fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

8.8K
active users

#malware

194 posts100 participants3 posts today
Pyrzout :vm:<p>Koske, a new AI-Generated Linux malware appears in the threat landscape – Source: securityaffairs.com <a href="https://ciso2ciso.com/koske-a-new-ai-generated-linux-malware-appears-in-the-threat-landscape-source-securityaffairs-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/koske-a-new-ai-g</span><span class="invisible">enerated-linux-malware-appears-in-the-threat-landscape-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/ITInformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITInformationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/PierluigiPaganini" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PierluigiPaganini</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/Koskemalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Koskemalware</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.skynetcloud.site/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/LINUX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LINUX</span></a></p>
Pyrzout :vm:<p>Operation CargoTalon targets Russia’s aerospace with EAGLET malware, – Source: securityaffairs.com <a href="https://ciso2ciso.com/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware-source-securityaffairs-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/operation-cargot</span><span class="invisible">alon-targets-russias-aerospace-with-eaglet-malware-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/ITInformationSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITInformationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/OperationCargoTalon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OperationCargoTalon</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/PierluigiPaganini" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PierluigiPaganini</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/EAGLETmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EAGLETmalware</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/Intelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Intelligence</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Coyote" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Coyote</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> abuses <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> accessibility framework for data theft</p><p><a href="https://www.bleepingcomputer.com/news/security/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p>Operation <a href="https://infosec.exchange/tags/CargoTalon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CargoTalon</span></a> targets <a href="https://infosec.exchange/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a>’s aerospace with <a href="https://infosec.exchange/tags/EAGLET" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EAGLET</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>,<br><a href="https://securityaffairs.com/180378/intelligence/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/180378/int</span><span class="invisible">elligence/operation-cargotalon-targets-russias-aerospace-with-eaglet-malware.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
🤖 Bip-bop the Bot 🇷🇺<p>📝 Daily report 📈</p><p>Here are today's most popular trending hashtags #⃣ on our website 🌐️:</p><p><a href="https://mstdn.forfun.su/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a>, <a href="https://mstdn.forfun.su/tags/art" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>art</span></a>, <a href="https://mstdn.forfun.su/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>, <a href="https://mstdn.forfun.su/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a>, <a href="https://mstdn.forfun.su/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a>, <a href="https://mstdn.forfun.su/tags/genai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>genai</span></a>, <a href="https://mstdn.forfun.su/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a>, <a href="https://mstdn.forfun.su/tags/foss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>foss</span></a>, <a href="https://mstdn.forfun.su/tags/generativeai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>generativeai</span></a>, <a href="https://mstdn.forfun.su/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a>, <a href="https://mstdn.forfun.su/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a>, <a href="https://mstdn.forfun.su/tags/aiart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aiart</span></a></p><p>🔥 Stay tuned! 🔥</p>
Pyrzout :vm:<p>Beware of Fake Error Pages Deploying Platform-Specific Malware on Linux and Windows Systems <a href="https://gbhackers.com/beware-of-fake-error-pages-deploying-platform-specific-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/beware-of-fake-e</span><span class="invisible">rror-pages-deploying-platform-specific-malware/</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>
