Tag PowerShell

New Variant of Snake Keylogger Uses AutoIt Scripting to Bypass Detection

A new variant of the Snake Keylogger is intensifying its malicious activities, primarily targeting Windows users in countries including China, Turkey, Indonesia, Taiwan, and Spain. According to Fortinet FortiGuard Labs, this malware has been linked to over 280 million blocked infection attempts globally since the beginning of the year. Snake…

Read MoreNew Variant of Snake Keylogger Uses AutoIt Scripting to Bypass Detection

5 Ongoing Malware Campaigns in Q1 2025

The cybersecurity landscape has experienced notable turbulence in the first quarter of 2025, marked by intensifying attacks from cybercriminals employing innovative methods to breach defenses. This report highlights significant malware families and their corresponding analyses within controlled environments. One of the prominent threats this quarter is the NetSupport Remote Access…

Read More5 Ongoing Malware Campaigns in Q1 2025

EncryptHub Exploits Windows Zero-Day Vulnerability to Deploy Rhadamanthys and StealC Malware

Recent revelations indicate that the threat actor identified as EncryptHub has effectively taken advantage of a recently patched security vulnerability in Microsoft Windows, designated as a zero-day flaw, to deploy a range of malicious software. This includes information-stealing tools like Rhadamanthys and StealC, alongside traditional backdoor implementations, raising significant alarm…

Read MoreEncryptHub Exploits Windows Zero-Day Vulnerability to Deploy Rhadamanthys and StealC Malware

Brute-Force Attacks Target More Than 4,000 ISP IPs to Distribute Info Stealers and Cryptominers

Recent findings from the Splunk Threat Research Team reveal that Internet Service Providers (ISPs) in China and the West Coast of the United States are facing a widespread and sophisticated exploitation campaign. This initiative employs information-stealing malware and cryptocurrency mining software, targeting compromised hosts to gain unauthorized access. The report…

Read MoreBrute-Force Attacks Target More Than 4,000 ISP IPs to Distribute Info Stealers and Cryptominers

Earth Bogle Campaign Deploys NjRAT Trojan Across the Middle East and North Africa

A new cyber campaign known as Earth Bogle has emerged, showcasing the use of geopolitical themes to distribute the NjRAT remote access trojan across the Middle East and North Africa. This initiative underscores the evolving strategies employed by threat actors to exploit current events for malicious purposes. According to a…

Read MoreEarth Bogle Campaign Deploys NjRAT Trojan Across the Middle East and North Africa

Russian Hackers Utilize CVE-2025-26633 through MSC EvilTwin to Deploy SilentPrism and DarkWisp

Recent investigations have uncovered that a suspected Russian hacking group known as Water Gamayun, also recognized as EncryptHub or LARVA-208, is exploiting a zero-day vulnerability in Microsoft Windows. This exploitation targets organizations by deploying two new backdoor tools, SilentPrism and DarkWisp, following the patching of a significant security flaw in…

Read MoreRussian Hackers Utilize CVE-2025-26633 through MSC EvilTwin to Deploy SilentPrism and DarkWisp

CERT-UA Reports Cyberattacks on Ukrainian State Systems Utilizing WRECKSTEEL Malware

In a concerning revelation, the Computer Emergency Response Team of Ukraine (CERT-UA) has reported three cyberattacks targeting state administration and critical infrastructure. The objective of these attacks appears to be data theft from sensitive governmental entities. According to CERT-UA, the coordinated campaign utilized compromised email accounts to dispatch phishing emails.…

Read MoreCERT-UA Reports Cyberattacks on Ukrainian State Systems Utilizing WRECKSTEEL Malware

UAC-0226 Distributes GIFTEDCROOK Stealer through Malicious Excel Files Aimed at Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyber attacks targeting Ukrainian institutions through information-stealing malware. These coordinated assaults specifically aim at military units, law enforcement agencies, and local government bodies, particularly those positioned near Ukraine’s eastern border. The attack methodology involves the distribution of…

Read MoreUAC-0226 Distributes GIFTEDCROOK Stealer through Malicious Excel Files Aimed at Ukraine