Beware of Fake Voicemail Notifications: A New Phishing Scam

Beware of Fake Voicemail Notifications: A New Phishing Scam

Scammers are now using fake voicemail notifications to trick users into revealing their credentials. These phishing emails often appear legitimate, leading victims to fake login pages or triggering malware downloads.
Oct 25, 2025 Actor: Unknown Sector: General Region: Global
SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

The SideWinder advanced persistent threat group has developed a sophisticated attack methodology utilizing ClickOnce applications to deploy StealerBot malware against diplomatic and governmental targets in South Asia. This campaign marks a significant evolution in their tactics, employing spear-phishing emails and advanced evasion techniques.
Oct 24, 2025 Actor: SideWinder Sector: Government, Diplomatic Region: South Asia
Hackers Exploit Fake Job Listings in Credential Theft Scheme, Google Reports

Hackers Exploit Fake Job Listings in Credential Theft Scheme, Google Reports

Google's Threat Intelligence Group has uncovered a Vietnamese cybercriminal campaign that uses fake job postings to compromise digital marketing professionals. The campaign, tracked as UNC6229, employs social engineering and malware tactics to hijack corporate advertising accounts.
Oct 24, 2025 Actor: UNC6229 Sector: Digital Marketing Region: Vietnam
Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Caminho Malware Loader Conceals .NET Payloads inside Images via LSB Steganography

Caminho, a Brazilian Loader-as-a-Service (LaaS), uses Least Significant Bit (LSB) steganography to hide .NET payloads in images, allowing malware to bypass defenses. This threat targets businesses across South America, Africa, and Eastern Europe, utilizing spear-phishing tactics to deliver its payloads.
Oct 23, 2025 Actor: Caminho Loader Operators Sector: Various (targeting businesses) Region: South America, Africa, Eastern Europe
Star Blizzard APT Adopts New Backdoor After LostKeys Malware Exposure

Star Blizzard APT Adopts New Backdoor After LostKeys Malware Exposure

The Russian state-sponsored APT known as Star Blizzard has transitioned to using a new backdoor, MaybeRobot, following the public disclosure of its LostKeys malware. This change comes as the group continues to employ sophisticated infection techniques to target civil society members in Russia.
Oct 23, 2025 Actor: Star Blizzard (APT28) Sector: Government, Civil Society Region: Russia
GlassWorm Malware Targets Developers Through OpenVSX Marketplace

GlassWorm Malware Targets Developers Through OpenVSX Marketplace

GlassWorm malware is exploiting the OpenVSX marketplace to target developers, highlighting the risks associated with third-party software repositories. Developers are urged to exercise caution when downloading extensions.
Oct 23, 2025 Actor: Unknown Sector: Software Development Region: Global
Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

Vidar Stealer 2.0: Advanced Memory Injection Techniques for Credential Theft

The latest version of Vidar Stealer, known as Vidar 2.0, employs advanced memory injection techniques to bypass browser encryption and steal login credentials. This update marks a significant evolution in its capabilities, allowing it to efficiently extract sensitive information from multiple browsers.
Oct 22, 2025 Actor: Loadbaks Sector: General Region: Global
Russian State Hackers Develop New Malware Tools

Russian State Hackers Develop New Malware Tools

Russian state-backed hacking group Coldriver has introduced three new malware strains, NOROBOT, YESROBOT, and MAYBEROBOT, following the exposure of their previous tool, LostKeys. These new tools are designed to evade detection and target high-value data.
Oct 22, 2025 Actor: Coldriver (Star Blizzard, Callisto) Sector: Government, High-Value Targets Region: Russia
Rust-Engineered ChaosBot Leverages Discord for Covert Command & Control

Rust-Engineered ChaosBot Leverages Discord for Covert Command & Control

A new strain of Rust-based malware, dubbed ChaosBot, exploits the Discord platform for its Command and Control operations, embedding malicious activity behind legitimate traffic. Its advanced evasion capabilities pose significant challenges for defenders.
Oct 22, 2025 Actor: Unknown Sector: General Region: Global
ASP.NET Machine Key Exploit Lets Hackers Compromise IIS, Load Malicious Modules

ASP.NET Machine Key Exploit Lets Hackers Compromise IIS, Load Malicious Modules

A large-scale intrusion campaign, tracked as REF3927, is exploiting misconfigured Microsoft IIS servers that reuse publicly exposed ASP.NET machine keys. Attackers are deploying malicious modules and webshells to gain control over affected systems.
Oct 22, 2025 Actor: Chinese-speaking attackers Sector: Information Technology Region: Global
Attackers Target Retailers’ Gift Card Systems Using Cloud-Only Techniques

Attackers Target Retailers’ Gift Card Systems Using Cloud-Only Techniques

A newly uncovered attack campaign, dubbed Jingle Thief, is targeting global retailers' gift card systems using phishing and smishing techniques. The attackers, believed to be based in Morocco, operate entirely in cloud environments without deploying traditional malware.
Oct 22, 2025 Actor: Morocco-based attackers Sector: Retail Region: Global
GlassWorm: A New Cyber Threat Targeting Visual Studio Code Developers

GlassWorm: A New Cyber Threat Targeting Visual Studio Code Developers

Researchers at Koi Security have identified a new cyber threat named GlassWorm that spreads through infected Visual Studio Code extensions. Utilizing invisible Unicode characters, this worm evades detection and employs the Solana blockchain for command-and-control operations.
Oct 22, 2025 Actor: Unknown Sector: Software Development Region: Global
Astaroth Banking Malware Abuses GitHub for Resilient Configurations

Astaroth Banking Malware Abuses GitHub for Resilient Configurations

The Astaroth banking trojan has resurfaced, utilizing GitHub as a platform for malware configuration updates. This sophisticated malware employs targeted phishing tactics to steal banking and cryptocurrency credentials while evading detection through advanced techniques.
Oct 14, 2025 Actor: Astaroth malware group Sector: Banking and Cryptocurrency Region: South America
Beamglea Campaign Targets Tech and Energy Firms with Malicious npm Packages

Beamglea Campaign Targets Tech and Energy Firms with Malicious npm Packages

The Beamglea campaign has exploited 175 malicious npm packages to conduct phishing attacks, primarily targeting tech and energy firms across Europe and APAC. Researchers discovered that these packages, which have over 26,000 downloads, redirect users to phishing sites designed to steal credentials.
Oct 12, 2025 Actor: Unknown Sector: Technology, Energy Region: Europe, APAC