Articles tagged "Malware"

Found 36 articles

BitSight research highlights a significant cybersecurity threat where threat actors exploit calendar subscriptions to deliver phishing links and malware via hijacked domains. This method poses a serious risk as it can lead to social engineering attacks, potentially compromising sensitive information and systems.

Impact: Calendar applications, email clients, and users of hijacked domains.
Remediation: Users should be cautious about accepting calendar subscriptions from unknown sources and regularly review their calendar settings for any unauthorized subscriptions. Implementing email filtering and security awareness training can also mitigate risks.
Read Original

The article reports on a cyber attack campaign by the threat actor Bloody Wolf, which has been targeting Kyrgyzstan since June 2025 and has recently expanded its operations to Uzbekistan. The primary objective of these attacks is to deliver the NetSupport Remote Access Trojan (RAT), posing significant risks to the affected regions' cybersecurity landscape.

Impact: NetSupport RAT
Remediation: N/A
Read Original

This article highlights various cybersecurity threats, including AI-powered malware, vulnerabilities in voice bots, and significant money laundering activities. It emphasizes the evolving tactics of cybercriminals and the ongoing efforts of governments and security teams to combat these threats.

Impact: AI malware, voice bots, cryptocurrency systems, IoT devices
Remediation: Governments and security teams are actively working to shut down fake operations and enhance security measures; specific remediation steps not detailed.
Read Original

The Shai-Hulud supply chain attack has escalated, now affecting the Maven ecosystem after previously compromising over 830 npm packages. The identified package, org.mvnpm:posthog-node:4.18.1, contains malicious components that pose significant risks to software security.

Impact: Affected products include the Maven Central package org.mvnpm:posthog-node version 4.18.1.
Remediation: Users are advised to remove the compromised package and monitor for updates from the Maven Central repository regarding this vulnerability.
Read Original
Actively Exploited

The article reports on a hacking operation linked to Russia, specifically targeting a U.S. civil engineering firm that has connections to Ukraine. The attackers used the SocGholish malware, highlighting the ongoing cybersecurity threats faced by organizations involved in geopolitical conflicts.

Impact: U.S. civil engineering firm, SocGholish malware
Remediation: N/A
Read Original
Microsoft Teams Flaw in Guest Chat Exposes Users to Malware Attacks

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

New research highlights a significant security vulnerability in Microsoft Teams B2B Guest Access, allowing attackers to circumvent Defender for Office 365 protections with just a single invitation. This flaw poses a serious risk of malware attacks on users, emphasizing the need for immediate attention to security protocols within the platform.

Impact: Microsoft Teams B2B Guest Access, Defender for Office 365
Remediation: Users should review and tighten guest access permissions in Microsoft Teams, implement additional security measures, and monitor for suspicious activities. Regular updates and patches for Defender for Office 365 should also be applied as they become available.
Read Original

Cyberattackers are leveraging large language models (LLMs) to enhance their malware capabilities, enabling them to run prompts in real-time to avoid detection. This integration poses a significant threat as it allows for dynamic code augmentation, making traditional detection methods less effective.

Impact: N/A
Remediation: N/A
Read Original

A malicious Chrome extension named Crypto Copilot has been identified, capable of injecting hidden Solana transfer fees into swap transactions, redirecting funds to an attacker's wallet. This poses a significant threat to users engaging in cryptocurrency transactions on the Raydium platform, highlighting the need for vigilance against browser-based threats.

Impact: Chrome Web Store, Crypto Copilot extension, Raydium swaps, Solana transactions
Remediation: Users should remove the Crypto Copilot extension from their browsers and monitor their cryptocurrency transactions for unauthorized transfers. Regularly updating browser security settings and using trusted extensions are also recommended.
Read Original

The RomCom malware has been distributed using a JavaScript loader called SocGholish, targeting a U.S.-based civil engineering company to deliver the Mythic Agent. This marks the first instance of RomCom being deployed via SocGholish, highlighting a significant development in the tactics of threat actors.

Impact: U.S.-based civil engineering company
Remediation: N/A
Read Original

Recent research indicates that advanced phishing attacks are effectively circumventing traditional security measures employed by enterprises. This highlights a significant concern for organizations, as these tactics remain effective despite the implementation of sophisticated security systems.

Impact: N/A
Remediation: N/A
Read Original

A new cybersecurity campaign is utilizing fake Windows update pop-ups on adult websites to trick users into executing malicious commands. This method combines ClickFix lures with phishing tactics, posing a significant risk to users who visit these sites.

Impact: N/A
Remediation: Users should avoid clicking on suspicious pop-ups and ensure their antivirus software is up to date. Regularly updating the operating system and using ad blockers may also help mitigate the risk.
Read Original

The article discusses a new macOS malware chain attributed to FlexibleFerret, which employs staged scripts and a Go-based backdoor to steal user credentials and maintain persistent access to infected systems. This represents a significant cybersecurity threat to macOS users, emphasizing the need for heightened security measures against such sophisticated attacks.

Impact: macOS systems
Remediation: Users are advised to implement robust security practices, including regular updates, using security software, and monitoring for unusual system behavior.
Read Original

Palo Alto Networks has identified new malicious language models, WormGPT 4 and KawaiiGPT, that are being utilized by cybercriminals to enhance their phishing, malware development, and reconnaissance efforts. The rise of these dark LLMs represents a significant threat to cybersecurity, automating and streamlining various cybercrime activities.

Impact: N/A
Remediation: N/A
Read Original

ToddyCat, a threat actor, has developed a new tool called TCSectorCopy to steal Outlook emails and Microsoft 365 access tokens by exploiting the OAuth 2.0 authorization protocol through users' browsers. This poses a significant threat to corporate email security, as it allows unauthorized access to sensitive information outside the compromised infrastructure.

Impact: Outlook, Microsoft 365
Remediation: Implement strong authentication measures, educate users about phishing attacks, and monitor for unauthorized access to corporate email accounts.
Read Original

Cybersecurity researchers have identified a campaign that exploits Blender Foundation files to distribute StealC V2, a data-stealing malware. This operation has been ongoing for at least six months, posing significant risks to users who download infected .blend files from platforms like CGTrader.

Impact: Blender Foundation files, .blend files, CGTrader platform
Remediation: Users should avoid downloading .blend files from untrusted sources and ensure their cybersecurity measures are up to date.
Read Original
Page 1 of 3Next