Articles tagged "Malware"

Found 108 articles

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyberattacks targeting Ukraine's defense forces, utilizing a malware known as PLUGGYAPE. These attacks are believed to be linked to the Russian cyber group Void Blizzard, also referred to as Laundry Bear or UAC-0190. The attacks come amidst ongoing tensions and conflict in the region, raising concerns about the security of military operations in Ukraine. Given the group’s history and capabilities, these incidents could pose significant risks to the integrity of defense communications and operations. The situation underscores the continuing cyber warfare component of the conflict, as nation-states increasingly rely on digital tactics alongside traditional military strategies.

Impact: Ukraine's defense forces
Remediation: N/A
Read Original

A new malware campaign known as PluggyApe has been targeting defense officials in Ukraine. The attackers have been using a charity theme to lure victims into clicking on links that lead to a fake charitable foundation website. This tactic involves sending instant messages through platforms like Signal and WhatsApp, making it appear as though the outreach is legitimate. The campaign's focus on defense personnel raises concerns about the potential for sensitive information to be compromised, especially given the ongoing conflict in the region. As cyber threats continue to evolve, this incident serves as a reminder of the need for vigilance among individuals and organizations against social engineering tactics.

Impact: Ukrainian defense officials
Remediation: Users should be cautious of unsolicited messages, verify the authenticity of links before clicking, and maintain updated security software.
Read Original

Predator spyware has been found to be more advanced and dangerous than previously thought, turning failed cyberattacks into valuable intelligence for future exploits. This software can collect data from targets even when initial attacks do not succeed, making it a persistent threat. Researchers have indicated that this capability allows attackers to refine their methods and strategies, increasing the likelihood of successful future breaches. The implications are significant for individuals and organizations that could be targeted, as it raises concerns about privacy and security. As this spyware evolves, it poses a greater risk to sensitive information and personal data.

Impact: N/A
Remediation: Organizations should implement robust security measures, including regular software updates, employee training on phishing attacks, and monitoring for suspicious activity.
Read Original

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyber attacks targeting Ukrainian defense forces using a malware called PLUGGYAPE. These attacks occurred between October and December 2025 and have been linked to a Russian hacking group known as Void Blizzard. This group, also referred to as Laundry Bear or UAC-0190, has been active for several years. The use of popular messaging platforms like Signal and WhatsApp suggests that attackers are exploiting familiar tools to deliver their malware, making detection and prevention more challenging. This incident raises concerns about the cybersecurity of military organizations, especially in conflict zones, where the integrity of communications is crucial.

Impact: Ukrainian defense forces, Signal, WhatsApp
Remediation: Users should implement security best practices such as updating all software, using strong, unique passwords, and enabling two-factor authentication on messaging apps.
Read Original

From October to December 2025, Ukraine's Defense Forces were targeted by a malware campaign disguised as a charity initiative. The attackers deployed backdoor malware known as PluggyApe, which allowed them unauthorized access to sensitive systems. This incident raises concerns about the security of military communications and the potential for further cyberattacks against Ukraine amidst ongoing tensions. The use of a charity theme to lure victims highlights the evolving tactics of cybercriminals, making it crucial for organizations to remain vigilant. As the conflict continues, the implications of such attacks could extend beyond immediate data breaches, affecting national security and public trust.

Impact: Ukrainian Defense Forces
Remediation: Enhanced cybersecurity measures, employee training on recognizing phishing attempts, and monitoring for unusual system activity.
Read Original

A new phishing campaign is targeting employees by exploiting their anxiety around performance reviews. The attackers are sending emails that impersonate management or HR, claiming to discuss performance evaluations scheduled for October 2025 and falsely hinting at potential layoffs. This tactic aims to create urgency and fear, prompting recipients to click on malicious links or download malware. Companies and employees need to be vigilant, as these scams can lead to data breaches or financial loss. The incident highlights the need for better cybersecurity awareness and training, especially during sensitive times like performance review periods.

Impact: Employees of companies receiving the phishing emails, specifically those concerned about performance reviews.
Remediation: Employees should be trained to recognize phishing emails and verify the authenticity of unexpected communications from management or HR. Regular updates on cybersecurity practices should be implemented.
Read Original

Researchers have uncovered a significant web skimming campaign that has been stealing credit card information from online checkout pages since January 2022. This attack primarily targets major payment networks, including American Express, Mastercard, and UnionPay, affecting enterprise organizations that use these payment services. The skimming malware is designed to capture sensitive payment information as users enter it during online transactions. As a result, customers of these affected enterprises may be at risk of fraud and identity theft. It’s crucial for businesses to enhance their security measures and for users to monitor their financial statements for any suspicious activity.

Impact: American Express, Diners Club, Discover, JCB Co., Ltd., Mastercard, UnionPay
Remediation: Businesses should enhance their security measures, including implementing web application firewalls, regularly monitoring for malware, and educating users about safe online shopping practices.
Read Original

A 44-year-old man has been sentenced to prison for installing remote access malware on the systems of a logistics company in the Netherlands. He was able to carry out this cyberattack with assistance from some employees of the firm. The malware allowed him to gain unauthorized access to sensitive information, raising serious concerns about insider threats and the security of critical infrastructure. This incident serves as a reminder for companies to strengthen their cybersecurity measures and ensure that employees are aware of the risks associated with insider collaboration. The case highlights the increasing need for vigilance in protecting sensitive systems from both external and internal threats.

