Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape
Malware Newsletter
Astaroth: Banking Trojan Abusing GitHub for Resilience
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
New Rust Malware “ChaosBot” Uses Discord for Command and Control
Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org
When the monster bytes: tracking TA585 and its arsenal
TigerJack’s Extensions Continue to Rob Developers Blind Across Different Marketplaces
LinkPro: eBPF rootkit analysis
New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits
Jewelbug: Chinese APT Group Widens Reach to Russia
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains
Operation MotorBeacon : Threat Actor targets Russian Automotive Sector using .NET Implant
BeaverTail and OtterCookie evolve with a new Javascript module
Operation Silk Lure: Scheduled Tasks Weaponized for DLL Side-Loading (drops ValleyRAT)
Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia
Applying Graph Analysis for Unsupervised Fast Malware Fingerprinting
Quantum Computing Methods for Malware Detection
A Railway Mobile Terminal Malware Detection Method Based on SE-ResNet
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, newsletter)
Laisser un commentaire