Articles tagged "Malware"

Found 356 articles

In a troubling development, researchers have discovered over 230 malicious packages targeting OpenClaw, an AI assistant tool, within just a week. These packages, found on the tool's official registry and GitHub, are designed to steal user passwords. This situation raises concerns as it affects users of OpenClaw who may inadvertently download these harmful packages, putting their sensitive information at risk. The rapid proliferation of these packages indicates a serious security threat to the AI assistant community. Users are urged to be cautious and verify the legitimacy of any packages before installation.

Impact: OpenClaw (formerly Moltbot and ClawdBot)
Remediation: Users should avoid downloading packages from unverified sources and ensure they are using trusted versions of OpenClaw.
Read Original

A recent security audit conducted by Koi Security has revealed that out of 2,857 skills available on ClawHub, 341 were identified as malicious. These harmful skills are designed to steal data from users of OpenClaw, an artificial intelligence assistant platform. The presence of these malicious skills raises significant supply chain risks for users who depend on third-party integrations. As ClawHub serves as a marketplace for these skills, the findings indicate a pressing need for enhanced security measures to protect users from potential data breaches. Users of OpenClaw should be vigilant when selecting skills and consider the implications of using third-party applications that may not be secure.

Impact: ClawHub, OpenClaw users
Remediation: Users should avoid installing skills from unverified sources and regularly review the permissions granted to installed skills.
Read Original

The article discusses the rapid development of a personal AI assistant called OpenClaw, which has raised alarms among cybersecurity experts. Researchers are concerned about its evolution from Clawdbot to OpenClaw, particularly due to its potential to be misused in malicious ways. As this AI technology becomes more sophisticated, it could be exploited by attackers to automate phishing scams, generate fake content, or even execute more complex cyberattacks. This situation poses risks to both individuals and organizations, as they may find it increasingly difficult to identify genuine communications from AI-generated ones. The urgency for improved security measures and user awareness is evident as this technology continues to advance.

Impact: Clawdbot, OpenClaw, AI personal assistants
Remediation: Users should remain vigilant about communications and verify sources; organizations need to enhance security protocols for AI interactions.
Read Original
Actively Exploited

Bitdefender has identified a new Android malware campaign that uses Hugging Face, a platform typically associated with artificial intelligence and machine learning. This malware, classified as a Remote Access Trojan (RAT), is designed to gain unauthorized access to Android devices, potentially compromising user data and privacy. The campaign raises concerns as it exploits a legitimate platform to distribute malicious software, making it harder for users to detect the threat. Users of Android devices should be particularly cautious and ensure they download apps only from trusted sources to avoid falling victim to this malware. The implications are significant, especially for those who may unknowingly install infected applications, leading to data theft or device control by attackers.

Impact: Android devices, Hugging Face platform
Remediation: Users should only download apps from official app stores and be cautious about granting permissions to applications.
Read Original
Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A new form of malware, known as Pulsar RAT, is being used by hackers to conduct live chat sessions with victims while simultaneously stealing sensitive data. This malware operates on Windows systems, allowing attackers to engage with users in real-time, making it more personal and deceptive. The presence of live chat functionality means that victims may not realize they are being compromised until it's too late. Researchers are warning that this method poses a significant risk to both individuals and organizations, as it can lead to the unauthorized access of personal and financial information. Users are urged to remain vigilant and ensure their systems are secure against such threats.

Impact: Windows systems
Remediation: Users should ensure their antivirus software is up to date and consider employing additional security measures such as firewalls and intrusion detection systems.
Read Original

Hackers have successfully compromised an update server belonging to MicroWorld Technologies, the company behind eScan Antivirus. This breach allowed attackers to inject malicious files into updates that were sent to eScan customers, effectively turning the antivirus software into a delivery mechanism for malware. Users who updated their eScan software during this incident may have inadvertently installed harmful files on their systems. This incident raises significant concerns about the security of software supply chains, highlighting how even trusted software can be weaponized. Users are advised to remain vigilant and consider checking their systems for any signs of compromise.

Impact: eScan Antivirus software
Remediation: Users should uninstall the compromised version of eScan and install the latest clean version from the official website. Regular system scans and updates are recommended.
Read Original
Actively Exploited

A new malware campaign known as RedKitten is targeting individuals in Iran who are seeking information about missing persons or political dissidents. The campaign uses deceptive tactics to lure users into clicking on malicious links, taking advantage of the heightened concern surrounding the ongoing protests in the country. This malware not only compromises personal security but also poses a significant risk to those involved in activism or seeking justice for their loved ones. As tensions continue in Iran, the campaign's focus on vulnerable populations underscores the need for heightened cybersecurity awareness among those seeking information online. Users are urged to be cautious about the sources they trust and to verify the links they click on.

Impact: Individuals seeking information on missing persons or political dissidents in Iran
Remediation: Users should verify sources before clicking on links and consider using security software to detect potential threats.
Read Original
Actively Exploited

Researchers have discovered that malicious Python packages were uploaded to the Python Package Index (PyPI), posing a significant risk to developers. The harmful code was hidden within a file that appeared to be a Basque language dictionary but was actually a compressed archive containing a Remote Access Trojan (RAT). This incident could affect any developers who inadvertently install these malicious packages, potentially allowing attackers to gain unauthorized access to their systems. It serves as a reminder for users to be cautious when downloading packages from open-source repositories, as they can be exploited to distribute malware. Vigilance and thorough vetting of software dependencies are crucial for maintaining security.

