Articles tagged "Malware"

Found 109 articles

New JS#SMUGGLER Campaign Drops NetSupport RAT Through Infected Sites

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

The JS#SMUGGLER campaign is a sophisticated web attack that employs obfuscated JavaScript and hidden HTA files to deploy the NetSupport RAT on Windows desktops. This malware allows attackers to gain full remote control over infected systems, posing a significant threat to user security and privacy.

Impact: Windows desktops, NetSupport RAT
Remediation: Users should ensure their antivirus software is up-to-date, avoid visiting suspicious websites, and consider using web filtering solutions to block malicious scripts.
Read Original

The article discusses a new version of ClayRat Android spyware that has enhanced surveillance and device-control capabilities, indicating an increase in the potential for unauthorized access to personal data. This development poses a significant risk to Android users, as the spyware may be used for malicious purposes such as spying and data theft.

Impact: Android devices
Remediation: Users are advised to install security updates, use reputable antivirus software, and avoid downloading apps from untrusted sources.
Read Original

The Iranian hacking group MuddyWater has deployed a new backdoor known as UDPGangster, which utilizes the User Datagram Protocol for command-and-control operations. This targeted cyber espionage campaign is focused on users in Turkey, Israel, and Azerbaijan, highlighting the ongoing threat posed by state-sponsored hacking groups in the region.

Impact: N/A
Remediation: N/A
Read Original

US organizations are being warned about the presence of Chinese malware, specifically BrickStorm, Junction, and GuestConduit, which are being used by the group Warp Panda for long-term persistence in attacks. This poses a significant cybersecurity threat as these malware types can enable attackers to maintain access to compromised systems over extended periods.

Impact: US organizations, systems targeted by Warp Panda's malware.
Remediation: Organizations are advised to implement robust cybersecurity measures, including regular software updates, network monitoring, and incident response strategies to detect and mitigate the effects of these malware types. Specific patches or updates were not mentioned.
Read Original

The article highlights an ongoing espionage threat from China, utilizing Brickstorm malware that has affected numerous organizations over the past three years. The average duration of these attacks is reported to be 393 days, indicating a significant and persistent threat landscape.

Impact: Dozens of organizations (specific products or systems not specified)
Remediation: N/A
Read Original

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding a new malware threat named BrickStorm, which is being used by Chinese hackers to backdoor VMware vSphere servers. This poses a significant risk to organizations using these servers, as it could lead to unauthorized access and potential data breaches.

Impact: VMware vSphere servers
Remediation: Organizations are advised to implement security best practices, including regular updates and patches for VMware products, network segmentation, and monitoring for unusual activity on their servers.
Read Original

GoldFactory, a financially motivated cybercriminal group, has launched new attacks targeting mobile users in Southeast Asia, specifically Indonesia, Thailand, and Vietnam. They are distributing modified banking applications that serve as conduits for Android malware, leading to over 11,000 infections since October 2024, posing significant risks to users' financial security.

Impact: Modified banking applications for Android, particularly targeting users in Indonesia, Thailand, and Vietnam.
Remediation: Users are advised to avoid downloading applications from unofficial sources and to verify the authenticity of any banking applications before installation.
Read Original
Fake ChatGPT Atlas Browser Used in ClickFix Attack to Steal Passwords

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

Cybersecurity researchers have identified a serious attack involving a fake ChatGPT Atlas browser, which is being used in ClickFix attacks to steal user passwords. This highlights the increasing threat posed by such malicious tactics in the cybersecurity landscape.

Impact: ChatGPT Atlas browser, ClickFix threat
Remediation: Users should avoid downloading or using unverified browser extensions and ensure their passwords are strong and unique. Regularly updating passwords and enabling two-factor authentication is also recommended.
Read Original

Researchers have identified a potential cybersecurity threat where attackers could create and distribute a malicious Skill that can stealthily retrieve external scripts. This poses a significant risk as it could lead to unauthorized access and exploitation of systems using such Skills.

Impact: Skills deployed on platforms that support Claude Agent functionalities
Remediation: Users should avoid installing Skills from untrusted sources and ensure that their systems are updated with the latest security patches.
Read Original

The Shai-Hulud 2.0 malware attack has compromised approximately 400,000 raw secrets by infecting numerous packages in the NPM registry and leaking the stolen data across 30,000 GitHub repositories. This incident highlights significant vulnerabilities in software supply chains and the potential risks for developers and organizations relying on these tools.

Impact: NPM packages, GitHub repositories
Remediation: Developers should audit their NPM packages for vulnerabilities, rotate any exposed secrets, and implement security best practices such as using environment variables for sensitive information.
Read Original
NK Hackers Push 200 Malicious npm Packages with OtterCookie Malware

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

North Korean hackers have intensified their 'Contagious Interview' campaign by uploading over 200 malicious npm packages designed to install OtterCookie malware. This targeted attack primarily affects blockchain and Web3 developers, leveraging fake job interviews and coding tests to lure victims.

Impact: npm registry, blockchain developers, Web3 developers
Remediation: Developers should avoid installing packages from untrusted sources and verify the authenticity of npm packages before use. Regularly audit dependencies for malicious code.
Read Original

The article reports on a joint investigation revealing a remote IT worker infiltration scheme linked to North Korea's Lazarus Group. This scheme highlights the persistent threat posed by state-sponsored cyber actors, emphasizing the need for heightened awareness and security measures against such infiltration tactics.

Impact: Remote IT workers, organizations employing remote staff, potential victims of Lazarus Group attacks.
Remediation: Organizations should enhance security protocols for remote workers, including robust vetting processes, employee training on cybersecurity awareness, and monitoring for unusual activity.
Read Original

BitSight research highlights a significant cybersecurity threat where threat actors exploit calendar subscriptions to deliver phishing links and malware via hijacked domains. This method poses a serious risk as it can lead to social engineering attacks, potentially compromising sensitive information and systems.

Impact: Calendar applications, email clients, and users of hijacked domains.
Remediation: Users should be cautious about accepting calendar subscriptions from unknown sources and regularly review their calendar settings for any unauthorized subscriptions. Implementing email filtering and security awareness training can also mitigate risks.
Read Original

The article reports on a cyber attack campaign by the threat actor Bloody Wolf, which has been targeting Kyrgyzstan since June 2025 and has recently expanded its operations to Uzbekistan. The primary objective of these attacks is to deliver the NetSupport Remote Access Trojan (RAT), posing significant risks to the affected regions' cybersecurity landscape.

Impact: NetSupport RAT
Remediation: N/A
Read Original
PreviousPage 5 of 8Next