AAKL<p>Sales pitch toward the end. </p><p>Unit42: Malware: Muddled Libra Threat Assessment: Further-Reaching, Faster, More Impactful <a href="https://unit42.paloaltonetworks.com/muddled-libra/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">unit42.paloaltonetworks.com/mu</span><span class="invisible">ddled-libra/</span></a> <span class="h-card" translate="no"><a href="https://beta.mstdn.cf/users/unit42_intel" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>unit42_intel</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Michael Gisiger :mastodon:<p>„Sicherheitsforscher von Aqua Security haben eine neue <a href="https://nerdculture.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> namens Koske entdeckt, die auf <a href="https://nerdculture.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> Systeme abzielt und durch Bilder eingeschleust wird – unter anderem von Pandabären. Wie die Forscher in einem Blogbeitrag schilderten, fanden sie Hinweise darauf, dass die Schadsoftware unter Einsatz einer <a href="https://nerdculture.de/tags/KI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KI</span></a> entwickelt wurde.“</p><p><a href="https://www.golem.de/news/mit-ki-entwickelt-neue-linux-malware-versteckt-sich-in-suessen-panda-bildchen-2507-198500.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/mit-ki-entwickel</span><span class="invisible">t-neue-linux-malware-versteckt-sich-in-suessen-panda-bildchen-2507-198500.html</span></a></p>
limit--<p>This panda diplomacy thing is crazy<br><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/crypto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>crypto</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> </p><p><a href="https://www.bleepingcomputer.com/news/security/new-koske-linux-malware-hides-in-cute-panda-images/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-koske-linux-malware-hides-in-cute-panda-images/</span></a></p>
Eduardo Medina 🇪🇸<p>No viene mal resubir este pedazo de mi pasado a una plataforma que no esté atada a un multinacional:</p><p><a href="https://mastodon.social/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> es un <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>. ¡Pásate a <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>! <a href="https://video.hardlimit.com/w/bLebUbnKcK45hsE2dPR3Wp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">video.hardlimit.com/w/bLebUbnK</span><span class="invisible">cK45hsE2dPR3Wp</span></a></p><p><a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a></p>
Eduardo Medina 🇪🇸<p>Desde que <a href="https://mastodon.social/tags/Recall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Recall</span></a> / <a href="https://mastodon.social/tags/Recuerdos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Recuerdos</span></a> fue anunciado, considero que <a href="https://mastodon.social/tags/Windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows11</span></a> es un <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> que, en caso de necesitarlo, lo suyo sería ejecutarlo en una máquina virtual. <a href="https://www.muycomputer.com/2025/07/25/adguard-tambien-se-suma-a-bloquear-recall/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">muycomputer.com/2025/07/25/adg</span><span class="invisible">uard-tambien-se-suma-a-bloquear-recall/</span></a></p><p><a href="https://mastodon.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a></p>
Cybernews<p>Fake banking apps can empty your bank account, hijack calls and SMS, and spy on your phone.</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/bank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bank</span></a> <a href="https://infosec.exchange/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://infosec.exchange/tags/app" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>app</span></a> <a href="https://infosec.exchange/tags/SMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMS</span></a> </p><p><a href="https://cnews.link/android-bank-app-malware-india-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cnews.link/android-bank-app-ma</span><span class="invisible">lware-india-2/</span></a></p>
Pyrzout :vm:<p>AI-forged panda images hide persistent cryptomining malware ‘Koske’ <a href="https://www.csoonline.com/article/4028933/ai-forged-panda-images-hide-persistent-cryptomining-malware-koske.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">csoonline.com/article/4028933/</span><span class="invisible">ai-forged-panda-images-hide-persistent-cryptomining-malware-koske.html</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a></p>
Verfassungklage@troet.cafe<p>Mit <a href="https://troet.cafe/tags/KI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KI</span></a> entwickelt: Neue <a href="https://troet.cafe/tags/Linux_Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux_Malware</span></a> versteckt sich in süßen <a href="https://troet.cafe/tags/Panda_Bildchen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Panda_Bildchen</span></a></p><p><a href="https://troet.cafe/tags/JPEG" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JPEG</span></a>-Dateien können nicht nur schöne Bilder enthalten, sondern manchmal auch gefährlichen <a href="https://troet.cafe/tags/Schadcode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schadcode</span></a>. Eine neue <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>- <a href="https://troet.cafe/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> macht davon Gebrauch.</p><p><a href="https://troet.cafe/tags/Sicherheitsforscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsforscher</span></a> von <a href="https://troet.cafe/tags/Aqua_Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aqua_Security</span></a> haben eine neue <a href="https://troet.cafe/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> namens Koske entdeckt, die auf <a href="https://troet.cafe/tags/LinuxSysteme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LinuxSysteme</span></a> abzielt und durch Bilder eingeschleust wird – unter anderem von <a href="https://troet.cafe/tags/Pandab%C3%A4ren" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pandabären</span></a>. </p><p><a href="https://www.golem.de/news/mit-ki-entwickelt-neue-linux-malware-versteckt-sich-in-suessen-panda-bildchen-2507-198500.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/mit-ki-entwickel</span><span class="invisible">t-neue-linux-malware-versteckt-sich-in-suessen-panda-bildchen-2507-198500.html</span></a></p>
