Articles tagged "Malware"

Found 211 articles

A previously inactive Iranian hacking group known as Infy, or Prince of Persia, has resurfaced with new malware activity after about five years of silence. This group had previously targeted organizations in Sweden, the Netherlands, and Turkey, and recent findings suggest that their current operations are broader and more significant than previously thought. Threat researchers, including Tomer Bar from SafeBreach, have indicated that the scale of Infy's activity was underestimated. This resurgence raises concerns for potential targets, as the group's motives and capabilities could pose risks to various sectors. Organizations should remain vigilant and enhance their security measures to defend against possible intrusions.

Impact: N/A
Remediation: Organizations should enhance their security measures and stay vigilant against potential intrusions.
Read Original
Actively Exploited

The U.S. Department of Justice has indicted 54 individuals involved in a large-scale ATM jackpotting scheme that resulted in millions of dollars in theft. This operation utilized malware to compromise ATMs, allowing criminals to withdraw cash fraudulently. The investigation links these activities to Tren de Aragua, a cybercrime group known for orchestrating such schemes. The charges against the defendants include fraud, money laundering, and providing material support for the group's operations. This case is significant as it reveals the growing sophistication of cybercriminals targeting financial institutions and underscores the need for enhanced security measures in the banking sector.

Impact: ATMs, banking systems
Remediation: Banks should enhance security protocols, including updating ATM software and implementing stronger monitoring systems.
Read Original

The U.S. Department of Justice has charged 54 individuals involved in a significant ATM jackpotting scheme that reportedly stole millions of dollars. This criminal operation utilized malware known as Ploutus to manipulate ATMs across the United States, causing them to dispense cash unlawfully. Many of those indicted are linked to Tren de Aragua, a criminal group based in Venezuela. The actions of these individuals not only affect financial institutions but also threaten the security and trust of ATM users nationwide. This case underscores the ongoing risks posed by sophisticated cybercrime networks that exploit vulnerabilities in financial systems.

Impact: Automated Teller Machines (ATMs), specifically those susceptible to Ploutus malware.
Remediation: Financial institutions should enhance ATM security measures, including regular software updates and monitoring for unusual transaction patterns.
Read Original

Kaspersky researchers have reported on the recent activities of the Cloud Atlas advanced persistent threat (APT) group in early 2025. This group has updated their arsenal with new malicious tools, including backdoors known as VBShower, VBCloud, PowerShower, and CloudAtlas. These implants are designed to infiltrate and control targeted systems, which typically include government and corporate networks. The evolving tactics of Cloud Atlas highlight the ongoing risks to organizations, particularly those in sensitive sectors. Companies need to remain vigilant and enhance their cybersecurity measures to defend against these sophisticated threats.

Impact: Government networks, corporate systems
Remediation: Organizations should implement updated security protocols and monitor for signs of intrusion. Regularly patching systems and employing advanced threat detection solutions are recommended.
Read Original
Lazarus Group Embed New BeaverTail Variant in Developer Tools

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

The Lazarus Group, a North Korean hacking organization, has introduced a new variant of their BeaverTail malware, aimed at stealing user credentials and cryptocurrency. This variant is being distributed through fake job offers and malicious developer tools, which target unsuspecting users who may be seeking employment in tech-related fields. Additionally, it employs smart contracts as part of its strategy to deceive victims. The implications of this malware are significant, as it not only threatens individuals looking for jobs but also poses risks to companies that might inadvertently hire compromised individuals. Overall, this development highlights the ongoing threat posed by state-sponsored cybercriminals and underscores the need for vigilance among job seekers and organizations alike.

Impact: Fake job offers, developer tools, cryptocurrency wallets
Remediation: Users should avoid downloading tools or applying for jobs from unverified sources and ensure their security software is up to date.
Read Original

French authorities have arrested two crew members of an Italian passenger ferry, including a Latvian national, for allegedly installing malware on the vessel. This malware could have allowed them to gain remote control over the ship, raising serious concerns about maritime security. The incident underscores the vulnerabilities that can exist in critical infrastructure like passenger ferries, where cyberattacks could potentially endanger lives and disrupt operations. Authorities are investigating the extent of the malware's capabilities and the intentions behind its installation. This case serves as a reminder for the maritime industry to enhance cybersecurity measures to protect against similar threats.

Impact: Italian passenger ferry systems
Remediation: Increase cybersecurity measures on maritime vessels, including regular software updates and vulnerability assessments.
Read Original

France's counterespionage agency is currently investigating a cyberattack that may have involved remote control malware found on an international passenger ferry. This incident raises concerns about foreign interference, as authorities suspect that the malware could be part of a larger plot targeting maritime operations. The presence of such malware on a passenger ferry poses significant risks not only to the vessel itself but also to the safety of the passengers and crew onboard. The investigation is ongoing, and officials are working to determine the extent of the threat and the potential perpetrators behind this attack. This situation emphasizes the vulnerabilities that exist in critical transportation infrastructure and the need for enhanced cybersecurity measures in the maritime sector.

Impact: International passenger ferry systems
Remediation: N/A
Read Original

Push Security has launched a new feature aimed at combating ClickFix-style attacks, which are becoming increasingly common. This feature focuses on detecting and blocking malicious copy-and-paste actions in web browsers. By monitoring these actions, Push Security can prevent users from inadvertently copying and executing harmful scripts on their devices. This development is significant as it helps to thwart attackers at an early stage, reducing the risk of malware infections. As online threats evolve, protective measures like this are essential for enhancing user security.

