The phishing sites request 12-, 20-, or 24-word recovery phrases, transmitting them to attacker-controlled infrastructure via backend API endpoints. With the seed phrase captured, threat actors can import wallets and drain funds.
22.02.2026 10:41 β π 0 π 0 π¬ 0 π 0
The letters cite urgent deadlines (Oct 2025 / Feb 2026) and warn of lost functionality. QR codes direct recipients to spoofed Trezor and Ledger setup pages designed to mimic official security and compliance communications.
22.02.2026 10:41 β π 0 π 0 π¬ 1 π 0
π¨ Snail-mail phishing targets crypto hardware wallet users. Fake letters posing as Trezor & Ledger claim mandatory βAuthenticationβ or βTransactionβ checks. Victims are pressured to scan QR codes tied to recovery-phrase theft campaigns.
#Crypto #Phishing #HardwareWallet #CyberSecurity
22.02.2026 10:41 β π 0 π 0 π¬ 2 π 0
The loader retrieves encrypted payloads hidden in fake icon files via steganography, installs persistent DLLs via Task Scheduler, and exfiltrates system data. Linked to Rhysida and possibly Wizard Spider, it delivers ransomware & stealersβan evolving threat into 2026.
17.02.2026 08:35 β π 0 π 0 π¬ 0 π 0
OysterLoader uses a 4-stage infection chain: TextShell packer, API flooding, anti-debug checks, custom API hashing, and modified LZMA compression. It dynamically resolves Windows functions and evades AV detection while testing sandbox conditions before contacting C2 over HTTPS.
17.02.2026 08:35 β π 0 π 0 π¬ 1 π 0
π¨ Researchers uncovered OysterLoader, a stealthy multi-stage loader powering Rhysida ransomware attacks. Active since 2024, it spreads via fake downloads of PuTTY, WinSCP & AI tools, deploying malware through signed MSI files. A major enterprise threat. #CyberSecurity #Malware #ThreatIntel
17.02.2026 08:35 β π 0 π 0 π¬ 1 π 0
CrowdStrike: Labyrinth Chollima split into espionage & crypto-theft units (Golden & Pressure Chollima), linked to Lazarus. Shared HR lures, trojanized apps & rootkits show centralized coordination across DPRK ops. #ThreatHunting #APT #Lazarus #CyberEspionage
11.02.2026 11:15 β π 2 π 0 π¬ 0 π 0
The scheme acts as a high-volume revenue engine. Operatives gain admin access to repos, steal data, and convert salaries to crypto using chain-hopping. βContagious Interviewβ lures deploy npm malware, VS Code payloads, BeaverTail & Koalemos RAT for full remote control.
11.02.2026 11:15 β π 1 π 0 π¬ 1 π 0
π¨ DPRK-linked actors are infiltrating global firms via LinkedIn, posing as legit remote job candidates. Tracked as Jasper Sleet & Wagemole, the campaign funds weapons programs + enables espionage. Verified emails & badges boost credibility. #CyberSecurity #DPRK #ThreatIntel #LinkedIn #jaspersleet
11.02.2026 11:15 β π 1 π 0 π¬ 1 π 0
New capabilities include Chromium login theft, HTTP proxy credential sniffing, active window tracking, and expanded plugins. Browser data is exfiltrated via hardcoded tokens for services like Google Drive, boosting stealth and resilience in Mustang Panda ops. #Malware #ThreatIntel
09.02.2026 14:55 β π 0 π 0 π¬ 0 π 0
The updated CoolClient targets gov entities across Asia and beyond, abusing legitimate Sangfor software. It profiles systems, escalates privileges, persists via services and tasks, and runs modular plugins for keylogging, tunneling, file ops, and remote shells.
09.02.2026 14:55 β π 0 π 0 π¬ 1 π 0
π¨Mustang Panda has rolled out a new CoolClient variant with browser credential theft and clipboard monitoring. Kaspersky links it to targeted espionage via trusted software and multi-stage loaders, signaling an evolution in China-aligned tradecraft. #APT #China #CyberEspionage #MUSTANGPANDA
09.02.2026 14:55 β π 0 π 0 π¬ 1 π 0
AsyncRAT runs fully in memory, enabling surveillance, file access, and persistence while blending into normal system behavior. DEAD#VAX shows how attackers combine script abuse, IPFS, and process injection to defeat traditional defenses. #ThreatHunting #Infosec #APT
06.02.2026 10:26 β π 0 π 0 π¬ 0 π 0
DEAD#VAX starts with phishing emails delivering fake PDF VHD files. When mounted, scripts launch multi-stage loaders that decrypt shellcode and inject AsyncRAT directly into trusted Windows processes, never dropping a clear payload to disk.
