SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 67

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape

Malware Newsletter

Astaroth: Banking Trojan Abusing GitHub for Resilience 

North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads

New Rust Malware “ChaosBot” Uses Discord for Command and Control 

Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org  

When the monster bytes: tracking TA585 and its arsenal

TigerJack’s Extensions Continue to Rob Developers Blind Across Different Marketplaces

LinkPro: eBPF rootkit analysis

New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware      

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits 

Jewelbug: Chinese APT Group Widens Reach to Russia

DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains  

Operation MotorBeacon : Threat Actor targets Russian Automotive Sector using .NET Implant

BeaverTail and OtterCookie evolve with a new Javascript module  

Operation Silk Lure: Scheduled Tasks Weaponized for DLL Side-Loading (drops ValleyRAT)

Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia  

Applying Graph Analysis for Unsupervised Fast Malware Fingerprinting

Quantum Computing Methods for Malware Detection

From Continuous Integer-Order to Fractional Discrete-Time: A New Computer Virus Model with Chaotic Dynamics

A Railway Mobile Terminal Malware Detection Method Based on SE-ResNet

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

Laisser un commentaire

Ce site utilise Akismet pour réduire les indésirables. En savoir plus sur la façon dont les données de vos commentaires sont traitées.