Articles tagged "Malware"

Found 211 articles

A new botnet called SSHStalker has compromised approximately 7,000 Linux systems, primarily those hosted in the cloud. This botnet uses Internet Relay Chat (IRC) for control and automates attacks via Secure Shell (SSH) to gain access to these systems. The attackers are exploiting weak SSH credentials, making it crucial for system administrators to strengthen their password policies and implement key-based authentication. This incident highlights the ongoing vulnerability of Linux servers to automated attacks and the importance of maintaining strong security practices. Users need to be vigilant and consider regular audits of their SSH configurations to prevent unauthorized access.

Impact: Linux systems, particularly cloud-hosted environments using SSH
Remediation: Strengthen SSH credentials, implement key-based authentication, and conduct regular audits of SSH configurations.
Read Original

A fraudulent 7-Zip website has emerged, distributing a compromised version of the popular file archiving software. This malicious installer includes a trojan that converts the user's computer into a residential proxy node, which can be used by attackers for various illicit activities. Users who unknowingly download this installer are putting their machines at risk and could potentially face privacy violations or further exploitation. This situation is particularly concerning as it exploits the trust many people have in widely used software like 7-Zip. It's crucial for users to ensure they download software only from official sources to avoid similar threats.

Impact: 7-Zip software, user computers
Remediation: Users should only download software from the official 7-Zip website and verify the source of installers before executing them.
Read Original

A new Linux botnet named 'SSHStalker' has reportedly infected around 7,000 systems. This botnet employs a mass-compromise strategy, utilizing various scanners and malware to gain control over vulnerable devices. The attackers are likely taking advantage of outdated security practices, which makes this incident a reminder for system administrators to enhance their security measures. The widespread nature of this botnet indicates that many users might be at risk, especially if their systems are not properly secured. Addressing these vulnerabilities is crucial to prevent further infections and potential data breaches.

Impact: Linux systems, particularly those with weak SSH credentials
Remediation: System administrators should enforce strong SSH passwords, disable root login via SSH, and consider using key-based authentication. Regular updates and security patches for Linux distributions are also recommended.
Read Original
Hackers Deliver Global Group Ransomware Offline via Phishing Emails

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A new strain of ransomware known as Global Group is being distributed through phishing emails. This malware is particularly concerning because it can encrypt files without requiring an internet connection, meaning that even offline systems are at risk. Organizations and individuals who fall victim to these phishing attacks could face significant data loss and operational disruptions. Cybersecurity experts warn that the ease of delivery via email makes this a widespread threat that could affect various sectors. Users are advised to be cautious with unsolicited emails and to implement robust security measures to protect against potential attacks.

Impact: N/A
Remediation: Users should be cautious with unsolicited emails and ensure they have updated antivirus software and phishing protection in place.
Read Original

VoidLink is a newly identified Linux-based command-and-control (C2) framework that is designed to facilitate credential theft and data exfiltration across multiple cloud platforms. This malware allows attackers to gain unauthorized access to sensitive information, posing a significant risk to organizations that rely on cloud services. As it targets systems in a multi-cloud environment, companies using cloud storage and applications are particularly vulnerable. The presence of AI code within VoidLink suggests that it may employ advanced techniques to evade detection and enhance its operational capabilities. This development is concerning for cybersecurity professionals, as it indicates a growing sophistication in the tools used by cybercriminals.

Impact: Linux-based systems, multi-cloud environments
Remediation: Organizations should implement strong access controls, regularly update their systems, and monitor for unusual activity across their cloud infrastructures to mitigate risks associated with VoidLink.
Read Original

Researchers have identified a significant cyber campaign known as the TeamPCP worm, which has been targeting cloud-native environments since late December 2025. This worm exploits vulnerabilities in widely used technologies, including exposed Docker APIs, Kubernetes clusters, Ray dashboards, and Redis servers. By hijacking these services, attackers are able to create a malicious infrastructure for further exploitation. This situation is alarming as it can potentially affect numerous organizations that rely on these cloud services for their operations. Companies need to ensure their cloud environments are properly secured against such vulnerabilities to prevent unauthorized access and data breaches.

Impact: Docker APIs, Kubernetes clusters, Ray dashboards, Redis servers
Remediation: Organizations should secure their Docker APIs and Kubernetes clusters, apply the latest security patches, and implement strict access controls to mitigate unauthorized access.
Read Original

Researchers at Cisco Talos have identified a toolkit called DKnife that has been in use since 2019 to hijack router traffic for cyber-espionage purposes. This Linux-based toolkit allows attackers to inspect and alter data as it travels through routers and edge devices. It can also install malware on various devices, including PCs and smartphones. The implications of this toolkit are significant, as it poses a threat to the confidentiality and integrity of sensitive data transmitted over networks. Users and organizations relying on affected routers should be particularly vigilant about their network security practices to mitigate potential risks.

Impact: Routers and edge devices, PCs, smartphones
Remediation: Users should ensure their routers and edge devices are updated with the latest firmware and security patches, and implement network monitoring practices to detect unusual traffic.
Read Original

The DKnife toolkit has been in use since 2019, allowing attackers to hijack traffic from edge devices to spy on users and deliver malware. This toolkit targets routers and other network devices, making it a significant threat to both individuals and organizations that rely on these systems for internet connectivity. By intercepting data, attackers can monitor communications and potentially steal sensitive information. The ongoing use of DKnife illustrates the persistent risks posed by advanced cyber espionage techniques. Users and companies need to be vigilant about securing their network devices to prevent such intrusions.