Impact: Logistics company systems, remote access malware
Remediation: Companies should enhance employee training on cybersecurity risks and implement stricter access controls to prevent insider threats.
Read Original
Actively Exploited

The latest Security Affairs Malware newsletter covers a range of malware-related issues affecting users and organizations globally. One notable threat is the VVS Discord Stealer, which employs Pyarmor to obfuscate its code and evade detection. Additionally, researchers are raising alarms about malicious NPM packages that deliver the NodeCordRAT, a remote access tool that can compromise systems. The newsletter also discusses a new campaign linked to the Astaroth worm, which is being spread through WhatsApp in Brazil. These findings highlight the ongoing challenges in malware detection and the evolving tactics used by cybercriminals, putting many users at risk.

Impact: VVS Discord, NodeCordRAT, Astaroth worm, NPM packages, WhatsApp
Remediation: Users should be cautious of suspicious downloads and update their security software to the latest versions. It's also advised to monitor NPM packages for any known vulnerabilities and to avoid clicking on unverified links in messaging apps.
Read Original

MuddyWater, an Iranian hacking group, has launched a spear-phishing campaign targeting various sectors in the Middle East, including diplomatic, maritime, financial, and telecom organizations. The attackers are using malicious Word documents that employ icon spoofing to trick users into activating a Rust-based remote access tool (RAT) known as RustyWater. This malware allows for asynchronous command and control, registry persistence, and anti-analysis capabilities, making it difficult for victims to detect and remove. The implications of this campaign are significant, as it could compromise sensitive information and disrupt critical infrastructure in the affected sectors. Organizations in these areas should be vigilant and enhance their cybersecurity measures to protect against such targeted attacks.

Impact: Diplomatic, maritime, financial, and telecom sectors in the Middle East
Remediation: Organizations should implement strong email filtering, conduct security awareness training for employees, and ensure that all systems are up to date with the latest security patches.
Read Original
Actively Exploited

The FBI has issued a warning about a phishing campaign linked to North Korea's Kimsuky APT group, which is using QR codes as part of their tactics. This group is known for targeting individuals and organizations, particularly in sectors like defense and technology. By embedding malicious links in QR codes, attackers aim to trick victims into providing sensitive information or downloading malware. This method is particularly concerning as QR codes are increasingly used in everyday transactions, making it easier for attackers to exploit unsuspecting users. Organizations and individuals should be vigilant and verify the legitimacy of QR codes before scanning them, as this campaign highlights a growing trend in cyber threats.

Impact: QR codes used in phishing campaigns, potentially affecting users across various sectors.
Remediation: Users should verify QR codes before scanning them and implement security awareness training to recognize phishing attempts.
Read Original

The China-linked hacking group UAT-7290 has been actively spying on telecom providers in South Asia and Southeastern Europe since 2022. This group uses modular malware, including tools named RushDrop, DriveSwitch, and SilentRaid, to infiltrate and monitor their targets. By embedding deeply within the victim networks, they conduct extensive espionage operations that could compromise sensitive communications and data. The ongoing attacks raise concerns about the vulnerability of telecom infrastructure in these regions and the potential risks to national security and privacy for users. As these threats continue to evolve, it is crucial for telecom companies to enhance their cybersecurity measures to protect against such sophisticated espionage tactics.

Impact: Telecom providers in South Asia and Southeastern Europe
Remediation: Telecom companies should enhance network security measures, implement regular security audits, and monitor for unusual activity to mitigate risks.
Read Original
Actively Exploited

Attackers are employing a combination of social engineering tactics, including fake CAPTCHAs and counterfeit Blue Screen of Death (BSOD) messages, to trick users into executing harmful code. This method, known as ClickFix, prompts victims to copy and paste malicious scripts, potentially compromising their systems. The attacks primarily target unsuspecting Windows users who may panic upon seeing the fake BSOD, believing their computer has crashed. It's crucial for users to be aware of these tactics and to verify the legitimacy of any error messages before taking action. This incident serves as a reminder of the importance of maintaining vigilance against deceptive online threats.

Impact: Windows operating systems
Remediation: Users should avoid copying and pasting code from untrusted sources and verify system messages before responding to them. Keeping antivirus software updated and using browser security settings can also help mitigate these risks.
Read Original

A new wave of attacks using GoBruteforcer malware is targeting cryptocurrency and blockchain projects by exploiting exposed databases. Researchers believe that many of these databases are improperly configured, potentially using AI-generated examples as templates. This makes them vulnerable to brute force attacks, where attackers try numerous password combinations to gain unauthorized access. The focus on crypto and blockchain projects is particularly concerning given the high value of assets and sensitive information involved. Companies in this space need to ensure their servers are securely configured to prevent these types of attacks, as the risk of data breaches and financial losses is significant.

Impact: Cryptocurrency and blockchain project databases, exposed servers configured with AI-generated examples
Remediation: Ensure databases are properly secured, implement strong password policies, and regularly audit server configurations.
Read Original

Cybersecurity researchers have identified two malicious Chrome extensions that have collectively attracted over 900,000 users. These extensions, named 'Chat GPT for Chrome with GPT-5' and 'Claude Sonnet & DeepSeek AI,' are designed to steal conversations from OpenAI's ChatGPT and DeepSeek, along with users' browsing data. The stolen information is sent to servers controlled by the attackers. This incident raises significant concerns about user privacy and data security, as many individuals may unknowingly be exposing sensitive information through these extensions. Users are urged to remove these extensions immediately and review their online security practices to protect their data.

Impact: ChatGPT, DeepSeek, Chrome Web Store
Remediation: Users should remove the malicious extensions from their browsers and monitor their accounts for any unusual activity.
Read Original
Page 1 of 8Next