National Cyber Warfare Foundation (NCWF)

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 46


0 user ratings
2025-05-25 13:55:09
milo
Blue Team (CND)
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang RVTools Bumblebee Malware Attack – How a Trusted IT Tool Became a Malware Delivery Vector   Malicious ‘Checker’ Packages on PyPI Probe TikTok and Instagram for Valid Accounts […


Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape





Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang





RVTools Bumblebee Malware Attack – How a Trusted IT Tool Became a Malware Delivery Vector  





Malicious ‘Checker’ Packages on PyPI Probe TikTok and Instagram for Valid Accounts





RedisRaider: Weaponizing misconfigured Redis to mine cryptocurrency at scale 





Hidden Threats of Dual-Function Malware Found in Chrome Extensions       





Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization





Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 





Pure Harm: PureRAT Attacks Russian Organizations  





Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer





A Brief History of DanaBot, Longtime Ecrime Juggernaut Disrupted by Operation Endgame    





Bumblebee malware distributed via Zenmap, WinMRT SEO poisoning  





60 Malicious npm Packages Leak Network and Host Data in Active Malware Campaign 





Following the spiders: Investigating Lactrodectus malware 





TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead





Russian GRU Targeting Western Logistics Entities and Technology Companies





A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist 





From banks to battalions: SideWinder’s attacks on South Asia’s public sector





UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware





Consistent and Compatible Modelling of Cyber Intrusions and Incident Response Demonstrated in the Context of Malware Attacks on Critical Infrastructure





Malware families discovery via Open-Set Recognition on Android manifest permissions





Follow me on Twitter: @securityaffairs and Facebook and Mastodon





Pierluigi Paganini





(SecurityAffairs – hacking, newsletter)



Source: SecurityAffairs
Source Link: https://securityaffairs.com/178265/breaking-news/security-affairs-malware-newsletter-round-46.html


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Blue Team (CND)



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.