Malware

A collection of 176 posts
CloudZ RAT and Pheno Plugin Hijack Microsoft Phone Link to Bypass MFA Without Touching Your Phone
Malware

CloudZ RAT and Pheno Plugin Hijack Microsoft Phone Link to Bypass MFA Without Touching Your Phone

GroupUnknown threat actor, attribution unconfirmedTypeModular RAT with novel MFA-interception pluginCVEsNone assigned. Exploits legitimate Windows application behaviour rather than a software vulnerabilityMalwareCloudZ RAT โ€” modular .NET remote access tool with credential theft, screen recording, and C2 capabilities. Pheno โ€” previously undocumented plugin that hijacks Microsoft Phone Link to intercept SMS messages and OTPs
8 min read
Snow Malware Suite Turns Microsoft Teams Into a Help Desk Trap
Malware

Snow Malware Suite Turns Microsoft Teams Into a Help Desk Trap

GroupUNC6692 (financially motivated cluster, attribution unconfirmed beyond Mandiant tracking ID)TypeModular custom malware suite, browser extension plus Python tunneler plus Python backdoorMalwareSNOWBELT (Chromium extension), SNOWGLAZE (WebSocket and SOCKS tunneler), SNOWBASIN (local HTTP backdoor)DeliveryEmail bombing followed by Microsoft Teams impersonation of internal IT helpdesk staffScore7.5 High. Active campaign, novel
8 min read
Storm Infostealer Ships Your Browser Credentials Home Before Decrypting Them
Infostealer

Storm Infostealer Ships Your Browser Credentials Home Before Decrypting Them

GroupUnknown cybercriminal operator(s); attribution unconfirmedTypeInfostealer-as-a-ServiceMalwareStorm; a session-hijacking credential stealer that exfiltrates encrypted browser data to attacker infrastructure for server-side decryption, bypassing Chrome App-Bound Encryption and endpoint detectionScore๐ŸŸ  8.5 High. Actively deployed against confirmed victims across at least six countries, defeats Google Chrome's App-Bound Encryption, renders MFA
8 min read
CPUID Supply Chain Attack Delivers STX RAT via Trojanised CPU-Z and HWMonitor Downloads
Supply Chain Attack

CPUID Supply Chain Attack Delivers STX RAT via Trojanised CPU-Z and HWMonitor Downloads

GroupAttribution unconfirmed. Infrastructure overlap identified with a March 2026 fake FileZilla distribution campaign. C2 domain first observed November 2025. Campaign tagged internally as "CityOfSin".TypeSupply Chain Attack / Remote Access Trojan / BackdoorMalwareSTX RAT (classified as Backdoor.Win64.Alien by Kaspersky) โ€” a multi-stage, memory-resident remote access trojan with credential theft,
9 min read
Axios npm Backdoored: UNC1069 Deploys Cross-Platform RAT via Supply Chain Attack
Supply Chain Attack

Axios npm Backdoored: UNC1069 Deploys Cross-Platform RAT via Supply Chain Attack

GroupUNC1069 (North Korea-nexus, BlueNoroff-linked, financially motivated threat actor)Typenpm Supply Chain Compromise / Cross-Platform Remote Access TrojanMalwareSILKBELL: postinstall dropper embedded in plain-crypto-js@4.2.1. WAVESHAPER.V2: updated cross-platform RAT linked to prior BlueNoroff RustBucket campaignsScore๐Ÿ”ด 9.5 Critical. Nation-state supply chain attack on one of npm's most downloaded
10 min read
TeamPCP Injects Credential Stealer Into Trivy Releases and Spreads to npm via CanisterWorm
TeamPCP

TeamPCP Injects Credential Stealer Into Trivy Releases and Spreads to npm via CanisterWorm

GroupTeamPCP (financially motivated threat actor, reportedly collaborating with LAPSUS$ for extortion; nationality unconfirmed)TypeMulti-Ecosystem Supply Chain Attack, Infostealer, Self-Propagating Worm, Kubernetes WiperDeliveryCompromised GitHub Actions (trivy-action, setup-trivy, kics-github-action, ast-github-action) plus poisoned PyPI packages (litellm) and self-propagating npm infection via CanisterWormMalwareTeamPCP Cloud Stealer โ€” three-stage CI/CD credential harvester; CanisterWorm โ€”
11 min read
DarkSword iOS Exploit Chains Six Vulnerabilities for Silent Device Takeover
iOS Security

DarkSword iOS Exploit Chains Six Vulnerabilities for Silent Device Takeover

GroupUNC6353 (suspected Russian espionage); UNC6748 (cybercriminal); PARS Defense (commercial surveillance vendor)TypeiOS Exploit Kit, Infostealer, APT CampaignCVEsCVE-2025-31277 (JavaScriptCore JIT type confusion); CVE-2025-43529 (JavaScriptCore DFG garbage collection bug); CVE-2026-20700 (dyld PAC bypass); CVE-2025-14174 (ANGLE memory corruption, CVSS 8.8); CVE-2025-43510 (XNU copy-on-write privilege escalation, CVSS 8.6); CVE-2025-43520 (XNU VFS race
7 min read
GlassWorm Exploits Trust in Open Source Ecosystems
Malware

GlassWorm Exploits Trust in Open Source Ecosystems

Threat Group โ€“ Unattributed Threat Type โ€“ Supply chain malware, infostealer, credential theft Exploited Vulnerabilities โ€“ No CVE assigned. Abuse of trusted package registries, compromised publisher access, stolen developer credentials, invisible Unicode obfuscation, and extension dependency abuse Malware Used โ€“ GlassWorm loader and follow on JavaScript based payloads Threat Score โ€“ 8.7 ๐Ÿ”ฅ Critical Last
5 min read
VodkaStealer Malware Harvests Browser Credentials and Session Token
Malware

VodkaStealer Malware Harvests Browser Credentials and Session Token

Threat Group โ€“ Unidentified financially motivated threat actor associated with the ClickFix WordPress compromise campaign Threat Type โ€“ Information Stealer Exploited Vulnerabilities โ€“ ClickFix social engineering using compromised WordPress sites and fake Cloudflare verification prompts Malware Used โ€“ VodkaStealer, DoubleDonut loader, ChromElevator Threat Score โ€“ ๐Ÿ”ด 7.6 High โ€“ Advanced credential harvesting malware delivered through large
5 min read
UnsolicitedBooker Deploys MarsSnake Against Telecom Providers
Malware

UnsolicitedBooker Deploys MarsSnake Against Telecom Providers

Threat Group โ€“ UnsolicitedBooker Threat Type โ€“ Backdoor / Advanced Persistent Threat Exploited Vulnerabilities โ€“ CVE-2018-0802 Malware Used โ€“ MarsSnake, MarsSnakeLoader, LuciDoor, LuciLoad Threat Score โ€“ 8.7 ๐Ÿ”ฅ Critical โ€“ State aligned espionage platform with wormable capability, decentralised IPFS command fallback, telecommunications targeting, long term persistence and advanced evasion techniques Last Threat Observation โ€“ 24 February 2026 Overview
5 min read