Impact: Web browsers using Push Security's technology
Remediation: N/A
Read Original

A new botnet named Kimwolf has compromised around 1.8 million Android-based devices, including TVs, set-top boxes, and tablets. Researchers from QiAnXin XLab report that this botnet may be linked to another one known as AISURU. Kimwolf is built using the Native Development Kit (NDK), which allows attackers to control these devices and use them for large-scale distributed denial-of-service (DDoS) attacks. This incident raises concerns about the security of smart devices, as many consumers may not realize their equipment can be hijacked in this way. Users of affected devices should be vigilant and consider measures to secure their systems against such threats.

Impact: Android TVs, set-top boxes, tablets
Remediation: Users should ensure their devices are updated to the latest firmware, disable unnecessary features, and consider using network security measures such as firewalls.
Read Original

A ransomware group has taken advantage of a serious vulnerability in React2Shell, identified as CVE-2025-55182, to infiltrate corporate networks. Once they gain access, they deploy their file-encrypting malware in under a minute, making the attack extremely swift and damaging. This incident highlights the urgency for organizations to address this vulnerability, as it poses a significant risk to corporate data security. Companies using systems that incorporate React2Shell need to remain vigilant and take immediate action to protect their networks from potential exploitation. The rapid nature of these attacks underlines the necessity for robust security measures and timely updates.

Impact: React2Shell, corporate networks using affected versions
Remediation: Organizations should apply patches provided by React2Shell developers, ensure their systems are updated to the latest versions, and implement security monitoring to detect any unauthorized access attempts. Regular vulnerability assessments and employee training on recognizing phishing attempts can also help mitigate risks.
Read Original
Actively Exploited

A recent study has revealed that most parked domains—those that are expired, dormant, or commonly misspelled versions of popular sites—are now being used to host malicious content. These domains are redirecting users to scam sites or distributing malware, creating significant risks for individuals who may unknowingly type in these addresses. This trend highlights the dangers of direct navigation, where users enter URLs manually. As attackers exploit these parked domains, both casual internet users and organizations may find themselves vulnerable to online scams and security breaches. Awareness and caution are essential for users to avoid falling victim to these tactics.

Impact: Parked domains, expired domains, common misspellings of popular websites
Remediation: Users should double-check URLs before visiting, use security software that warns against malicious sites, and avoid entering sensitive information on unfamiliar domains.
Read Original

The React2Shell vulnerability is currently being exploited by cybercriminals to install malware on Linux systems. Researchers from Palo Alto Networks and NTT Security have identified that this vulnerability facilitates the deployment of malicious tools like KSwapDoor and ZnDoor. KSwapDoor is particularly concerning as it is a sophisticated remote access tool designed to operate stealthily, allowing attackers to maintain control over compromised systems without detection. This ongoing threat affects organizations running vulnerable Linux environments, making it crucial for them to take immediate action to secure their systems. Users need to be aware of the risks and ensure their defenses are updated to mitigate potential attacks.

Impact: Linux systems running vulnerable software, specifically those affected by the React2Shell vulnerability.
Remediation: Organizations should apply security patches and updates as soon as they are available for the affected systems. Regularly review and strengthen security configurations to prevent exploitation. Implementing network monitoring and intrusion detection systems can help identify and mitigate any unusual activities associated with this vulnerability.
Read Original

A recent phishing campaign has been discovered that spreads the Phantom information-stealing malware through ISO file attachments. Attackers are targeting users by disguising these malicious files as legitimate content, tricking them into opening the files and executing the malware. Once installed, Phantom can collect sensitive information, including login credentials and personal data. This campaign poses a significant risk to individuals and organizations, as it can lead to data breaches and identity theft. Users should be cautious when receiving unsolicited emails with attachments, especially ISO files, and ensure their security software is up to date.

Impact: Users of email services and systems that can open ISO files, particularly those who engage with suspicious emails.
Remediation: Users should avoid opening ISO files from unknown sources, ensure email security filters are enabled, and keep antivirus software updated.
Read Original

The latest Security Affairs Malware Newsletter highlights several significant malware developments affecting multiple countries. Notably, the UDPGangster campaigns are targeting various regions, posing risks to users and organizations. Researchers also discuss ransomware trends related to the Bank Secrecy Act, shedding light on how financial institutions might be affected between 2022 and 2024. Additionally, the return of the ClayRat malware introduces expanded features and techniques that could complicate detection and mitigation efforts. Another concerning finding is the SEEDSNATCHER, an Android malware that targets crypto wallets, raising alarms for cryptocurrency users. These incidents highlight the evolving tactics employed by cybercriminals and the need for heightened security measures.

Impact: Android devices, cryptocurrency wallets, financial institutions
Remediation: Users should ensure their devices are updated with the latest security patches, utilize reputable antivirus software, and remain vigilant against suspicious links or downloads.
Read Original

A recent campaign has targeted developers through the Visual Studio Code (VSCode) Marketplace, where 19 malicious extensions have been found since February. These extensions cleverly disguise malware within dependency folders, hiding it in fake PNG files. Developers using these compromised extensions are at risk, as the malware can potentially compromise their systems and projects. This incident raises alarms about the safety of third-party tools within development environments. Users are urged to be cautious when installing extensions and to verify their sources to avoid falling victim to such attacks.

Impact: VSCode Marketplace extensions, developers using these extensions
Remediation: Users should uninstall any suspicious extensions and verify the sources of the extensions they use. Regularly update VSCode and its extensions to the latest versions.
Read Original
PreviousPage 10 of 15Next