Tag Kaspersky

Popular Daemon Tools Disk Application Compromised in Month-Long Supply Chain Attack

Recent Cyberattack Targets Dozens of Organizations with Sophisticated Backdoors In a concerning development within the cybersecurity landscape, a follow-on payload identified by Kaspersky as a “minimalistic backdoor” has infiltrated nearly a dozen organizations. This malware possesses capabilities to execute commands, download files, and deploy shellcode within memory, complicating detection efforts…

Read MorePopular Daemon Tools Disk Application Compromised in Month-Long Supply Chain Attack

New Vulnerabilities Discovered in Leading Antivirus Software Could Increase Computer Risks

Security Vulnerabilities Discovered in Popular Antivirus Solutions, Risking System Integrity Cybersecurity experts have recently uncovered significant security vulnerabilities in widely-used antivirus software, potentially allowing attackers to escalate privileges and solidify malware presence on compromised systems. A report from CyberArk researcher Eran Shimony, shared with The Hacker News, highlights the critical…

Read MoreNew Vulnerabilities Discovered in Leading Antivirus Software Could Increase Computer Risks

Microsoft Windows Flaw Used to Launch PipeMagic RansomExx Malware

Cybersecurity researchers have revealed that threat actors are exploiting a now-patched vulnerability in Microsoft Windows to deploy the PipeMagic malware during RansomExx ransomware attacks. This exploitation hinges on CVE-2025-29824, a privilege escalation vulnerability affecting the Windows Common Log File System (CLFS), which Microsoft addressed in April 2025, according to a report from Kaspersky and BI.ZONE. First identified in 2022, PipeMagic has been utilized in RansomExx attacks targeting industrial sectors in Southeast Asia, functioning as a backdoor that allows remote access and execution of various commands on compromised systems. Past incidents have shown attackers exploiting CVE-2017-0144, a remote code execution vulnerability in Windows SMB, to breach victim networks. Notably, infection chains observed in October 2024 in Saudi Arabia were linked to a fraudulent OpenAI ChatGPT application.

Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware On August 18, 2025, cybersecurity experts revealed that threat actors exploited a recently patched vulnerability in Microsoft Windows to distribute the PipeMagic malware within RansomExx ransomware operations. This malicious activity specifically took advantage of CVE-2025-29824, a privilege escalation flaw affecting the…

Read More

Microsoft Windows Flaw Used to Launch PipeMagic RansomExx Malware

Cybersecurity researchers have revealed that threat actors are exploiting a now-patched vulnerability in Microsoft Windows to deploy the PipeMagic malware during RansomExx ransomware attacks. This exploitation hinges on CVE-2025-29824, a privilege escalation vulnerability affecting the Windows Common Log File System (CLFS), which Microsoft addressed in April 2025, according to a report from Kaspersky and BI.ZONE. First identified in 2022, PipeMagic has been utilized in RansomExx attacks targeting industrial sectors in Southeast Asia, functioning as a backdoor that allows remote access and execution of various commands on compromised systems. Past incidents have shown attackers exploiting CVE-2017-0144, a remote code execution vulnerability in Windows SMB, to breach victim networks. Notably, infection chains observed in October 2024 in Saudi Arabia were linked to a fraudulent OpenAI ChatGPT application.

New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Techniques

August 19, 2025
Malware / Cyber Attack

Financial institutions, particularly trading and brokerage firms, are currently facing a new threat from a remote access trojan known as GodRAT. According to Kaspersky researcher Saurabh Sharma, this malware is spread through malicious .SCR (screen saver) files disguised as financial documents sent via Skype Messenger. Active as recently as August 12, 2025, the attacks utilize steganography to hide shellcode within image files, enabling the download of the malware from a command-and-control (C2) server. Since September 9, 2024, these screen saver artifacts have targeted regions including Hong Kong, the United Arab Emirates, Lebanon, Malaysia, and Jordan. Based on Gh0st RAT, GodRAT employs a plugin-based architecture to enhance its capabilities for gathering sensitive information and delivering additional payloads like AsyncRAT.

Emerging GodRAT Trojan Targets Trading Firms with Steganographic Techniques On August 19, 2025, cybersecurity firm Kaspersky disclosed a significant new threat affecting trading and brokerage firms: a remote access Trojan (RAT) dubbed GodRAT. This new malware leverages a technique known as steganography to conceal its malicious code within image files,…

Read More

New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Techniques

August 19, 2025
Malware / Cyber Attack

Financial institutions, particularly trading and brokerage firms, are currently facing a new threat from a remote access trojan known as GodRAT. According to Kaspersky researcher Saurabh Sharma, this malware is spread through malicious .SCR (screen saver) files disguised as financial documents sent via Skype Messenger. Active as recently as August 12, 2025, the attacks utilize steganography to hide shellcode within image files, enabling the download of the malware from a command-and-control (C2) server. Since September 9, 2024, these screen saver artifacts have targeted regions including Hong Kong, the United Arab Emirates, Lebanon, Malaysia, and Jordan. Based on Gh0st RAT, GodRAT employs a plugin-based architecture to enhance its capabilities for gathering sensitive information and delivering additional payloads like AsyncRAT.