Verfassungklage@troet.cafe<p><a href="https://troet.cafe/tags/Datendiebstahl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datendiebstahl</span></a>: Neue <a href="https://troet.cafe/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> lässt <a href="https://troet.cafe/tags/KI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KI</span></a> zur Laufzeit <a href="https://troet.cafe/tags/Befehle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Befehle</span></a> erzeugen</p><p>Eine <a href="https://troet.cafe/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a>- <a href="https://troet.cafe/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> namens <a href="https://troet.cafe/tags/Lamehug" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lamehug</span></a> sorgt für Aufsehen. Befehle zum Ausleiten von Daten werden zur Laufzeit von einer KI generiert.</p><p><a href="https://troet.cafe/tags/Sicherheitsforscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsforscher</span></a> haben eine neuartige <a href="https://troet.cafe/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> entdeckt, die sich eines großen <a href="https://troet.cafe/tags/Sprachmodells" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sprachmodells</span></a> bedient, um zur Laufzeit Befehle zu generieren und zur Ausführung zu bringen. </p><p><a href="https://www.golem.de/news/datendiebstahl-neue-malware-laesst-ki-zur-laufzeit-befehle-erzeugen-2507-198517.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/datendiebstahl-n</span><span class="invisible">eue-malware-laesst-ki-zur-laufzeit-befehle-erzeugen-2507-198517.html</span></a></p>
OTX Bot<p>Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware</p><p>A new Epsilon Red ransomware campaign has been discovered targeting users globally through fake ClickFix verification pages. Active since July 2025, the threat actors employ social engineering tactics and impersonate popular platforms like Discord, Twitch, and OnlyFans to trick users into executing malicious .HTA files via ActiveX. This method leads to silent payload downloads and ransomware deployment. The campaign uses a Clickfix-themed malware delivery site, urging victims to visit a secondary page where malicious shell commands are executed. The attackers also impersonate various streaming services and use romance-themed lures. Epsilon Red, first observed in 2021, shows some similarities to REvil ransomware in its ransom note styling but appears distinct in its tactics and infrastructure.</p><p>Pulse ID: 68835c6e2b2796aec0bd0a60<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/68835c6e2b2796aec0bd0a60" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/68835</span><span class="invisible">c6e2b2796aec0bd0a60</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-07-25 10:29:02</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/Discord" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Discord</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/REvil" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>REvil</span></a> <a href="https://social.raytec.co/tags/RansomWare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomWare</span></a> <a href="https://social.raytec.co/tags/SocialEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SocialEngineering</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
OTX Bot<p>Android Malware Posing As Indian Bank Apps</p><p>This report analyzes a sophisticated Android malware targeting Indian banking apps. The malware uses a dropper and main payload structure, leveraging permissions like SMS access and silent installation to steal credentials, intercept messages, and perform unauthorized financial activities. It employs Firebase for command and control, phishing pages to mimic banking interfaces, and techniques like call forwarding abuse. The malware's modular architecture, evasion tactics, and persistence mechanisms pose significant threats to mobile banking security. Distribution methods include smishing, fake websites, and malvertising. The report provides detailed static and dynamic analysis, highlighting the malware's capabilities in data exfiltration, debit card harvesting, and remote command execution.</p><p>Pulse ID: 68835c6fda683e2a665d5722<br>Pulse Link: <a href="https://otx.alienvault.com/pulse/68835c6fda683e2a665d5722" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">otx.alienvault.com/pulse/68835</span><span class="invisible">c6fda683e2a665d5722</span></a> <br>Pulse Author: AlienVault<br>Created: 2025-07-25 10:29:03</p><p>Be advised, this data is unverified and should be considered preliminary. Always do further verification.