Threat Actor: North Korean Hackers | North Korean Hackers
Victim: iOS and Android Users | iOS and Android Users
Price: Not disclosed
Exfiltrated Data Type: Personal and financial information
Key Points :
- North Korean hackers are utilizing a new backdoor known as VeilShell in their cyber attacks.
- The attacks are stealthy and target both iOS and Android platforms.
- This campaign is part of a broader strategy to compromise users’ personal and financial data.
Threat Actor: FIN7 | FIN7
Victim: Users of fraudulent trading apps | Users of fraudulent trading apps
Price: Not disclosed
Exfiltrated Data Type: Financial data
Key Points :
- FIN7 is hosting honeypot domains that utilize malicious AI DeepNude Generators.
- The fraudulent trading app targets both iOS and Android users.
- This operation is part of a larger scheme known as “Pig Butchering,” which aims to defraud users of their financial assets.
Threat Actor: Unknown | Unknown
Victim: Millions of Linux servers | Millions of Linux servers
Price: Not disclosed
Exfiltrated Data Type: System credentials and sensitive data
Key Points :
- A stealthy malware named perfctl is targeting millions of Linux servers.
- This malware is designed to remain undetected while exfiltrating sensitive data.
- The attack highlights vulnerabilities in Linux server security measures.
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.
Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0
Threat Actors leverage Docker Swarm and Kubernetes to mine cryptocurrency at scale
Evolving Threats: The Rapid Rise of macOS Stealers
Crypto-Stealing Code Lurking in Python Package Dependencies
MDR in Action: Preventing The More_eggs Backdoor From Hatching
Fake browser updates spread updated WarmCookie malware
MASKDROID: Robust Android Malware Detection with Masked Graph Representations
An In-depth Analysis of a Nation-Sponsored Attack: Case Study and Cybersecurity Insights
Model X-Ray: Detection of Hidden Malware in AI Model Weights using Few Shot Learning
LEDA—Layered Event-Based Malware Detection Architecture
FIN7 hosting honeypot domains with malicious AI DeepNude Generators – New Silent Push research
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
perfctl: A Stealthy Malware Targeting Millions of Linux Servers SHROUDED#SLEEP: A **** Deep Dive into North Korea’s Ongoing Campaign Against Southeast Asia
Pig Butchering Alert: Fraudulent Trading App targeted iOS and Android users
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, malware)