Threat Research | Weekly Recap [16 Jun 2025]

This weekly recap covers global ransomware trends, including notable incidents like Fog and Spectra, and exploits of vulnerabilities such as CVE-2024-57727. It highlights ongoing activities from threat groups like Arkana, LockBit, and MISSION2025, along with malware campaigns like DCRat and GrayAlpha’s diverse infection vectors. #Arkana #LockBit #MISSION2025 #DCRat #GrayAlpha

Read More

Cybersecurity researchers have identified malicious packages on PyPI and npm that target developers by stealing sensitive data, including credentials and environment variables. These threats demonstrate sophisticated multi-stage attack methods and emphasize the importance of vigilant security practices in open-source development environments. #chimera-sandbox-extensions #Pypi #npm #PulsarRAT #slopsquatting…

Read More
2025 Blockchain and Cryptocurrency Threat Report: Malware in the Open Source Supply Chain

Malicious open source packages targeting blockchain developers are increasingly used to steal cryptowallet credentials, drain funds, mine cryptocurrency, and hijack clipboard data. Threat actors, including nation-state groups, exploit supply chain vulnerabilities in registries like npm and PyPI, impacting ecosystems such as Ethereum, Solana, TRON, and TON. #ContagiousInterview #BeaverTail #InvisibleFerret #XMRig #ClipboardHijackers

Read More
⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

This cybersecurity update highlights recent active threats, including APT41’s use of Google Calendar for command-and-control and the takedown of services aiding malware obfuscation. Key incidents involve nation-state cyberattacks, vulnerabilities in popular software, and innovative malware such as GhostSpy and Lumma Stealer. #APT41 #VoidBlizzard…

Read More
Threat Research | Weekly Recap [2025-06-01]

Recent cybersecurity threat research highlights the rise of new ransomware groups like NightSpire and Lyrix, targeting SMEs and Windows users with sophisticated techniques. Advanced persistent threats such as Konni and Void Blizzard continue to focus on geopolitical espionage, while malware campaigns exploit supply chain vulnerabilities to deploy mining malware and remote access trojans. #NightSpire #LyrixRansomware #Konni #VoidBlizzard #FormBook

Read More
Malicious npm Package Wipes Codebases with Remote Trigger

An npm supply chain attack involved a malicious typosquatting package named xlsx-to-json-lh, which impersonated the legitimate xlsx-to-json-lc package by differing by one letter. This malware maintained a persistent connection to a command and control server and could delete entire project directories on command, remaining undetected for six years. #xlsx-to-json-lh #leonhard #npm #supplychainattack

Read More
Monkey-Patched PyPI Packages Use Transitive Dependencies to Steal Solana Private Keys

A threat actor using the alias cappership executed a supply chain attack on PyPI by embedding a key-stealing payload within the semantic-types package and related dependencies, affecting thousands of Solana developers. The malware exfiltrates private keys via encrypted transactions on Solana Devnet, making detection difficult due to its stealthy runtime monkey patching and use of legitimate blockchain channels. #semantic-types #cappership #SolanaDevnet

Read More