</p><p><a href="https://social.raytec.co/tags/Android" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Android</span></a> <a href="https://social.raytec.co/tags/Bank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bank</span></a> <a href="https://social.raytec.co/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://social.raytec.co/tags/ICS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICS</span></a> <a href="https://social.raytec.co/tags/India" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>India</span></a> <a href="https://social.raytec.co/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://social.raytec.co/tags/Malvertising" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malvertising</span></a> <a href="https://social.raytec.co/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.raytec.co/tags/Mimic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mimic</span></a> <a href="https://social.raytec.co/tags/MobileBanking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileBanking</span></a> <a href="https://social.raytec.co/tags/OTX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OTX</span></a> <a href="https://social.raytec.co/tags/OpenThreatExchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenThreatExchange</span></a> <a href="https://social.raytec.co/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://social.raytec.co/tags/RAT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RAT</span></a> <a href="https://social.raytec.co/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://social.raytec.co/tags/RemoteCommandExecution" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RemoteCommandExecution</span></a> <a href="https://social.raytec.co/tags/SMS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMS</span></a> <a href="https://social.raytec.co/tags/Smishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Smishing</span></a> <a href="https://social.raytec.co/tags/bot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bot</span></a> <a href="https://social.raytec.co/tags/AlienVault" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AlienVault</span></a></p>
Joaquim Homrighausen<p>Wow ... what a surprise. Or wait, no, it isn't 🤔😑</p><p><a href="https://www.tomshardware.com/tech-industry/cyber-security/hacker-injects-malicious-potentially-disk-wiping-prompt-into-amazons-ai-coding-assistant-with-a-simple-pull-request-told-your-goal-is-to-clean-a-system-to-a-near-factory-state-and-delete-file-system-and-cloud-resources" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tomshardware.com/tech-industry</span><span class="invisible">/cyber-security/hacker-injects-malicious-potentially-disk-wiping-prompt-into-amazons-ai-coding-assistant-with-a-simple-pull-request-told-your-goal-is-to-clean-a-system-to-a-near-factory-state-and-delete-file-system-and-cloud-resources</span></a></p><p><a href="https://mastodon.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.online/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.online/tags/vibecoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vibecoding</span></a> <a href="https://mastodon.online/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://mastodon.online/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://mastodon.online/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.online/tags/amazon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>amazon</span></a> <a href="https://mastodon.online/tags/coding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>coding</span></a> <a href="https://mastodon.online/tags/codingassistant" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>codingassistant</span></a> <a href="https://mastodon.online/tags/cybersec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersec</span></a> <a href="https://mastodon.online/tags/devops" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devops</span></a> <a href="https://mastodon.online/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://mastodon.online/tags/developers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>developers</span></a></p>
Pyrzout :vm:<p>Sophisticated Koske Linux Malware Developed With AI Aid <a href="https://www.securityweek.com/sophisticated-koske-linux-malware-developed-with-ai-aid/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/sophisticated</span><span class="invisible">-koske-linux-malware-developed-with-ai-aid/</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/Linuxmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxmalware</span></a> <a href="https://social.skynetcloud.site/tags/Koske" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Koske</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
Pyrzout :vm:<p>Sophisticated Koske Linux Malware Developed With AI Aid <a href="https://www.securityweek.com/sophisticated-koske-linux-malware-developed-with-ai-aid/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/sophisticated</span><span class="invisible">-koske-linux-malware-developed-with-ai-aid/</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/Linuxmalware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linuxmalware</span></a> <a href="https://social.skynetcloud.site/tags/Koske" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Koske</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>