#Infosec #Security #Cybersecurity #CeptBiro #GovernmentSector #MalwareAttacks

0 0 0 0
Preview
Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users Binance warns of a global clipper malware targeting cryptocurrency users, replacing wallet addresses to steal funds.

Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users
thehackernews.com/2024/09/bina...
#Infosec #Security #Cybersecurity #CeptBiro #Binance #Clipper #MalwareAttacks #CryptocurrencyUsers

0 0 0 0
Preview
Hamster Kombat’s 250 million players targeted in malware attacks Threat actors are taking advantage of the massive popularity of the Hamster Kombat game, targeting players with fake Android and Windows software that install spyware and information-stealing malware.

Hamster Kombat’s 250 million players targeted in malware attacks
www.bleepingcomputer.com/news/securit...
#Infosec #Security #Cybersecurity #CeptBiro #HamsterKombat #MalwareAttacks

0 0 0 0
Preview
唉! New Kaiji Malware Attacks IoT devices using SSH Brute Force The Kaiji malware was designed by a developer based in China to launch DDoS attacks according to researchers.Security researchers like Malwaremustdie ..

唉! New Kaiji Malware Attacks IoT devices using SSH Brute Force
secureblitz.com/kaiji-malwar...
#Infosec #Security #Cybersecurity #CeptBiro #Kaiji #MalwareAttacks #IoTdevices #SSH #BruteForce

2 0 0 0
Preview
Microsoft fixed two zero-day flaws exploited in malware attacks Microsoft addressed two zero-day vulnerabilities (CVE-2024-29988 and CVE-2024-26234) actively exploited by threat actors to deliver malware

Microsoft fixed two zero-day bugs exploited in malware attacks
securityaffairs.com/161692/secur...
#Infosec #Security #Cybersecurity #CeptBiro #Microsoft #ZeroDay #MalwareAttacks

0 0 0 0