A new banking Trojan is targeting users of Brazil's Pix payment system. This malware operates with a unique twist: it employs a real-time human operator who monitors transactions and waits for the right moment to intervene. Once the operator identifies a vulnerable transaction, they can manipulate it to steal funds. The attack poses a significant risk to Pix users, as it combines traditional malware tactics with human oversight, making detection and prevention more challenging. As Brazil's Pix system continues to gain popularity, the potential for financial loss increases, highlighting the urgent need for users to be vigilant about their online banking security.
Articles tagged "Trojan"
Found 22 articles
Security Affairs
The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.
SCM feed for Latest
A new cyber campaign known as Bloody Wolf is actively targeting individuals in Uzbekistan and Russia using the NetSupport Remote Access Trojan (RAT). Researchers report that around 50 victims have been affected in Uzbekistan and about 10 in Russia, with smaller numbers in Kazakhstan, Turkey, Serbia, and Belarus. This type of malware allows attackers to gain control over infected systems, posing significant risks to personal and sensitive information. The targeting of these specific regions suggests a focused effort by the attackers, likely indicating political or economic motivations behind the campaign. Users in these countries should be vigilant about suspicious emails and software installations to protect against such threats.
BleepingComputer
A fraudulent 7-Zip website has emerged, distributing a compromised version of the popular file archiving software. This malicious installer includes a trojan that converts the user's computer into a residential proxy node, which can be used by attackers for various illicit activities. Users who unknowingly download this installer are putting their machines at risk and could potentially face privacy violations or further exploitation. This situation is particularly concerning as it exploits the trust many people have in widely used software like 7-Zip. It's crucial for users to ensure they download software only from official sources to avoid similar threats.
The Hacker News
A cybercriminal group known as Bloody Wolf is targeting organizations in Uzbekistan and Russia with a spear-phishing campaign designed to deploy a remote access trojan called NetSupport RAT. This group, which has been active since at least 2023, is focusing its attacks on the manufacturing, finance, and IT sectors. Kaspersky, a cybersecurity firm, is tracking this activity under the name Stan Ghouls. The use of spear-phishing indicates that the attackers are likely customizing their messages to trick specific individuals or organizations into downloading the malicious software. This type of threat can lead to significant data breaches and operational disruptions for the affected companies, making it crucial for them to enhance their email security and user awareness training.
Researchers have identified a supply chain attack affecting legitimate npm and PyPI packages, specifically targeting versions of @dydxprotocol/v4-client-js. The compromised versions include 3.4.1, 1.22.1, 1.15.2, and 1.0.31. Attackers have modified these packages to distribute malware designed to steal cryptocurrency wallet credentials and enable remote access through RAT (Remote Access Trojan) software. This incident poses a significant risk to developers and users relying on these packages, as it can lead to unauthorized access to sensitive financial information. Companies and individual developers should review their dependencies and ensure they are using safe versions to mitigate potential risks.
Infosecurity Magazine
Bitdefender has identified a new Android malware campaign that uses Hugging Face, a platform typically associated with artificial intelligence and machine learning. This malware, classified as a Remote Access Trojan (RAT), is designed to gain unauthorized access to Android devices, potentially compromising user data and privacy. The campaign raises concerns as it exploits a legitimate platform to distribute malicious software, making it harder for users to detect the threat. Users of Android devices should be particularly cautious and ensure they download apps only from trusted sources to avoid falling victim to this malware. The implications are significant, especially for those who may unknowingly install infected applications, leading to data theft or device control by attackers.
SCM feed for Latest
Researchers have discovered that malicious Python packages were uploaded to the Python Package Index (PyPI), posing a significant risk to developers. The harmful code was hidden within a file that appeared to be a Basque language dictionary but was actually a compressed archive containing a Remote Access Trojan (RAT). This incident could affect any developers who inadvertently install these malicious packages, potentially allowing attackers to gain unauthorized access to their systems. It serves as a reminder for users to be cautious when downloading packages from open-source repositories, as they can be exploited to distribute malware. Vigilance and thorough vetting of software dependencies are crucial for maintaining security.