Impact: Routers and edge devices
Remediation: Users should ensure their devices are updated with the latest firmware and security patches, and consider changing default passwords and enabling additional security features.
Read Original

Researchers have identified a supply chain attack affecting legitimate npm and PyPI packages, specifically targeting versions of @dydxprotocol/v4-client-js. The compromised versions include 3.4.1, 1.22.1, 1.15.2, and 1.0.31. Attackers have modified these packages to distribute malware designed to steal cryptocurrency wallet credentials and enable remote access through RAT (Remote Access Trojan) software. This incident poses a significant risk to developers and users relying on these packages, as it can lead to unauthorized access to sensitive financial information. Companies and individual developers should review their dependencies and ensure they are using safe versions to mitigate potential risks.

Impact: @dydxprotocol/v4-client-js (npm) versions 3.4.1, 1.22.1, 1.15.2, 1.0.31
Remediation: Developers should update to safe versions of @dydxprotocol/v4-client-js and review their package dependencies for any signs of compromise.
Read Original
Actively Exploited

Researchers have discovered that the SystemBC botnet has hijacked over 10,000 IP addresses, indicating that the botnet is still being actively developed despite previous efforts to disrupt it through 'Operation Endgame.' This ongoing activity raises concerns for internet security, as the SystemBC botnet is known for facilitating various cybercriminal activities, including the distribution of malware. The persistence of this threat suggests that attackers are adapting and finding new ways to maintain their operations, which could lead to increased risks for businesses and individual users alike. Companies should remain vigilant and consider strengthening their defenses against such botnets to protect their networks and data.

Impact: N/A
Remediation: Companies should strengthen their network defenses and monitor for unusual activity associated with botnet behavior.
Read Original

Researchers have identified the SystemBC malware, which is currently active across approximately 10,000 infected systems. This botnet is particularly concerning as it poses risks to sensitive government infrastructure, potentially exposing critical data and functionalities to malicious actors. The malware's widespread presence raises alarms about the security of various networks, especially those that manage important public services. Organizations, particularly in the public sector, need to take immediate action to secure their systems against this threat. Failure to address this could lead to significant operational disruptions and data breaches.

Impact: Sensitive government infrastructure, various IP addresses associated with infected systems.
Remediation: Organizations should implement network monitoring, update security protocols, and ensure all systems are patched against known vulnerabilities.
Read Original

Hackers have been exploiting a previously legitimate EnCase kernel driver, which had been revoked, to create a tool that targets endpoint detection and response (EDR) solutions. This EDR killer can identify and disable 59 different security products, putting organizations at significant risk. The use of a signed driver adds a layer of legitimacy to the attack, making it harder for security systems to detect the malicious activity. This incident raises concerns for companies relying on these security tools, as attackers can effectively bypass defenses and compromise systems. It's crucial for organizations to be aware of this tactic and take steps to reinforce their security measures against such threats.

Impact: 59 security tools, including various EDR solutions
Remediation: Organizations should review their security configurations and consider updating or patching their EDR tools. Regularly monitoring for unusual activity and implementing additional layers of security may also help mitigate risks.
Read Original

Recent reports indicate that OpenClaw agents have been targeted with 341 malicious skills linked to ClawHub, a platform for voice-enabled applications. Most of these harmful skills were found to deploy malware consistent with Atomic Stealer, which primarily affects Mac machines. This type of malware is designed to steal sensitive information, such as passwords and financial details, posing significant risks to users. The proliferation of these malicious skills raises concerns about the security of voice assistant platforms, highlighting the need for increased vigilance among developers and users alike. Companies are urged to monitor their systems closely and implement stronger security measures to protect against these threats.

Impact: OpenClaw agents, ClawHub platform, Mac machines
Remediation: Users should review and remove any unverified skills from their OpenClaw accounts, and ensure their Mac systems are equipped with updated security software to detect and mitigate malware.
Read Original

The Global Threat Map is an open-source initiative designed to provide security teams with real-time visibility of cyber incidents worldwide. It aggregates various open data feeds into an interactive map that displays key indicators like malware spread, phishing attempts, and attack traffic based on geographic location. Unlike traditional threat maps, which are often produced by security vendors, this project relies on community contributions to maintain and update the data. This platform is particularly valuable for organizations looking to enhance their situational awareness and respond to emerging threats more effectively. By utilizing open-source data, it fosters collaboration among security professionals and helps them stay informed about the latest cyber activities that could impact their operations.

Impact: N/A
Remediation: N/A
Read Original

A new wave of GlassWorm malware has been detected, targeting Open VSX software components. This self-replicating malware has infiltrated various development environments, leading to infections that steal sensitive information from users. As developers integrate these compromised components, they unknowingly expose their systems and data to potential breaches. The implications are significant, as downstream victims may suffer from data theft and loss of trust in their development tools. Developers and organizations using these components need to take immediate action to secure their environments and mitigate the risks associated with this malware.

Impact: Open VSX software components
Remediation: Developers should audit their environments for compromised components and replace them with verified versions. Regular security updates and monitoring are also recommended.
Read Original
PreviousPage 2 of 15Next