X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 24/Oct 08:05

SharkStealer Using EtherHiding Pattern to Resolves Communications With C2 Channels

A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to establish covert command-and-control channels. SharkStealer represents a significant evolution in malware design, utilizing the BNB Smart Chain Testnet as a resilient dead-drop resolver for its C2 infrastructure.…

Articles similaires

Sorry! Image not available at this time

New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins

itsecuritynews.info - 30/Oct 19:04

A newly discovered Windows malware family named Airstalk has emerged as a sophisticated threat capable of exfiltrating sensitive browser credentials...

Sorry! Image not available at this time

New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins

itsecuritynews.info - 30/Oct 19:04

A newly discovered Windows malware family named Airstalk has emerged as a sophisticated threat capable of exfiltrating sensitive browser credentials...

Sorry! Image not available at this time

New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts

itsecuritynews.info - 25/Oct 02:05

A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based obfuscation to evade...

Sorry! Image not available at this time

New Rust Malware “ChaosBot” Hides Command-and-Control Inside Discord

itsecuritynews.info - 22/Oct 06:34

A sophisticated, Rust-based malware dubbed ChaosBot has been exposed utilizing the Discord platform for its Command and Control (C2) operations. This...

Sorry! Image not available at this time

The Unkillable Threat: How Attackers Turned Blockchain Into Bulletproof Malware Infrastructure

itsecuritynews.info - 21/Oct 17:04

The blockchain was supposed to revolutionize trust. Instead, it’s revolutionizing cybercrime. Every foundational principle that makes blockchain...

Sorry! Image not available at this time

Malicious Multilingual ZIP Files Strike Banks and Government Offices

itsecuritynews.info - 31/Oct 05:34

A sophisticated phishing campaign leveraging multilingual ZIP file lures has emerged across East and Southeast Asia, targeting government institutions...

Sorry! Image not available at this time

Malicious Multilingual ZIP Files Strike Banks and Government Offices

itsecuritynews.info - 31/Oct 05:34

A sophisticated phishing campaign leveraging multilingual ZIP file lures has emerged across East and Southeast Asia, targeting government institutions...

Sorry! Image not available at this time

SideWinder Hacking Group Uses ClickOnce-Based Infection Chain to Deploy StealerBot Malware

itsecuritynews.info - 24/Oct 17:34

The SideWinder advanced persistent threat group has emerged with a sophisticated new attack methodology that leverages ClickOnce applications to...

Sorry! Image not available at this time

Vidar Stealer Exploits: Direct Memory Attacks Used to Capture Browser Credentials

itsecuritynews.info - 22/Oct 08:05

On October 6, 2025, the cybercriminal developer known as “Loadbaks” announced the release of Vidar Stealer v2.0 on underground forums, introducing...

Sorry! Image not available at this time

New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection

itsecuritynews.info - 29/Oct 06:04

A sophisticated Android banking trojan named Herodotus has emerged on the mobile threat landscape, introducing groundbreaking techniques to evade...