#DriverScam

๐Ÿ›ก H3lium@infosec.exchange/:~# :blinking_cursor:โ€‹H3liumb0y@infosec.exchange
2024-01-23

"โš ๏ธ Chae$ 4.1: Taunting direct message to researchers at Morphisec within the source code. โš ๏ธ"

The original Chae$ malware was identified in September 2023, and its latest version, dubbed Chae$ 4.1, employs advanced code polymorphism to bypass antivirus detection. It also includes a direct message to Morphisec researchers thanking them for their effort and hoping not to disappoint.

That's got to sting...

๐Ÿ›ก๏ธ๐Ÿ’ป๐Ÿ”’

Source: Hackread by Deeba Ahmed

Tags: #CyberSecurity #MalwareAlert #Chae$Malware #Morphisec #AdvancedThreats #InfoSecCommunity #DriverScam #DataProtection #UserAwareness ๐Ÿšจ๐ŸŒ๐Ÿ’ก

The image contains a screenshot with the following text;

print(โ€˜Dear, Mr. Arnold Osipov: ')
print ('')
print('We sincerely hope our efforts meet your expectations.') 
print('If you write a detailed analysis about our software, we will') 
print(โ€˜write better code based on these analysis.')
print ('')

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst