The infection chain includes a fake CAPTCHA page, a Bash script, a Nuitka loader, and the Python-based infostealer.
The post Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs appeared first on SecurityWeek.
The infection chain includes a fake CAPTCHA page, a Bash script, a Nuitka loader, and the Python-based infostealer.
The post Cloudflare-Themed ClickFix Attack Drops Infiniti Stealer on Macs appeared first on SecurityWeek.
The medtech giant has been working on restoring systems affected by the cyberattack conducted by the Handala hackers.
The post Iranian Hackers Likely Used Malware-Stolen Credentials in Stryker Breach appeared first on SecurityWeek.
The 2024 incident was initially linked to China, but an infostealer infection has now revealed North Korean involvement.
The post Polyfill Supply Chain Attack Impacting 100k Sites Linked to North Korea appeared first on SecurityWeek.
Threat actors replace legitimate commands on the cloned installation webpages with malicious commands.
The post Cloned AI Tool Sites Distribute Malware in ‘InstallFix’ Campaign appeared first on SecurityWeek.
The malware targets browser and cryptocurrency wallet data, along with system information and user files.
The post Over 100 GitHub Repositories Distributing BoryptGrab Stealer appeared first on SecurityWeek.
Written in C++ and Python, the malware exfiltrates system information, browser data, and steals files.
The post ‘Arkanix Stealer’ Malware Disappears Shortly After Debut appeared first on SecurityWeek.
The information stealer abuses legitimate APIs and libraries to exfiltrate data to Discord webhooks.
The post ‘SolyxImmortal’ Information Stealer Emerges appeared first on SecurityWeek.
The initial access broker (IAB) relies on credentials exfiltrated using information stealers to hack organizations.
The post Dozens of Major Data Breaches Linked to Single Threat Actor appeared first on SecurityWeek.
The ‘download’ button on the official EmEditor website served a malicious installer.
The post Infostealer Malware Delivered in EmEditor Supply Chain Attack appeared first on SecurityWeek.
A recent MacSync Stealer version no longer requires users to directly interact with the terminal for execution.
The post MacSync macOS Malware Distributed via Signed Swift Application appeared first on SecurityWeek.