In Other News: FBI Warns of BadBox 2, NSO Disputes WhatsApp Fine, 1,000 Leave CISA

This week’s cybersecurity updates highlight ongoing threats, including the BadBox 2 botnet targeting IoT devices and fraud associated with Hedera Hashgraph NFTs. Major organizations like the FBI, NSO Group, and Microsoft announced actions and initiatives to combat cyber threats and improve security resilience. #BadBox2 #NSOGroup #HederaHashgraph #CISA #MicrosoftEuropeanSecurity…

Read More
Destructive npm Packages Disguised as Utilities Enable Remote System Wipe

Two malicious npm packages, express-api-sync and system-health-sync-api, contain backdoors designed to wipe out entire production environments when triggered. These packages use hidden endpoints, cross-platform destruction commands, and covert email communication channels to gather intelligence and execute system destruction. #express-api-sync #system-health-sync-api #botsailer #npm

Read More
BladedFeline: Whispering in the dark

In 2024, ESET researchers identified BladedFeline, an Iran-aligned APT group active since 2017, targeting Kurdish and Iraqi government officials with advanced malware including the Whisper backdoor and PrimeCache IIS module. The group is assessed as a subgroup of OilRig, utilizing sophisticated tools and maintaining long-term access for cyberespionage purposes. #BladedFeline #Whisper #PrimeCache #OilRig

Read More
Infostealers Crash Course: A Tradecraft Tuesday Recap

Infostealers have become a significant cyber threat, accounting for almost a quarter of all incidents detected by Huntress in 2024, by harvesting sensitive credentials and data that fuel ransomware, extortion, and identity theft attacks. The evolution of infostealers, their targeting of diverse information including corporate credentials and cloud keys, and the law enforcement takedowns of related marketplaces highlight both the risks and ongoing efforts to combat these threats. #Infostealers #LummaStealer #RedLine #BansheeStealer

Read More
DuplexSpy RAT: Stealthy Windows Malware Enabling Full Remote Control and Surveillance

DuplexSpy RAT is a multifunctional remote access trojan with advanced capabilities including surveillance, persistence, and stealth through fileless execution and privilege escalation. Despite being released for educational purposes, its modular design and open-source availability pose significant risks of malicious exploitation. #DuplexSpyRAT #ISSAC #WindowsUpdate

Read More
Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands

Bitter is a state-backed hacking group believed to be operating on behalf of Indian intelligence, focusing on espionage against government and diplomatic targets. Their operations include spear-phishing, malware deployment, and targeted campaigns across South Asia and expanding to other regions like Turkey. #Bitter #APT-C-08 #IndianGovernment #Espionage #ThreatActors…

Read More
Ukrainian police arrest hacker who used hosting firm’s servers to mine cryptocurrency

Ukrainian police and Europol have arrested a man accused of hacking into over 5,000 user accounts of an international hosting provider to conduct illegal cryptocurrency mining, resulting in $4.5 million in losses. The suspect, active since 2018, used malicious tools and maintained multiple accounts on hacker forums, evading detection by frequently…

Read More
The Bitter End: Unraveling Eight Years of Espionage Antics—Part One

TA397 is a state-backed espionage group likely operating on behalf of the Indian state, targeting government and defense organizations primarily in Europe and Asia with interests in China and neighboring countries. The group uses spearphishing emails, scheduled tasks, and various malware payloads to conduct intelligence gathering, exhibiting consistent infrastructure activity within…

Read More
This makes audits stupidly easy

Vanta is a tool that automates cybersecurity compliance by integrating with your tech stack and mapping systems to over 35 security frameworks like SOX 2, ISO 27001, and GDPR. It streamlines evidence gathering, risk management, and policy tracking, reducing manual effort and improving security posture. #GDPR #ISO27001

Read More
Hacker targets other hackers and gamers with backdoored GitHub code

A group of malicious GitHub repositories are distributing hidden backdoors and malware, targeting hackers, gamers, and researchers with fake exploits, game cheats, and remote access tools like Sakura RAT. Sophos researchers uncovered a coordinated campaign involving automated commits and obfuscated payloads designed to infect devices and steal data. #SakuraRAT #GitHubBackdoors

Read More
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks

Multiple malicious packages in npm, Python, and Ruby repositories are exploiting supply chain vulnerabilities to steal cryptocurrency funds, exfiltrate data, and delete codebases. These threats leverage geopolitical events, typosquatting, and AI model abuse to infect development environments and targets worldwide. #Fastlane #PyPI #cryptocurrencyheist…

Read More
ViperSoftX Stealing Cryptocurrencies

The ViperSoftX threat actor continues to distribute malware targeting cryptocurrency users, employing PowerShell scripts to install remote access tools and steal sensitive wallet information. The malware uses various infection methods, including disguised illegal software, and implements clipboard monitoring to capture cryptocurrency-related data. #ViperSoftX #QuasarRAT #PureCrypter #PureHVNC #ClipBanker…

Read More