Impact: Python Package Index (PyPI), developers using malicious packages
Remediation: Developers should avoid installing unverified packages and consider using tools to scan for malicious code in dependencies.
Read Original

TA584, a known threat actor, is currently using compromised email accounts to distribute malicious content through services like SendGrid and Amazon SES. Their attack method incorporates tools such as Tsundere Bot and XWorm, which are designed to gain unauthorized access to networks. This tactic raises concerns for organizations that rely on these email services, as attackers can exploit trusted channels to deliver malware. The use of legitimate platforms for malicious purposes complicates detection and prevention efforts. Companies need to be vigilant and enhance their security measures to protect against such sophisticated email-based attacks.

Impact: SendGrid, Amazon SES, Tsundere Bot, XWorm
Remediation: Implement email security measures, monitor for unusual account activity, and educate employees on phishing threats.
Read Original
Op Bizarre Bazaar: New LLMjacking Campaign Targets Unprotected Models

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Pillar Security Research has identified a significant cyberattack campaign called Operation Bizarre Bazaar, orchestrated by a hacker going by the name Hecker. This operation took place between December 2025 and January 2026, with over 35,000 sessions aimed at infiltrating AI systems. The attackers sought to hijack computing power and monetize their access through a platform called silver.inc. This incident raises serious concerns for organizations that rely on AI technologies, as it highlights vulnerabilities in unprotected models that can be exploited for malicious purposes. Companies using AI systems need to be vigilant about security measures to prevent unauthorized access and potential misuse of their resources.

Impact: AI systems, computing power resources, silver.inc platform
Remediation: Organizations should implement stronger security protocols for AI systems, including access controls and monitoring for unauthorized sessions.
Read Original

On January 20, Kaspersky detected malware associated with a supply chain attack targeting eScan antivirus software. This incident suggests that attackers compromised the update mechanism of eScan, potentially allowing them to distribute malicious updates to users. Companies using eScan antivirus are at risk, as the malware could lead to unauthorized access or data breaches. Users of the software should be vigilant and consider immediate actions to protect their systems. Kaspersky has provided indicators of compromise and mitigation strategies for affected users to follow in order to secure their environments.

Impact: eScan antivirus software
Remediation: Users should monitor for indicators of compromise and follow Kaspersky's mitigation tips. Specific patch numbers or updates were not mentioned.
Read Original

Recent research from Flare reveals that seemingly innocent modifications for the popular game Roblox can be hiding dangerous infostealer malware. This malware can infiltrate home computers, and once inside, it poses a risk of spreading to corporate networks, potentially compromising sensitive company data. The issue is particularly concerning for organizations whose employees might download these mods without realizing the threat they pose. As remote work continues to be common, companies need to be vigilant about the software their employees are using. This incident serves as a reminder that even casual gaming can have serious security implications.

Impact: Roblox mods, home PCs, corporate networks
Remediation: Users should avoid downloading mods from unverified sources and companies should implement strict software policies and security training for employees.
Read Original

ESET researchers have uncovered a spyware campaign targeting individuals in Pakistan that employs romance scam tactics. This operation uses a malicious app masquerading as a chat service, which facilitates conversations through WhatsApp but primarily serves to steal data from infected devices. The malware is identified as GhostChat, and it appears to be part of a larger surveillance effort by the same threat actor. This incident is particularly concerning as it exploits personal relationships and trust, potentially affecting many unsuspecting users who are seeking companionship online. The implications of such spyware are significant, as it not only compromises personal data but also raises issues of privacy and security in digital communications.

Impact: Android devices, GhostChat malware
Remediation: Users should avoid downloading apps from untrusted sources and be cautious of any application promising to facilitate communication with potential romantic partners. Regularly updating device software and using security solutions can also help mitigate risks.
Read Original
Actively Exploited

The U.S. Justice Department has charged 31 individuals connected to a widespread ATM jackpotting scheme that exploited Ploutus malware to steal cash from ATMs nationwide. This malware allows attackers to manipulate ATM systems, enabling them to dispense large amounts of cash illegally. The recent indictments are part of ongoing efforts to combat this type of cybercrime, which poses significant risks to financial institutions and the security of ATM networks. With these arrests, authorities aim to disrupt the operations of organized criminal groups involved in such schemes. This incident serves as a reminder for banks and ATM operators to enhance their security measures against sophisticated cyber threats.

Impact: ATMs, financial institutions
Remediation: Banks and ATM operators should enhance security protocols, including monitoring for unusual ATM activity and updating software to protect against malware.
Read Original

The CoolClient backdoor malware has received an upgrade from the threat actor group Mustang Panda, enhancing its data theft capabilities. This malware is being delivered through legitimate software from the Chinese company Sangfor, which raises concerns about the potential for widespread infection among users of that software. The updated CoolClient now includes improved features such as system profiling, keylogging, and tunneling, allowing attackers to gather sensitive information more effectively. This development poses a significant risk to organizations and individuals who may unknowingly use the compromised software, emphasizing the need for heightened security measures and vigilance against such threats.

Impact: Sangfor software products
Remediation: Users should update their Sangfor software and monitor for unusual activity. Implementing endpoint detection systems and conducting regular security audits could also help mitigate risks.
Read Original
PreviousPage 13 of 24Next