Cybercriminals are abusing Meta’s advertising platforms with fake offers of a free TradingView Premium app that spreads the Brokewell malware for Android. The campaign targets cryptocurrency assets and has been running since at least July 22nd through an estimated 75 localized ads. Brokewell has been around since early 2024 and features a broad set of capabilities that include stealing sensitive …
Read More »Tag Archives: malware
A disgruntled worker built his own kill-switch malware to take down his former employer – and it didn’t pay off
A software developer sabotaged his employer after being demoted Davis Lu created a “kill switch” that would lock out all users He was sentenced to four years in jail and additional three years of supervised leave A disgruntled worker has been sentenced to four years in prison after installing “kill switch” malware on his employer’s network which was set to …
Read More »APT36 hackers abuse Linux .desktop files to install malware in new attacks
The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India. The activity, documented in reports by CYFIRMA and CloudSEK, aims at data exfiltration and persistent espionage access. APT 36 has previously used .desktop files to load malware in targeted espionage operations in South Asia. The attacks were first …
Read More »Security flaw in WinRAR allows malware to install at Windows startup – TechSpot
Security flaw in WinRAR allows malware to install at Windows startup TechSpot WinRAR zero-day exploited to plant malware on archive extraction BleepingComputer Newly discovered WinRAR exploit linked to Russian hacking group, can plant backdoor malware — zero day hack requires manual update to fix Tom’s Hardware Patch Now: New WinRAR Flaw Used to Deliver Malware PCMag Phishing attacks exploit WinRAR flaw CVE-2025-8088 to install …
Read More »Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools – The Hacker News
Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools The Hacker News Project Ire autonomously identifies malware at scale Microsoft Microsoft unveils AI agent that can autonomously detect malware Axios Microsoft’s new AI reverse-engineers malware autonomously, marking a shift in cybersecurity GeekWire Project Ire: Microsoft’s autonomous malware detection AI agent Help Net Security Source link
Read More »Hacker sneaks infostealer malware into early access Steam game
A threat actor called EncryptHub has compromised a game on Steam to distribute info-stealing malware to unsuspecting users downloading the title. A few days ago, the hacker (also tracked as Larva-208), injected malicious binaries into the Chemia game files hosted on Steam. Chemia is a survival crafting game from developer ‘Aether Forge Studios,’ which is currently offered as early access …
Read More »Microsoft Teams voice calls abused to push Matanbuchus malware
The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls impersonating IT helpdesk. Matanbuchus is a malware-as-a-service operation seen promoted on the dark web first in early 2021. It was advertised as a $2,500 Windows loader that executes malicious payloads directly in memory to evade detection. In June 2022, threat analyst Brad Duncan reported that …
Read More »Hackers exploit a blind spot by hiding malware inside DNS records
Hackers are stashing malware in a place that’s largely out of the reach of most defenses—inside domain name system (DNS) records that map domain names to their corresponding numerical IP addresses. The practice allows malicious scripts and early-stage malware to fetch binary files without having to download them from suspicious sites or attach them to emails, where they frequently get …
Read More »Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot
Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls. The vulnerabilities could allow attackers with local or remote admin permissions to execute arbitrary code in System Management Mode (SMM), an environment isolated from the operating system (OS) and with more …
Read More »