Tag Malware

Panchan: A Golang-based Peer-to-Peer Botnet Aiming at Linux Servers

Recently, cybersecurity researchers have identified a new Golang-based peer-to-peer (P2P) botnet, named Panchan, that has been actively targeting Linux servers within the education sector since its debut in March 2022. This malware exploits built-in concurrency features to enhance its propagation and deploy malicious modules, specifically by harvesting SSH keys to…

Read MorePanchan: A Golang-based Peer-to-Peer Botnet Aiming at Linux Servers

Hackers Concealed Malware Using Complex AI Code

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Attackers Conceal Malware Within Vector Image Rashmi Ramesh (rashmiramesh_) • September 24, 2025 Image: Shutterstock Recent findings indicate that hackers have utilized artificial intelligence-generated code to embed malware in a sophisticated phishing campaign, according to insights from Microsoft. This malware…

Read MoreHackers Concealed Malware Using Complex AI Code

Researchers Discover Kimusky Infra Targeting South Korean Politicians and Diplomats

The North Korean state-sponsored hacking group known as Kimusky has been implicated in a recent series of cyberattacks targeting political and diplomatic organizations within South Korea. This activity, which began in early 2022, has raised alarms in the cybersecurity community about the sophisticated tactics employed by the group. Kaspersky, a…

Read MoreResearchers Discover Kimusky Infra Targeting South Korean Politicians and Diplomats

Understanding How Interlock Ransomware Targets Healthcare Organizations

Ransomware incidents have surged dramatically within the healthcare sector, revealing critical vulnerabilities that threaten millions. Notably, UnitedHealth has reported that 190 million Americans suffered personal and healthcare data breaches due to a ransomware attack on Change Healthcare, nearly doubling earlier estimates. This incident underscores how ransomware can effectively compromise essential…

Read MoreUnderstanding How Interlock Ransomware Targets Healthcare Organizations

AsyncRAT Campaign Deploys Python Payloads and TryCloudflare Tunnels for Stealthy Attacks

Recent investigations have revealed a sophisticated malware campaign deploying a remote access trojan (RAT) called AsyncRAT, utilizing Python payloads and TryCloudflare tunnels for distribution. Forcepoint X-Labs researcher Jyotika Singh indicated that AsyncRAT capitalizes on the async/await programming model, allowing attackers to covertly access and manipulate infected systems, exfiltrate data, and…

Read MoreAsyncRAT Campaign Deploys Python Payloads and TryCloudflare Tunnels for Stealthy Attacks

Chinese Hackers Employ Stealthy Infection Chain to Deploy LODEINFO Malware

A recently reported cybersecurity incident has revealed a stealthy infection chain employed by the Chinese state-sponsored group known as Stone Panda. This threat actor has been targeting various entities in Japan, including media outlets, governmental and public sector organizations, as well as think tanks, raising alarms about the potential risk…

Read MoreChinese Hackers Employ Stealthy Infection Chain to Deploy LODEINFO Malware

Russian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

A new variant of data-wiping malware, identified as CryWiper, has emerged and is specifically targeting Russian government institutions, such as mayoral offices and courthouses. Unlike traditional ransomware that encrypts data, CryWiper masquerades as ransomware but ultimately destroys data without providing any means of recovery. Kaspersky researchers Fedor Sinitsyn and Janis…

Read MoreRussian Courts Under Threat from CryWiper Data Wiper Malware Disguised as Ransomware

Hackers Exploit Legitimate GitHub Codespaces Feature to Distribute Malware

Recent research has highlighted concerning vulnerabilities within GitHub Codespaces, specifically the potential for threat actors to exploit its legitimate features to distribute malware. GitHub Codespaces, a cloud-based development environment, allows users to write, debug, and commit code changes from a browser or integrated within Visual Studio Code. Among its functionalities…

Read MoreHackers Exploit Legitimate GitHub Codespaces Feature to Distribute Malware

Hackers Breach 18 NPM Packages in Supply Chain Attack

Relevant topics include Third Party Risk Management, Cryptocurrency Fraud, and Fraud Management & Cybercrime. Developer Compromised by Phishing Attack Involving a Malicious Email Authored by Akshaya Asokan (asokan_akshaya), David Perera (@daveperera) • September 9, 2025 Image: Shutterstock An attacker compromised 18 widely-used npm packages by embedding cryptocurrency theft malware after…

Read MoreHackers Breach 18 NPM Packages in Supply Chain Attack