#Malware

[ follow ]
#botnet
fromArs Technica
10 hours ago
Roam Research

14,000 routers are infected by malware that's highly resistant to takedowns

A 14,000-device botnet called KadNap primarily compromises unpatched Asus routers to create a takedown-resistant proxy network for cybercrime using peer-to-peer Kademlia architecture.
fromThe Hacker News
1 week ago
Information security

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Aeternum C2 botnet uses Polygon blockchain for command-and-control infrastructure, making it resistant to traditional takedown methods by storing instructions on immutable public ledgers.
Roam Research
fromArs Technica
10 hours ago

14,000 routers are infected by malware that's highly resistant to takedowns

A 14,000-device botnet called KadNap primarily compromises unpatched Asus routers to create a takedown-resistant proxy network for cybercrime using peer-to-peer Kademlia architecture.
#malware
Information security
fromThe Hacker News
1 month ago

Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto

Evelyn Stealer uses malicious VS Code extensions to infect developer environments, steal credentials and crypto data, and enable deeper organizational access.
Information security
fromThe Hacker News
1 month ago

ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories

Attackers increasingly use legitimate code-signing certificates and cloud services to conceal malware, while Apple partners with Google to use Gemini to power a personalized Siri.
Information security
fromComputerworld
6 days ago

The Coruna exploit: Why iPhone users should be concerned

Coruna is a sophisticated nation-state malware toolkit exploiting 23 vulnerabilities across five chains to steal data, cryptocurrency, and personal information while respecting Apple's Lockdown Mode.
Information security
fromThe Hacker News
5 days ago

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

A China-linked APT group targets South American telecommunications infrastructure with three new implants across Windows, Linux, and edge devices since 2024.
Information security
fromThe Hacker News
6 days ago

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Russian state-sponsored APT28 deployed two new malware families, BadPaw and MeowMeow, targeting Ukrainian entities through phishing emails with Ukrainian-language lures about border crossing appeals.
#cybersecurity
#phishing
Privacy technologies
fromTechzine Global
1 week ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromIT Pro
6 months ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

Privacy technologies
fromTechzine Global
1 week ago

Fake Google Security page hijacks browser as proxy for attackers

Attackers use fake Google security notifications to install malicious Progressive Web Apps that steal one-time passwords, crypto wallet addresses, location data, and intercept SMS codes through social engineering and legitimate browser APIs.
fromIT Pro
6 months ago
Privacy professionals

Malicious URLs overtake email attachments as the biggest malware threat

Information security
fromTheregister
2 weeks ago

Crims hit a $20M jackpot via malware-stuffed ATMs

ATM jackpotting malware enabled thieves to steal over $20 million by forcing compromised ATMs to dispense cash without bank authorization.
Tech industry
fromTechzine Global
2 weeks ago

AI platforms open new route for malware campaigns

AI assistants with web access can be abused as covert command-and-control intermediaries, allowing malware to receive commands and exfiltrate data while evading detection.
#chrome-extensions
fromZDNET
4 weeks ago

Is spyware hiding on your phone? How to find out and remove it - fast

Spyware is one of the top threats to your mobile security and can severely impact your handset's performance if you are unlucky enough to become infected. It is a type of malware that typically lands on your iPhone or Android phone through malicious mobile apps or through phishing links, emails, and messages. While appearing to be a legitimate software package or useful utility, spyware will operate quietly in the background to monitor your movements,
Privacy technologies
fromThe Hacker News
4 weeks ago

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft. "The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated video to deceive the victim," Google Mandiant researchers Ross Inman and Adrian Hernandez said.
Information security
Information security
fromThe Verge
1 month ago

OpenClaw's AI 'skill' extensions are a security nightmare

OpenClaw's skill marketplace contains hundreds of malicious add-ons that can deliver malware and exfiltrate crypto and device credentials.
Information security
fromAxios
1 month ago

Exclusive: Suspected Chinese hackers impersonate U.S. briefings in phishing lure

China-linked Mustang Panda used file-based phishing to infect diplomatic and election officials with data-stealing persistent malware, detected by an AI agent at Dream.
Artificial intelligence
fromFortune
1 month ago

Researchers say viral AI social network Moltbook is a 'live demo' of how the new internet could fail | Fortune

Moltbook's AI-agent social platform exposed security failures, malware, and data leaks, revealing risks of low-oversight agent ecosystems that can enable attacks and societal harm.
Information security
fromArs Technica
1 month ago

Notepad++ updater was compromised for 6 months in supply-chain attack

Notepad++ update/download traffic can be intercepted at ISP/TLS-intercept level, enabling redirection and tampered downloads; verify version 8.8.8+ from the official site and consider blocking.
Information security
fromKotaku
1 month ago

Steam Hit People Playground Gets Hit With A Save Wiping Virus

People Playground's Steam Workshop was infected by a malicious mod that spread to other mods, wiping in-game saves and prompting immediate updates and mod deletion.
fromSecurityWeek
1 month ago

Cyber Insights 2026: Malware and Cyberattacks in the Age of AI

By mid-2026, at least one major global enterprise will fall to a breach caused or significantly advanced by a fully autonomous agentic AI system.
Artificial intelligence
#supply-chain-attack
Information security
fromArs Technica
6 years ago

New clues show how Russia's grid hackers aimed for physical destruction

Russian hackers aimed to inflict long-term physical destruction on Ukraine's power grid in December 2016, planning damage to be triggered during operators' recovery efforts.
Information security
fromTechzine Global
1 month ago

AI hallucinates in 28 percent of dependency upgrades

AI dependency-upgrade recommendations often reference non-existent or dangerous package versions, causing broken pipelines, wasted developer time, and increased supply‑chain risk.
Information security
fromTechzine Global
1 month ago

149 million login details leaked via unsecured database

A publicly accessible database exposed 149 million usernames and passwords across email, social, financial, government, and streaming services, likely harvested by infostealer malware.
#insider-threat
Information security
fromTheregister
1 month ago

Broker who sold malware to the FBI set for sentencing

A Jordanian national pleaded guilty to acting as an initial access broker who sold network access and malware that facilitated ransomware and multimillion-dollar losses.
fromTechzine Global
1 month ago

Microsoft is making Teams more secure starting today: here's what's changing

Starting today, Microsoft is making it more difficult for cyber attackers to infiltrate organizations via Teams. A new update now blocks dangerous file types and malicious URLs, unless companies explicitly change the default settings. The new features were already known, but will activate automatically today for organizations that have not tampered with the default settings. Companies with customized configurations will not notice the change; their settings will remain intact.
Information security
Information security
fromTheregister
2 months ago

Are criminals vibe coding malware? All signs point to yes

AI-assisted coding is already being used in malware, creating vulnerabilities that demand controls like SHIELD and human-in-the-loop code review.
Information security
fromSocial Media Explorer
2 months ago

How Spam Filtering Protects You from Phishing and Malware - Social Media Explorer

Spam filtering protects inboxes by using layered checks—sender reputation, content and technical analysis—to block phishing, malware, and other malicious emails before delivery.
#browser-extensions
fromZDNET
6 months ago
Information security

Why you should delete your browser extensions right now - or do this to stay safe

fromZDNET
6 months ago
Information security

Why you should delete your browser extensions right now - or do this to stay safe

fromDataBreaches.Net
2 months ago

Hacker Who Stole Millions in Seconds Finally Caught - DataBreaches.Net

South Korea has successfully extradited a 29-year-old Lithuanian national accused of stealing approximately $1.8 million in digital assets through sophisticated malware.
World news
Information security
fromwww.mercurynews.com
2 months ago

Consumer tip: Watch out for this package delivery' scam

Scammers send fake package notifications urging clicks or payments to install malware or steal personal and financial information—verify delivery status only through carriers' official channels.
fromThe Hacker News
3 months ago

Researchers Find Malicious VS Code, Go, npm, and Rust Packages Stealing Developer Data

The VS Code extensions masquerade as a premium dark theme and an artificial intelligence (AI)-powered coding assistant, but, in actuality, harbor covert functionality to download additional payloads, take screenshots, and siphon data. The captured information is then sent to an attacker-controlled server. "Your code. Your emails. Your Slack DMs. Whatever's on your screen, they're seeing it too," Koi Security's Idan Dardikman said. "And that's just the start. It also steals your WiFi passwords, reads your clipboard, and hijacks your browser sessions."
Information security
Information security
fromThe Hacker News
3 months ago

Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More

Everyday development and collaboration tools can be weaponized to steal credentials, backdoor packages, and enable widespread supply-chain and account compromise.
Information security
fromThe Hacker News
3 months ago

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

North Korean threat actors published 197 malicious npm packages delivering OtterCookie/BeaverTail malware that establishes C2 and steals credentials, clipboard, keystrokes, screenshots, and wallets.
#npm
Information security
fromThe Hacker News
3 months ago

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

Cyber threats are rapidly evolving as criminals exploit browser extensions, smart devices, social platforms, and novel malware while governments and companies intensify countermeasures.
Information security
fromKotaku
3 months ago

Microsoft Warns Windows 11 AI Can Install Malware

Windows 11 will offer AI agents that can act on users' behalf but are disabled by default due to significant security and malware risks.
fromIndependent
3 months ago

'Fraudsters stole 2,400 from my Revolut account while I was asleep - but I was told I must have authorised it myself'

Small-business owner Johnny Carroll only got refund after a year of pleading and the company eventually said it had been a 'malware incident'.
Miscellaneous
fromArs Technica
3 months ago

Google will let Android power users bypass upcoming sideloading restrictions

As Google begins early access testing, it has conceded that "experienced users" should have an escape hatch. According to Google, online scam and malware campaigns are getting more aggressive, and there's real harm being done in spite of the platform's sideloading scare screens. Google says it's common for scammers to use social engineering to create a false sense of urgency, prompting users to bypass Android's built-in protections to install malicious apps.
Information security
#antivirus
fromZDNET
3 months ago
Digital life

How to find and remove PC viruses for free: 12 reliable methods that work for me

fromZDNET
4 months ago
Information security

12 ways to find viruses on your PC for free (and how to remove them)

fromZDNET
3 months ago
Digital life

How to find and remove PC viruses for free: 12 reliable methods that work for me

fromZDNET
4 months ago
Information security

12 ways to find viruses on your PC for free (and how to remove them)

Privacy professionals
fromThe Independent
3 months ago

Google warns billions of users over critical VPN threat

Fake VPN apps impersonate legitimate services to spy on users and steal financial credentials, cryptocurrency and other sensitive data from Android devices.
Privacy professionals
fromTheregister
4 months ago

Malware-pwned laptop gifts cybercriminals Nikkei's Slack

Nikkei suffered a Slack breach exposing personal details of 17,368 employees and partners after malware compromised an employee device and stole credentials.
Information security
fromcointelegraph.com
4 months ago

Fake social media accounts: The rise of Cointelegraph impersonators, explained

Impersonation scams in crypto media are widespread in 2025, using cloned profiles to defraud projects, steal data, install malware, and drain wallets.
Miscellaneous
fromTheregister
4 months ago

Russia arrests three suspected Meduza infostealer devs

Three alleged developers of the Meduza infostealer were arrested in Moscow and the surrounding region, with devices seized and linked malware targeting protection tools and creating botnets.
fromPCWorld
4 months ago

This popular 'privacy browser' is actually tracking users and stealing data

According to a security report from Infoblox, in cooperation with the United Nations Office on Drugs and Crime, the China-focused Universe Browser is advertised as a safe and private way to bypass censorship and web blocks. It has a specific use case for would-be online gamblers. But just underneath its surface, the browser is recording the user's location, routing all traffic data through servers in China, installing keyloggers, and changing network settings.
Information security
Information security
fromZDNET
4 months ago

Don't be tempted by this scam on YouTube - how to protect yourself

A large, long-running YouTube-based malware network used tutorial videos offering cracked software and game hacks to trick users into disabling security and installing malware.
fromThe Hacker News
4 months ago

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Some of these [companies' are heavily involved in the unmanned aerial vehicle (UAV) sector, suggesting that the operation may be linked to North Korea's current efforts to scale up its drone program," ESET security researchers Peter Kálnai and Alexis Rapin said in a report shared with The Hacker News. It's assessed that the end goal of the campaign is to plunder proprietary information and manufacturing know-how using malware families such as ScoringMathTea and MISTPEN.
Information security
Information security
fromZDNET
4 months ago

