home.social

#cryptocti — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cryptocti, aggregated by home.social.

  1. Salat Malware Uses Multiple Persistant Methods With Stealthy C2 Server

    A new windows malware family named as Salat Stealer has been discoverd. It acts as a legitimate system process including explorer.exe, svchost.exe or Isass.exe. It supports to exfiltrate user sensitive data and critical credentials via HTTP/3 based Command and Control server.

    Pulse ID: 69fbf302ea01bd20e28b040a
    Pulse Link: otx.alienvault.com/pulse/69fbf
    Pulse Author: cryptocti
    Created: 2026-05-07 02:03:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #HTTP #InfoSec #Malware #OTX #OpenThreatExchange #RAT #Windows #bot #cryptocti

  2. Salat Malware Uses Multiple Persistant Methods With Stealthy C2 Server

    A new windows malware family named as Salat Stealer has been discoverd. It acts as a legitimate system process including explorer.exe, svchost.exe or Isass.exe. It supports to exfiltrate user sensitive data and critical credentials via HTTP/3 based Command and Control server.

    Pulse ID: 69fbf302ea01bd20e28b040a
    Pulse Link: otx.alienvault.com/pulse/69fbf
    Pulse Author: cryptocti
    Created: 2026-05-07 02:03:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #HTTP #InfoSec #Malware #OTX #OpenThreatExchange #RAT #Windows #bot #cryptocti

  3. Salat Malware Uses Multiple Persistant Methods With Stealthy C2 Server

    A new windows malware family named as Salat Stealer has been discoverd. It acts as a legitimate system process including explorer.exe, svchost.exe or Isass.exe. It supports to exfiltrate user sensitive data and critical credentials via HTTP/3 based Command and Control server.

    Pulse ID: 69fbf302ea01bd20e28b040a
    Pulse Link: otx.alienvault.com/pulse/69fbf
    Pulse Author: cryptocti
    Created: 2026-05-07 02:03:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #HTTP #InfoSec #Malware #OTX #OpenThreatExchange #RAT #Windows #bot #cryptocti

  4. Salat Malware Uses Multiple Persistant Methods With Stealthy C2 Server

    A new windows malware family named as Salat Stealer has been discoverd. It acts as a legitimate system process including explorer.exe, svchost.exe or Isass.exe. It supports to exfiltrate user sensitive data and critical credentials via HTTP/3 based Command and Control server.

    Pulse ID: 69fbf302ea01bd20e28b040a
    Pulse Link: otx.alienvault.com/pulse/69fbf
    Pulse Author: cryptocti
    Created: 2026-05-07 02:03:46

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #HTTP #InfoSec #Malware #OTX #OpenThreatExchange #RAT #Windows #bot #cryptocti

  5. APT37 Targets Android Devices with BirdCall Malware

    Pulse ID: 69fba09cc8c1a2797734624e
    Pulse Link: otx.alienvault.com/pulse/69fba
    Pulse Author: cryptocti
    Created: 2026-05-06 20:12:12

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #Android #CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #bot #cryptocti

  6. CloudZ RAT Uses Pheno Plugin to Hijack SMS and OTPs

    Pulse ID: 69fb6028957faa5ed109be66
    Pulse Link: otx.alienvault.com/pulse/69fb6
    Pulse Author: cryptocti
    Created: 2026-05-06 15:37:12

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Cloud #CyberSecurity #InfoSec #OTX #OpenThreatExchange #RAT #SMS #bot #cryptocti

  7. Hackers Actively Exploit a RCE Vulnerability in Weaver E-Cology

    Pulse ID: 69fb5d03291405d941fbfd8d
    Pulse Link: otx.alienvault.com/pulse/69fb5
    Pulse Author: cryptocti
    Created: 2026-05-06 15:23:47

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #OTX #OpenThreatExchange #RCE #Vulnerability #bot #cryptocti

  8. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  9. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  10. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  11. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  12. DDoS Malware Exploiting Jenkins Servers to Attack Valve Source Gaming Infrastructure

    A newly discovered DDoS botnet campaign abuses exposed Jenkins servers with weak authentication to deliver Windows and Linux payloads. The malware turns compromised hosts into bots and targets Valve Source Engine game servers using UDP floods, TCP push attacks, HTTP floods and query-based amplification attacks.

