#malware-as-a-service

[ follow ]
Information security
fromThe Hacker News
6 days ago

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

AuraStealer malware infrastructure revealed with 48 C2 domains using .shop and .cfd extensions, routed through Cloudflare, distributed via ClickFix with subscription pricing of $295-$585 monthly.
Information security
fromSecurityWeek
1 week ago

Aeternum Botnet Loader Employs Polygon Blockchain C&C to Boost Resilience

Aeternum C2 botnet uses Polygon blockchain for command-and-control, making it resilient to takedowns while eliminating central infrastructure costs.
Information security
fromSecurityWeek
1 month ago

'Stanley' Malware Toolkit Enables Phishing via Website Spoofing

Stanley MaaS creates Chrome extensions that keep the address bar showing legitimate URLs while delivering attacker-controlled phishing content.
#android-malware
Information security
fromThe Hacker News
3 months ago

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

Attackers use browser push notifications via Matrix Push C2 to deliver phishing links cross-platform and fileless, offered as a malware-as-a-service platform.
Information security
fromThe Hacker News
3 months ago

Android Trojan 'Fantasy Hub' Malware Service Turns Telegram Into a Hub for Hackers

Fantasy Hub is an Android RAT sold via Telegram as Malware-as-a-Service enabling device control, SMS interception, data exfiltration, and banking fraud against BYOD users.
#ransomware
fromIT Pro
4 months ago
Information security

Ransomware attacks are hitting European enterprises at record pace

Europe faces record ransomware and state-sponsored cyberattacks, with faster deployments and broad targeting across industries including healthcare, defense, and critical infrastructure.
fromTechzine Global
10 months ago
Information security

Infostealers are super spreaders for ransomware attacks

Infostealer malware is a significant contributor to the rise in ransomware attacks, with a projected increase in usage for 2025.
Information security
fromThe Hacker News
5 months ago

Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads

Rhadamanthys stealer operates as a professional MaaS with advanced fingerprinting and OCR, tiered paid packages, and related tools marketed under a rebranded cybercrime business.
fromThe Hacker News
6 months ago

TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operations

Available in both Python and C variants, CastleRAT's core functionality consists of collecting system information, downloading and executing additional payloads, and executing commands via CMD and PowerShell," Recorded Future Insikt Group said.
Information security
fromComputerworld
6 months ago

The AI-powered cyberattack era is here

Anthropic reported last week that a hacker used its technology for an AI-fueled crime spree involving large-scale ransomware attacks. The attacker used the Claude chatbot for recon, code generation, credential theft, infiltration, and ransom notes against 17 organizations, including healthcare providers, government agencies, religious charities, and a defense contractor. The AI even helpfully proposed ransom amounts, ranging from $75,000 to $500,000 in Bitcoin. This marks the first known case where AI choreographed an entire extortion scheme, automating nearly every step.
Information security
Privacy technologies
fromThe Hacker News
7 months ago

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

SocGholish malware utilizes Traffic Distribution Systems to redirect users to malicious content and has a Malware-as-a-Service model for cybercriminal operations.
Privacy technologies
fromArs Technica
7 months ago

GitHub abused to distribute payloads on behalf of malware-as-a-service

Malware-as-a-service operators have exploited GitHub to distribute malicious software, posing challenges for organizations relying on the platform.
[ Load more ]