#Malware

Kevin Karhan :verified:kkarhan@infosec.space
2026-03-11

@GossiTheDog @xaitax if this isn't the final nail in the coffin to #BanWindows and espechally #Windows11 from any #IT then IDK what else would be sufficient…

2026-03-11

Meet #BeatBanker, a new Android Trojan that spreads through fake Google Play Store pages, and uses a silent audio loop to stay active while stealing cryptocurrency and banking data.

Read: hackread.com/beatbanker-androi

#CyberSecurity #Android #Malware #Crypto

What’s trending in cybersecurity today? Find out with the latest YouTube playlist we’ve curated. 👀 youtube.com/playlist?list=PLXq
#Malware #Phishing #IncidentResponse #CyberAwareness #AppSec

2026-03-11

Valse CleanMyMac-website installeert SHub Stealer en backdoors voor cryptovaluta-wallets | Malwarebytes

Pulse ID: 69b175e015961402a9e5f335
Pulse Link: otx.alienvault.com/pulse/69b17
Pulse Author: CyberHunter_NL
Created: 2026-03-11 14:02:08

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#BackDoor #CyberSecurity #InfoSec #Mac #MalWareBytes #Malware #OTX #OpenThreatExchange #bot #CyberHunter_NL

eddieozeddieoz
2026-03-11
Martin ReitsmaMartin63
2026-03-11

Russian hackers target HR departments with vicious new 'BlackSanta' malware
Russian hackers target HR departments with vicious new 'BlackSanta' malware

opr.news/1eedcf39260311en_us?l

Download Now
opr.as/share

TugaTech 🖥️tugatech@masto.pt
2026-03-11

Android é visado por novo malware BeatBanker disfarçado de aplicação da Starlink
🔗 tugatech.com.pt/t79958-android

#android #malware #starlink 

2026-03-11

Анатомия зловреда: разбираем логику работы хитрого вредоноса

Файл с именем как у фото из WhatsApp, расширение .pif вместо .jpg, и совершенно чистая репутация на VirusTotal. Внутри — четыре ступени тщательно спроектированной атаки: загрузчик с настоящим корпоративным EV-сертификатом, шеллкод, спрятанный в файле иконок, нестандартный TCP-протокол рукопожатия и в финале — классический китайский бэкдор PlugX/Gh0stRAT с полным контролем над системой. В этой статье я разбираю всю цепочку статическими методами на Linux, без запуска вредоноса. Никакой виртуальной машины с поведенческим анализом — только strings, pefile, ndisasm и Python. Там, где встречается ассемблерный код, объясняю что происходит обычным языком. Самое интересное: финальный бэкдор известен и описан, но инфраструктура доставки — домен, загрузчик, сертификат — нигде раньше не фигурировала.

habr.com/ru/articles/1009074/

#malware #статический_анализ #информационная_безопасность

PhishDestroy Alertphishdestroy
2026-03-11
Screenshot of phishing site
TugaTech 🖥️tugatech@masto.pt
2026-03-11

BlackSanta: o malware que ataca departamentos de RH e "limpa" o antivírus
🔗 tugatech.com.pt/t79956-blacksa

#malware 

2026-03-11

A new malware campaign called #BlackSanta is targeting HR staff with fake CV download links. The attack uses steganography and vulnerable drivers to disable security tools and search infected systems for sensitive data.

Read: hackread.com/blacksanta-malwar

#CyberSecurity #Malware #HR #Scam

2026-03-11

Recruiters are being targeted with malware-laced résumés — attackers know hiring inboxes are always open. Curiosity can be a compromise vector. 📄⚠️ #Malware #RecruitmentRisk

helpnetsecurity.com/2026/03/10

What’s trending in cybersecurity today? Find out with the latest YouTube playlist we’ve curated. 👀 youtube.com/playlist?list=PLXq
#Malware #Phishing #IncidentResponse #CyberAwareness #AppSec

PhishDestroy Alertphishdestroy
2026-03-11

🚨 PHISHING DETECTED 🚨

🔗 Suspicious URL: www[.]bxpro[.]cloud
🔍 Analysis at: urlscan.io/result/019cdc76-977

Screenshot of phishing site
2026-03-11

Iranian MOIS Actors & the Cyber Crime Connection

Iranian intelligence services are increasingly engaging with the cyber crime ecosystem, leveraging criminal tools, services, and operational models to support state objectives. This trend is particularly evident among actors linked to the Ministry of Intelligence and Security (MOIS), such as Void Manticore and MuddyWater. These actors are not merely imitating criminal behavior but actively associating with the cyber criminal ecosystem, using its infrastructure, malware, and affiliate-style relationships. This approach enhances their operational capabilities, complicates attribution, and contributes to confusion around Iranian threat activity. Examples include the use of ransomware branding, commercial infostealers, and overlaps with criminal malware clusters. This shift from imitation to active engagement with cyber crime offers both improved deniability and expanded technical capabilities for Iranian actors.

Pulse ID: 69b088d31d4ef8bf35564baa
Pulse Link: otx.alienvault.com/pulse/69b08
Pulse Author: AlienVault
Created: 2026-03-10 21:10:43

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #InfoStealer #Iran #Malware #MuddyWater #OTX #OpenThreatExchange #RAT #RansomWare #bot #AlienVault

2026-03-11

KadNap Malware Turning Asus Routers Into Botnets

A sophisticated new malware called KadNap has been discovered targeting Asus routers and conscripting them into a botnet for proxying malicious traffic. The malware employs a custom version of the Kademlia Distributed Hash Table protocol to conceal its command-and-control infrastructure within a peer-to-peer system, evading traditional network monitoring. The botnet, which has grown to over 14,000 infected devices, is marketed by a proxy service called Doppelganger, tailored for criminal activity. More than 60% of KadNap's victims are based in the United States. The malware demonstrates versatility by targeting various edge networking devices and employing different C2 servers for different victim types.

Pulse ID: 69b13da0db907023c1bfc480
Pulse Link: otx.alienvault.com/pulse/69b13
Pulse Author: AlienVault
Created: 2026-03-11 10:02:07

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #Doppelganger #Edge #InfoSec #Malware #OTX #OpenThreatExchange #Proxy #RAT #UnitedStates #bot #botnet #AlienVault

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst