SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84

Security Affairs
Actively Exploited

Overview

The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet
  • Action Required: Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.
  • Timeline: Newly disclosed

Original Article Summary

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT Breaking Down ZeroDayRAT – New Spyware Targeting Android and iOS Old-School IRC, New Victims: Inside the Newly Discovered SSHStalker Linux Botnet Reynolds: Defense Evasion Capability […]

Impact

NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Linux, iOS, Android, and 5 more.

Related Coverage

Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security

The Hacker News

Google has updated its Quick Share service to enable compatibility with Apple's AirDrop, facilitating easier file sharing between Android and iPhone devices. This feature is currently available for the Pixel 10 lineup and is expected to expand to other devices in the future.

Nov 21, 2025

New FlexibleFerret Malware Chain Targets macOS With Go Backdoor

Infosecurity Magazine

The article discusses a new macOS malware chain attributed to FlexibleFerret, which employs staged scripts and a Go-based backdoor to steal user credentials and maintain persistent access to infected systems. This represents a significant cybersecurity threat to macOS users, emphasizing the need for heightened security measures against such sophisticated attacks.

Nov 25, 2025

DPRK's FlexibleFerret Tightens macOS Grip

darkreading

The DPRK's FlexibleFerret campaign is evolving its tactics to enhance its social engineering scams aimed at macOS users, indicating a sophisticated approach to credential theft. This ongoing threat underscores the need for heightened awareness and security measures among macOS users to protect against such attacks.

Nov 25, 2025

​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​

All CISA Advisories

CISA has identified that various cyber threat actors are using commercial spyware to target users of mobile messaging applications, employing tactics such as phishing, zero-click exploits, and impersonation. The focus is primarily on high-value individuals including government and military officials, indicating a serious threat to sensitive communications.

Nov 24, 2025

IT threat evolution in Q3 2025. Non-mobile statistics

Securelist

The report highlights the evolving landscape of IT threats in Q3 2025, focusing on malware targeting Windows and macOS personal computers, as well as IoT devices. This indicates a growing severity of cyber threats that could have significant implications for users and organizations relying on these systems.

Nov 19, 2025

India Rolls Back App Mandate Amid Surveillance Concerns

darkreading

India has decided to roll back its mandate requiring citizens to install a cybersecurity app designed to enhance surveillance and security. The app, intended to monitor digital activities, faced backlash over privacy concerns, with citizens worried about excessive government monitoring and data collection. The government's initial push for this app was met with skepticism, drawing comparisons to Apple's controversial decision to distribute a U2 album to all iTunes users. By reversing this mandate, India acknowledges the public's apprehension regarding personal privacy and the implications of government surveillance. This situation underscores the delicate balance between national security and individual privacy rights, a conversation that continues to evolve in the digital age.

Dec 5, 2025