Infosecurity Magazine
Researchers have identified a new variant of PureRAT, a remote access trojan (RAT), which now includes emojis in its code. The presence of these emojis suggests that the malware may have been generated using AI, pulling comments and content from social media. This finding raises concerns about the evolving tactics of cybercriminals, as they increasingly use advanced technology to craft their malware. Users and organizations should be vigilant, as this type of malware can compromise sensitive information and control systems remotely. The shift to AI-generated malware indicates a potential increase in the sophistication and adaptability of cyber threats.
SCM feed for Latest
India is currently dealing with a sophisticated espionage campaign that utilizes the Blackmoon trojan. This attack begins with a ZIP file that conceals malicious files, allowing attackers to infiltrate systems. The campaign poses a significant risk to sensitive information and national security, as it targets various sectors within the country. Cybersecurity experts are urging organizations in India to remain vigilant and enhance their security measures to protect against such advanced threats. This incident underscores the ongoing risks of cyber espionage and the need for robust defense strategies.
A new cybersecurity threat involves a malicious browser extension called NexShield, which uses social engineering tactics to crash users' browsers. This attack is designed to deliver a Python-based Remote Access Trojan (RAT), putting users' systems at risk of further compromise. The method relies on tricking users into installing the extension, which then takes control of their browsers. As a result, individuals and organizations that fall victim could face significant data theft or system damage. Users are advised to be cautious about browser extensions and ensure they are from trusted sources to avoid falling prey to such scams.
Cybersecurity researchers at Securonix have reported a new campaign targeting the European hospitality sector, known as PHALT#BLYX. This campaign uses fake booking emails to trick hotel staff into clicking on links that lead to counterfeit blue screen of death (BSoD) error pages. By doing so, attackers aim to install a remote access trojan called DCRat on the victims' systems. This type of malware allows hackers to gain unauthorized access to sensitive information and control over the infected devices. The incident underscores the need for heightened vigilance among hotel employees regarding suspicious emails and links, as these tactics can lead to severe security breaches.
The cybercriminal group known as Silver Fox has recently shifted its focus to Indian users, employing income tax-themed phishing emails to spread a remote access trojan called ValleyRAT. This malware is designed to give attackers remote control over infected systems. Researchers from CloudSEK, Prajwal Awasthi and Koushik Pal, noted that the attack utilizes a sophisticated method involving DLL hijacking to ensure the malware remains persistent on the target devices. Users in India should be particularly cautious of emails related to taxes, as they are being used as bait to deliver this malicious software. The rise in such targeted phishing campaigns emphasizes the need for increased awareness and cybersecurity measures among individuals and organizations.
Hackread – Cybersecurity News, Data Breaches, AI, and More
A recent report from cybersecurity firm Ontinue reveals that the open-source monitoring tool Nezha is being misused as a Remote Access Trojan (RAT) by hackers. This abuse allows attackers to bypass security measures and gain control over servers worldwide. The exploitation of Nezha raises significant concerns for organizations using the tool, as it can lead to unauthorized access and potential data breaches. Users of the tool should be particularly vigilant, as this incident demonstrates how legitimate software can be weaponized for malicious purposes. The situation underscores the need for enhanced security protocols and monitoring to protect against such threats.
A recent campaign has targeted developers through the Visual Studio Code (VSCode) Marketplace, where 19 malicious extensions have been found since February. These extensions cleverly disguise malware within dependency folders, hiding it in fake PNG files. Developers using these compromised extensions are at risk, as the malware can potentially compromise their systems and projects. This incident raises alarms about the safety of third-party tools within development environments. Users are urged to be cautious when installing extensions and to verify their sources to avoid falling victim to such attacks.