SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 92

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape

Thirty-Six Malicious npm Strapi Packages Deploy Redis RCE, Database Theft, and Persistent C2  

Malicious LNK Files Distributing a Python-Based Backdoor and Changes in Distribution Techniques (Kimsuky Group)  

Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy Botnet  

Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities  

Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy Botnet

Masjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT Evasion

EXPMON detected sophisticated zero-day fingerprinting attack targeting Adobe Reader users      

New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations     

Critical Supply Chain Compromise in Smart Slider 3 Pro: Full Malware Analysis  

GlassWorm goes native: New Zig dropper infects every IDE on your machine  

ClickFix malware hits DoD cybersecurity vendor homepage  

Beyond BITTER: MENA Civil Society Targeted in Hack-For-Hire Operation Linked to BITTER APT  

Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box Threats

Explainability-Guided Adversarial Attacks on Transformer-Based Malware Detectors Using Control Flow Graphs

Mitigating Metamorphic Malware Through Adversarial Learning Techniques

AI-Amplification Indicator: An Actor-Level Scoring Framework for Ransomware Operations on the Dark Web

Automating the Detection of Evasive Windows Malware: An Evaluated YARA Rule Library for Anti-VM and Anti-Sandbox Techniques

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to our Newsletter