home.social

#malware — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #malware, aggregated by home.social.

  1. Hackers are using fake job interview apps to spread new malware across macOS and Windows systems, stealing crypto, browser credentials, and more disguising itself as a video meeting app.

    Read more: hackread.com/fake-job-intervie

  2. Hackers are using fake job interview apps to spread new #JobStealer malware across macOS and Windows systems, stealing crypto, browser credentials, and more disguising itself as a video meeting app.

    Read more: hackread.com/fake-job-intervie

    #CyberSecurity #Malware #macOS #Windows #Crypto #Scam

  3. 📢⚠️ China-linked hacking group targeted an oil and gas firm in using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.

    Read: hackread.com/famoussparrow-oil

  4. 📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.

    Read: hackread.com/famoussparrow-oil

    #CyberSecurity #China #MSExchange #Malware #CyberAttack

  5. 📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.

    Read: hackread.com/famoussparrow-oil

    #CyberSecurity #China #MSExchange #Malware #CyberAttack

  6. 📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.

    Read: hackread.com/famoussparrow-oil

    #CyberSecurity #China #MSExchange #Malware #CyberAttack

  7. 📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.

    Read: hackread.com/famoussparrow-oil

    #CyberSecurity #China #MSExchange #Malware #CyberAttack

  8. Foxconn-Werke in Nordamerika von Ransomware-Gruppe Nitrogen angegriffen

    Der Auftragsfertiger bestätigt den Cyberangriff. Nitrogen prahlt damit, 11 Millionen Dateien zu Apple, Nvidia und weiteren Kunden gestohlen haben.

    heise.de/news/Foxconn-Werke-in

    #Foxconn #IT #Malware #Security #Wirtschaft #news

  9. Foxconn-Werke in Nordamerika von Ransomware-Gruppe Nitrogen angegriffen

    Der Auftragsfertiger bestätigt den Cyberangriff. Nitrogen prahlt damit, 11 Millionen Dateien zu Apple, Nvidia und weiteren Kunden gestohlen haben.

    heise.de/news/Foxconn-Werke-in

    #Foxconn #IT #Malware #Security #Wirtschaft #news

  10. Foxconn-Werke in Nordamerika von Ransomware-Gruppe Nitrogen angegriffen

    Der Auftragsfertiger bestätigt den Cyberangriff. Nitrogen prahlt damit, 11 Millionen Dateien zu Apple, Nvidia und weiteren Kunden gestohlen haben.

    heise.de/news/Foxconn-Werke-in

    #Foxconn #IT #Malware #Security #Wirtschaft #news

  11. Foxconn-Werke in Nordamerika von Ransomware-Gruppe Nitrogen angegriffen

    Der Auftragsfertiger bestätigt den Cyberangriff. Nitrogen prahlt damit, 11 Millionen Dateien zu Apple, Nvidia und weiteren Kunden gestohlen haben.

    heise.de/news/Foxconn-Werke-in

    #Foxconn #IT #Malware #Security #Wirtschaft #news

  12. 📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.

    Read: hackread.com/chinatwill-typhoo

    #CyberSecurity #CyberAttack #Apple #Yahoo #Malware

  13. 📢⚠️ A new China-linked hacking group is using fake Apple and Yahoo domains along with trusted tools to spy on organizations across Japan and the Asia-Pacific region.

    Read: hackread.com/chinatwill-typhoo

  14. 📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.

    Read: hackread.com/chinatwill-typhoo

    #CyberSecurity #CyberAttack #Apple #Yahoo #Malware

  15. 📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.

    Read: hackread.com/chinatwill-typhoo

    #CyberSecurity #CyberAttack #Apple #Yahoo #Malware

  16. 📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.

    Read: hackread.com/chinatwill-typhoo

    #CyberSecurity #CyberAttack #Apple #Yahoo #Malware

  17. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  18. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  19. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  20. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  21. Python Backdoor Threat Analysis Following an AI Deepfake Impersonation Campaign

    A sophisticated campaign linked to APT37 delivers Python-based backdoors through spear-phishing emails containing malicious LNK files disguised as legitimate documents. Attackers use themes including airline e-tickets, North Korea research invitations, and impersonation of defense and police officials to induce execution. The LNK files employ environment variable-based obfuscation techniques to download additional BAT files, which establish a Python runtime environment and execute compiled Python bytecode disguised with .cat extensions. The malware functions as a remote command execution backdoor, communicating with C2 servers to receive commands and exfiltrate results. Persistence is maintained through scheduled tasks executing at one-minute intervals. The campaign shows strong tactical similarities to previous APT37 operations, including infrastructure patterns, script obfuscation methods, and the abuse of legitimate tools.

    Pulse ID: 6a04a9a090a64de310cb0568
    Pulse Link: otx.alienvault.com/pulse/6a04a
    Pulse Author: AlienVault
    Created: 2026-05-13 16:41:04

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #APT37 #BackDoor #CyberSecurity #Email #InfoSec #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #Python #RAT #RemoteCommandExecution #SpearPhishing #bot #AlienVault

  22. The other day I was asked to help clean a wordpress installation that had unwanted visitors. It was a fun journey looking through the backdoor code and a wrote a small piece about it here:
    schulz.dk/2026/05/14/the-wordp
    WP is great for many things but so wide-spread that bad actors will try to find holes in it.
    #wordpress #infosec #security #malware @blog #blogpost #php #code #backdoor #walkthrough

  23. The other day I was asked to help clean a wordpress installation that had unwanted visitors. It was a fun journey looking through the backdoor code and a wrote a small piece about it here:
    schulz.dk/2026/05/14/the-wordp
    WP is great for many things but so wide-spread that bad actors will try to find holes in it.
    #wordpress #infosec #security #malware @blog #blogpost #php #code #backdoor #walkthrough

  24. The other day I was asked to help clean a wordpress installation that had unwanted visitors. It was a fun journey looking through the backdoor code and a wrote a small piece about it here:
    schulz.dk/2026/05/14/the-wordp
    WP is great for many things but so wide-spread that bad actors will try to find holes in it.
    #wordpress #infosec #security #malware @blog #blogpost #php #code #backdoor #walkthrough

  25. The other day I was asked to help clean a wordpress installation that had unwanted visitors. It was a fun journey looking through the backdoor code and a wrote a small piece about it here:
    schulz.dk/2026/05/14/the-wordp
    WP is great for many things but so wide-spread that bad actors will try to find holes in it.
    #wordpress #infosec #security #malware @blog #blogpost #php #code #backdoor #walkthrough

  26. The other day I was asked to help clean a wordpress installation that had unwanted visitors. It was a fun journey looking through the backdoor code and a wrote a small piece about it here:
    schulz.dk/2026/05/14/the-wordp
    WP is great for many things but so wide-spread that bad actors will try to find holes in it.
    #wordpress #infosec #security #malware @blog #blogpost #php #code #backdoor #walkthrough