

Bleeping Computer
Atomic Stealer malware strikes macOS via fake browser updates
The 'ClearFake' fake browser update campaign has expanded to macOS, targeting Apple computers with Atomic Stealer (AMOS) malware.
Bleeping Computer
The 'ClearFake' fake browser update campaign has expanded to macOS, targeting Apple computers with Atomic Stealer (AMOS) malware.
The Hacker News
macOS users beware! Atomic Stealer, a $1,000/month malware, is now spreading through deceptive web browser updates via ClearFake.
Bleeping Computer
The Lumma information-stealer malware (aka 'LummaC2') is promoting a new feature that allegedly allows cybercriminals to restore expired Google cookies, which can be used to hijack Google accounts.
Bleeping Computer
The Lumma information-stealer malware (aka 'LummaC2') is promoting a new feature that allegedly allows cybercriminals to restore expired Google cookies, which can be used to hijack Google accounts.
Infosecurity News
Outpost24 explained the technique relies on trigonometry to discern genuine human behavior
Bleeping Computer
The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of mouse movements using trigonometry to determine if the malware is running on a real machine or an antivirus sandbox.
The Hacker News
New LummaC2 malware uses trigonometry-based tactic to differentiate between users and security systems, evading sandboxes and security analyses.
The Hacker News
Jupyter Infostealer is back with stealthy changes. Cyber attackers use manipulated SEO tactics to trick users into downloading malware.
Cyber Security News
MSIX packages can be distributed & installed without administrative privileges, allowing malicious software to traditional security controls.
CSO
The Ghostpulse loader, injected through MSIX packages, is a stealthy dropper that avoids detection by the victim’s scanners.
The Hacker News
Cyber criminals are using fake MSIX Windows app packages of popular software to deliver GHOSTPULSE malware loader
DarkReading
The ClearFake campaign uses fake browser updates to lure victims and spread RedLine, Amadey, and Lumma stealers.
Cyber Security News
“EtherHiding” which abuses Binance's Smart Chain (BSC) contracts to host parts of a malicious code chain to hide them inside the blockchain.
The Hacker News
Malicious actors are using Binance's Smart Chain (BSC) contracts to host malicious code and serve it on compromised WordPress
Trend Micro
This blog discusses how threat actors abuse Discord’s content delivery network (CDN) to host and spread Lumma Stealer, and talks about added capabilities to the information stealing malware.
The Hacker News
Ever heard of an IP address in hexadecimal notation? It's the latest disguise hackers use to deploy DDoS malware on Linux systems.
Cyber Security News
In the cybercrime landscape, researchers at Securelist have also reported on new Lumma stealer and Zanubis Android banking malware versions.
The Hacker News
Cybercriminals are currently employing ASMCrypt, an advanced iteration of DoubleFinger, to evade detection by security tools.
The Hacker News
Using Bing Chat? Stay alert! Researchers reveal malicious ads lurking in Bing's AI chatbot, leading users to install malware unknowingly.
Infosecurity News
The Trojan utilizes the Obfuscapk obfuscator for Android APK files, Kaspersky explained
The Hacker News
⚠️ Beware of ZenRAT! This new modular malware strain targets Windows users through trojanized Bitwarden installers.
The Hacker News
A new variant of the Xenomorph Banking Trojan has been uncovered, targeting 35+ U.S. financial institutions.
Cyber Security News
An unrecorded .NET Loader was identified during routine threat hunting that downloads, decrypts, and executes a malicious payloads.
The Hacker News
BlackCat ransomware now spreading via malvertising! Watch out for rogue installers disguised as legitimate apps like WinSCP.
The Hacker News
A new report has revealed the advanced techniques used by threat actors to deliver the Aurora information stealer malware through the in2al5d p3in4er
The Hacker News
New CryptoClippy malware steals cryptocurrency by replacing wallet addresses during transactions.
CSO
The new malware loader can give attackers remote access and the ability to deliver other payloads.
The Hacker News
A fake ChatGPT Chrome browser extension has been found to hijack Facebook accounts and create rogue admin accounts.
The Hacker News
Threat actors have been using AI-generated YouTube Videos to spread stealer malware such as Raccoon, RedLine, and Vidar.
The Record
Cyble says cybercriminals are setting up phishing websites that mimic the branding of ChatGPT, an AI tool that has exploded in popularity.
Infosecurity News
Fake pages designed to steal credit card information and install malware
Bleeping Computer
Threat actors are actively exploiting the popularity of OpenAI's ChatGPT AI tool to distribute Windows malware, infect Android devices with spyware, or direct unsuspecting victims to phishing pages.