NSA Identifies New Vulnerabilities in Microsoft Exchange Servers

April 14, 2021

In its April update, Microsoft addressed a total of 114 security vulnerabilities, including one actively exploited zero-day flaw and four remote code execution issues within Exchange Server. Among these vulnerabilities, 19 are classified as Critical, 88 as Important, and one as Moderate. Notably, CVE-2021-28310 is a privilege escalation vulnerability within Win32k, currently under active exploitation, allowing attackers to execute malicious code and gain elevated privileges on affected systems. Cybersecurity firm Kaspersky, which reported the flaw to Microsoft in February, connected the zero-day exploit to the Bitter APT group, known for utilizing a similar vulnerability (CVE-2021-1732) in attacks last year. “This is an escalation of privilege (EoP) exploit likely used in conjunction with other browser exploits to bypass sandboxes or obtain system privileges for further access,” explained Kaspersky researcher Boris Larin.

NSA Uncovers New Vulnerabilities Impacting Microsoft Exchange Servers April 14, 2021 In a recent wave of updates, Microsoft addressed a total of 114 security vulnerabilities, prominent among them being a zero-day exploit and multiple remote code execution issues affecting Microsoft Exchange Servers. This April patch release is significant, as it…

Read More

NSA Identifies New Vulnerabilities in Microsoft Exchange Servers

April 14, 2021

In its April update, Microsoft addressed a total of 114 security vulnerabilities, including one actively exploited zero-day flaw and four remote code execution issues within Exchange Server. Among these vulnerabilities, 19 are classified as Critical, 88 as Important, and one as Moderate. Notably, CVE-2021-28310 is a privilege escalation vulnerability within Win32k, currently under active exploitation, allowing attackers to execute malicious code and gain elevated privileges on affected systems. Cybersecurity firm Kaspersky, which reported the flaw to Microsoft in February, connected the zero-day exploit to the Bitter APT group, known for utilizing a similar vulnerability (CVE-2021-1732) in attacks last year. “This is an escalation of privilege (EoP) exploit likely used in conjunction with other browser exploits to bypass sandboxes or obtain system privileges for further access,” explained Kaspersky researcher Boris Larin.

Newly Decoded Sabotage Malware May Have Aimed at Iran’s Nuclear Program—Predating Stuxnet

Recent analysis by cybersecurity experts has revealed the emergence of a sophisticated piece of malware known as Fast16, which operates with self-replicating capabilities resembling those of a worm. This code is particularly alarming due to its ability to propagate through network shares on Windows systems. According to findings, Fast16 utilizes…

Read MoreNewly Decoded Sabotage Malware May Have Aimed at Iran’s Nuclear Program—Predating Stuxnet

miniFlame: Newly Uncovered Cyber Espionage Malware

October 15, 2012

Kaspersky has revealed a new cyber espionage malware called “miniFlame,” which is directly associated with the infamous Flame malware. This latest sophisticated tool, linked to previous espionage software known as Flame and Gauss, functions as a “high-precision surgical attack” mechanism aimed at targets in Lebanon, Iran, and other regions.

Identified by Kaspersky Lab experts in July 2012, miniFlame, also referred to as SPE, was initially recognized as a component of Flame. It appears to be deployed to enhance spying capabilities on computers that have already been infected with Flame and Gauss. Analysis indicates that some variants of miniFlame were developed in 2010 and 2011, with several still active today. Development of this malicious software could date back to as early as 2007. “MiniFlame is a high precision attack tool,” stated Alexander Gostev, Chief Security Expert at Kaspersky.

Discovery of miniFlame Malware Marks a New Era in Cyber Espionage On October 15, 2012, cybersecurity firm Kaspersky Lab revealed the emergence of a new type of malware known as miniFlame. Directly associated with the more notorious Flame malware, miniFlame represents a sophisticated cyber espionage tool that has been linked…

Read More

miniFlame: Newly Uncovered Cyber Espionage Malware

October 15, 2012

Kaspersky has revealed a new cyber espionage malware called “miniFlame,” which is directly associated with the infamous Flame malware. This latest sophisticated tool, linked to previous espionage software known as Flame and Gauss, functions as a “high-precision surgical attack” mechanism aimed at targets in Lebanon, Iran, and other regions.

Identified by Kaspersky Lab experts in July 2012, miniFlame, also referred to as SPE, was initially recognized as a component of Flame. It appears to be deployed to enhance spying capabilities on computers that have already been infected with Flame and Gauss. Analysis indicates that some variants of miniFlame were developed in 2010 and 2011, with several still active today. Development of this malicious software could date back to as early as 2007. “MiniFlame is a high precision attack tool,” stated Alexander Gostev, Chief Security Expert at Kaspersky.

ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Vulnerabilities, Docker Breach, and 15 Additional Stories

In an era where technology often blurs the line between benign and harmful use, cybersecurity challenges are evolving rapidly. Recent insights reveal a trend where cyber adversaries engage in more subtle exploitation tactics, seamlessly integrating malicious activities within widely used tools, applications, and AI systems. The once-clear narratives of “hacker”…

Read MoreThreatsDay Bulletin: Stealth Loaders, AI Chatbot Vulnerabilities, Docker Breach, and 15 Additional Stories

WannaCry Kill Switch Activated? The Threat Isn’t Over—Introducing WannaCry 2.0 Ransomware!

WannaCry Ransomware Attack: Update on the Ongoing Threat In recent days, the cybersecurity community has been closely monitoring the developments surrounding the WannaCry ransomware. While initial reports indicated that a 22-year-old British security researcher successfully deployed a “kill switch” to halt the spread of the malware, the reality is more…

Read MoreWannaCry Kill Switch Activated? The Threat Isn’t Over—Introducing WannaCry 2.0 Ransomware!