    Pulse ID: 69f735ac2403f4a4cb9ca4c3
    Pulse Link: otx.alienvault.com/pulse/69f73
    Pulse Author: cryptocti
    Created: 2026-05-03 11:46:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #DDoS #DoS #HTTP #InfoSec #Linux #Malware #OTX #OpenThreatExchange #RCE #TCP #UDP #Windows #bot #botnet #cryptocti

  13. MiningDropper Android Malware Framework Spreads Infostealers, RATs and Banking Malware

    Mining Dropper is an android malware delivery framework used to mine cryptocurrency and for distributing infostealers, Remote Access Trojans and banking malware.

    Pulse ID: 69f10f6fb0cd7c248d2f4267
    Pulse Link: otx.alienvault.com/pulse/69f10
    Pulse Author: cryptocti
    Created: 2026-04-28 19:50:07

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #CyberSecurity #InfoSec #InfoStealer #Malware #OTX #OpenThreatExchange #RAT #RemoteAccessTrojan #Trojan #bot #cryptocurrency #cryptocti

  14. GlassWorm Malware Targets OpenVSX Extensions

    GlassWorm malware has re-emerged targeting OpenVSX ecosystem using 73 deceptive “sleeper” extensions that appears harmless and legitimate but when installed, they fetch and install malware through updates. The malware is capable of harvesting sensitive credential data, cryptocurrency wallets, and access tokens resulting a full system compromise.

    Pulse ID: 69f0fc82111cbf67484f0be4
    Pulse Link: otx.alienvault.com/pulse/69f0f
    Pulse Author: cryptocti
    Created: 2026-04-28 18:29:22

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Malware #OTX #OpenThreatExchange #Worm #bot #cryptocurrency #cryptocti

  15. MiningDropper Android Malware Framework Spreads Infostealers, RATs and Banking Malware

    Pulse ID: 69efe9be79a111a361b58652
    Pulse Link: otx.alienvault.com/pulse/69efe
    Pulse Author: cryptocti
    Created: 2026-04-27 22:57:02

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #CyberSecurity #InfoSec #InfoStealer #Malware #OTX #OpenThreatExchange #RAT #bot #cryptocti

  16. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec9743b876273d04a7efb0
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:19

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  17. Lazarus Group Targets macOS Users via ClickFlixAttack

    Lazarus Group uses ClickFixto trick macOS users into fake meeting pages and executing malicious commands.

    Pulse ID: 69ec976bddee2a8bbe864445
    Pulse Link: otx.alienvault.com/pulse/69ec9
    Pulse Author: cryptocti
    Created: 2026-04-25 10:28:59

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Lazarus #Mac #MacOS #OTX #OpenThreatExchange #bot #cryptocti

  18. CanisterWorm Supply Chain Attack via Compromised Accounts and Malicious Package Updates

    Pulse ID: 69ea7b8285a87fe7317d5d09
    Pulse Link: otx.alienvault.com/pulse/69ea7
    Pulse Author: cryptocti
    Created: 2026-04-23 20:05:22

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #OTX #OpenThreatExchange #SupplyChain #Worm #bot #cryptocti

  19. Mirai Campaign Exploits Command Injection Vulnerability in D-Link Routers

    Attackers are exploiting a command injection vulnerability in end of life D Link routers to deploy Mirai malware and expand botnet operations.

    Pulse ID: 69e95e18e14e580690a095ac
    Pulse Link: otx.alienvault.com/pulse/69e95
    Pulse Author: cryptocti
    Created: 2026-04-22 23:47:36

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Malware #Mirai #OTX #OpenThreatExchange #RAT #Vulnerability #bot #botnet #cryptocti

  20. SEO Poisoning Attack Abuses Microsoft Signed Binary for RMM Tool Installation

    SEO poisoning campaign has discovered impersonating legitimate open source data recovery tool named TestDisk. It silently installs ScreenConnect remote monitoring and management client to gain command execution, file transfer and lateral movement in the network.

    Pulse ID: 69e4d8e980b032626e88ccd8
    Pulse Link: otx.alienvault.com/pulse/69e4d
    Pulse Author: cryptocti
    Created: 2026-04-19 13:30:17

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Microsoft #OTX #OpenThreatExchange #RCE #SEOPoisoning #ScreenConnect #bot #cryptocti

  21. JanelaRAT an Advanced Banking Trojan Targeting Financial Users

    JanelaRAT is an evolving Remote Access Trojan targeting financial users in Latin America using multi stage infection chains, phishing and DLL sideloading to steal banking and cryptocurrency data while employing evasion, persistence and interactive techniques to bypass security controls.

    Pulse ID: 69e48460c771926e0e7231bc
    Pulse Link: otx.alienvault.com/pulse/69e48
    Pulse Author: cryptocti
    Created: 2026-04-19 07:29:36

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Bank #BankingTrojan #CyberSecurity #InfoSec #LatinAmerica #OTX #OpenThreatExchange #Phishing #RAT #RemoteAccessTrojan #SideLoading #Trojan #bot #cryptocurrency #cryptocti

  22. Mirax RAT Targeting Android via Meta Platforms

    Mirax is an Android RAT and banking malware sold via a restricted MaaS model.

    Pulse ID: 69e14ecdb23562115a20a74f
    Pulse Link: otx.alienvault.com/pulse/69e14
    Pulse Author: cryptocti
    Created: 2026-04-16 21:04:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #CyberSecurity #InfoSec #MaaS #Malware #OTX #OpenThreatExchange #RAT #bot #cryptocti

  23. Mirax RAT Targeting Android via Meta Platforms

    Mirax is an Android RAT and banking malware sold via a restricted MaaS model.

    Pulse ID: 69e14ecdb23562115a20a74f
    Pulse Link: otx.alienvault.com/pulse/69e14
    Pulse Author: cryptocti
    Created: 2026-04-16 21:04:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #CyberSecurity #InfoSec #MaaS #Malware #OTX #OpenThreatExchange #RAT #bot #cryptocti

  24. Mirax RAT Targeting Android via Meta Platforms

    Mirax is an Android RAT and banking malware sold via a restricted MaaS model.

    Pulse ID: 69e14ecdb23562115a20a74f
    Pulse Link: otx.alienvault.com/pulse/69e14
    Pulse Author: cryptocti
    Created: 2026-04-16 21:04:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #CyberSecurity #InfoSec #MaaS #Malware #OTX #OpenThreatExchange #RAT #bot #cryptocti

  25. Mirax RAT Targeting Android via Meta Platforms

    Mirax is an Android RAT and banking malware sold via a restricted MaaS model.

    Pulse ID: 69e14ecdb23562115a20a74f
    Pulse Link: otx.alienvault.com/pulse/69e14
    Pulse Author: cryptocti
    Created: 2026-04-16 21:04:13

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #Bank #CyberSecurity #InfoSec #MaaS #Malware #OTX #OpenThreatExchange #RAT #bot #cryptocti

  26. Fake Adobe Reader Installer Distributes ScreenConnect via Stealthy In-Memory Loader

    Pulse ID: 69e1417ff1733e4e30958f60
    Pulse Link: otx.alienvault.com/pulse/69e14
    Pulse Author: cryptocti
    Created: 2026-04-16 20:07:27

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Adobe #AdobeReader #CyberSecurity #InfoSec #OTX #OpenThreatExchange #ScreenConnect #bot #cryptocti

  27. Ransomware Actors Broaden Use of EDR Disabling Techniques Beyond Vulnerable Drivers

    EDR killers are widely used in ransomware intrusions to turn off security software before attacks, using methods like BYOVD (Bring Your Own Vulnerable Driver), driverless tools, scripts and anti rootkit utilities.

    Pulse ID: 69e1166fa36722489928aa73
    Pulse Link: otx.alienvault.com/pulse/69e11
    Pulse Author: cryptocti
    Created: 2026-04-16 17:03:43

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #EDR #InfoSec #OTX #OpenThreatExchange #RansomWare #Rootkit #bot #cryptocti

  28. MacOS Users Targeted with Malicious Ads

    Pulse ID: 660814c075108fd8cce84e36
    Pulse Link: otx.alienvault.com/pulse/66081
    Pulse Author: cryptocti
    Created: 2024-03-30 13:33:52

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #CyberSecurity #InfoSec #Mac #MacOS #MaliciousAds #OTX #OpenThreatExchange #bot #cryptocti