TikTok video promising you free Photoshop or Windows license? Don't do it - it's a scam

TikTok is being used to deliver ClickFix social engineering attacks that trick users into running commands to install information-stealing malware like AuroStealer.
fromThe Hacker News
4 months ago

npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels

Webhooks on Discord are a way to post messages to channels in the platform without requiring a bot user or authentication, making them an attractive mechanism for attackers to exfiltrate data to a channel under their control. "Importantly, webhook URLs are effectively write-only," Socket researcher Olivia Brown said in an analysis. "They do not expose channel history, and defenders cannot read back prior posts just by knowing the URL."
Information security
fromZDNET
5 months ago

AI is making cybercriminal workflows more efficient too, OpenAI finds

OpenAI has published research revealing how state-sponsored and cybercriminal groups are abusing artificial intelligence (AI) to spread malware and perform widespread surveillance. (Disclosure: Ziff Davis, ZDNET's parent company, filed an April 2025 lawsuit against OpenAI, alleging it infringed Ziff Davis copyrights in training and operating its AI systems.) AI has benefits in the cybersecurity space; it can automate tedious and time-consuming tasks, freeing up human specialists to focus on complex projects and research, for example.
Information security
fromTechzine Global
5 months ago

OpenAI reports growing misuse of AI by states and criminals

OpenAI has intensified its efforts to combat the misuse of artificial intelligence. In a new report, the company reveals that it has dismantled several international networks in recent months that were using its models for cyberattacks, scams, and political influence. The analysis shows how malicious actors are becoming increasingly sophisticated in their use of AI, while OpenAI is simultaneously expanding its defense mechanisms.
Artificial intelligence
Information security
fromIT Pro
5 months ago

A new 'top-tier' Chinese espionage group is stealing sensitive data

A China-linked group, Phantom Taurus, conducts covert cyber-espionage against governments, militaries, and critical infrastructure across Africa, the Middle East, and Asia.
Information security
fromTheregister
5 months ago

Microsoft spots XCSSET strain hiding in Apple dev projects

XCSSET macOS malware variant targets developers via infected Xcode projects, adding stealthy persistence, obfuscation, Firefox data theft, and crypto clipboard hijacking.
Information security
fromKotaku
5 months ago

Malware 'Game' On Steam Stole $32K From Cancer-Stricken Streamer

A malicious update to the Steam game BlockBlasters deployed malware that drained a streamer’s $32,000 in crypto during a cancer fundraiser.
Information security
fromIT Pro
5 months ago

Hackers are disguising malware as ChatGPT, Microsoft Office, and Google Drive to dupe workers

SMBs in Europe and parts of Africa face malware and PUAs disguised as trusted tools, necessitating stronger employee training, authentication, patching, and secure software sourcing.
Information security
fromIT Pro
5 months ago

Mobile app security is a huge blind spot for developer teams - 93% are confident their applications are secure, but 62% reported breaches last year

Organizations overestimate mobile app security readiness despite widespread breaches, accelerated release pressures, and frequent malware, data loss, and credential-theft incidents.
Information security
fromTheregister
6 months ago

Double trouble with CastleRAT malware, now in C and Python

TAG-150 created CastleRAT in Python and C, using ClickFix social engineering to trick users into pasting commands that enable remote access and payload delivery.
Information security
fromWIRED
6 months ago

Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn

Stealerium automates sextortion by detecting porn browsing, screenshotting tabs, capturing webcam photos, and exfiltrating images alongside stolen credentials for blackmail.
Artificial intelligence
fromTechzine Global
6 months ago

Anthropic blocks misuse of Claude for cybercrime

Anthropic blocked attempts to misuse Claude for phishing, malware development, filter circumvention, and influence campaigns, banning accounts and tightening filters to mitigate risks.
fromTheregister
6 months ago

Apache ActiveMQ attackers patch critical vuln after entry

After installing a backdoor to the infected systems, they then downloaded two Java Archive (JAR) files that effectively patched the original vuln.
Information security
fromThe Hacker News
6 months ago

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures

The Noodlophile campaign, active for over a year, now leverages advanced spear-phishing emails posing as copyright infringement notices, tailored with reconnaissance-derived details like specific Facebook Page IDs and company ownership information.
Information security
[ Load more ]