06.02.2026 10:26 β π 0 π 0 π¬ 1 π 0
π¨Threat hunters uncovered DEAD#VAX, a stealth malware campaign abusing Windows features to deploy AsyncRAT. Using phishing, IPFS-hosted VHD files, obfuscated scripts, and in-memory execution, it evades detection and forensic analysis. #Malware #AsyncRAT #CyberThreats #EDR #DEADVAX
06.02.2026 10:26 β π 0 π 0 π¬ 1 π 0
The APTs That Defined 2025
How State-Aligned Threat Actors Shaped the Global Cyber Battlefield
The APTs That Defined 2025 open.substack.com/pub/malwhere...
#APT #China #Russia #DPRK #Iran #ThreatIntel #CyberSecurity #SaltTyphoon #FlaxTyphoon #MustangPanda #APT17 #APT28 #APT29 #Sandworm #LazarusGroup #Kimsuky #APT42
04.02.2026 11:41 β π 0 π 0 π¬ 0 π 0
Attackers abused weak update checks in older Notepad++ versions, sideloading Chrysalis via a trojanized installer. The implant supports shell access, file ops, and C2 control. Rapid7 links the tooling to Lotus Blossomβs evolving, stealth-focused tradecraft.
04.02.2026 09:26 β π 0 π 0 π¬ 0 π 0
π¨China-linked espionage group Lotus Blossom was tied to a Notepad++ hosting breach, enabling targeted delivery of a new backdoor named Chrysalis to select users via redirected updates. The campaign was limited, stealthy, and supply-chain focused. #China #LotusBlossom #CyberEspionage #Malware #APT
04.02.2026 09:26 β π 0 π 0 π¬ 1 π 0
Hosted on abuse-tolerant AS202015 with disposable domains and short-lived TLS certs, ToxicSnake isnβt one attack but a reusable delivery platform. Expect rebrands, not shutdowns, unless intelligence is shared fast. #Infosec #ThreatIntel #CyberDefense
30.01.2026 13:08 β π 0 π 0 π¬ 0 π 0
The campaign uses fake educational sites, obfuscated JavaScript, browser fingerprinting, and single-use tokens. Only selected victims see malicious content, while analysts get nothing. This selective delivery keeps infrastructure alive and payloads hidden.
30.01.2026 13:08 β π 0 π 0 π¬ 1 π 0
π¨ToxicSnake shows how modern phishing hides behind Traffic Distribution Systems (TDS). Instead of attacking everyone, it filters visitors to evade scanners and researchers. The weapon isnβt the payload, but the decision engine behind it. #CyberThreats #Phishing #TDS #Malware #ToxicSnake
30.01.2026 13:08 β π 0 π 0 π¬ 1 π 0
The campaign abused Moltbotβs popularity, delivering fallback payloads via DLL sideloading and alternate domains. Separately, researchers warn misconfigured Moltbot instances expose credentials and chat data, enabling βagent hijackingβ and manipulation of AI workflows across platforms.
29.01.2026 10:21 β π 0 π 0 π¬ 0 π 0
π¨ A malicious VS Code extension impersonating Moltbot (βClawdBot Agent, AI Coding Assistantβ) was distributed via Microsoftβs official Marketplace. The malware executed on launch, fetched remote configs, and deployed ScreenConnect RAT for persistent access.
#SupplyChain #VSCode #Malware #Moltbot
29.01.2026 10:21 β π 0 π 0 π¬ 1 π 0
PeckBirdy runs across browsers, MSHTA, WScript, ASP, Node.js, and .NET, dynamically serving payloads via unique attack IDs. Linked clusters SHADOW-VOID-044 and SHADOW-EARTH-045 deployed cookie theft, exploits, backdoors, and modular RATs, complicating detection.
28.01.2026 11:05 β π 0 π 0 π¬ 0 π 0
ποΈ PeckBirdy is a JavaScript-based C2 framework used by China-aligned APTs since 2023. Tracked by Trend Micro it abuses LOLBins and legacy JScript to deliver malware via fake Chrome updates and injected websites, targeting gambling platforms and Asian orgs
#APT #China #Malware #ThreatIntel #PeckBirdy
28.01.2026 11:05 β π 1 π 0 π¬ 1 π 0
While technically unsophisticated, Stanleyβs real danger is its distribution modelβpromising trusted Web Store placement. Researchers warn users to limit extensions, verify publishers, and review permissions as malicious add-ons continue to bypass safeguards
#Infosec #Chrome #CyberCrime #ThreatIntel
27.01.2026 10:46 β π 0 π 0 π¬ 0 π 0
Stanley lets operators hijack navigation, inject phishing pages, push browser notifications, and silently install extensions across Chrome, Edge, and Brave. It supports geo-targeting, IP tracking, and persistent C2 polling with backup domains to evade takedowns.
27.01.2026 10:46 β π 0 π 0 π¬ 1 π 0
π§© A new malware-as-a-service dubbed Stanley is selling malicious Chrome extensions that claim to pass Googleβs review and land in the Chrome Web Store. The MaaS enables phishing via full-screen iframe overlays while the browser address bar shows a legitimate site.
#Malware #BrowserSecurity #Phishing
27.01.2026 10:46 β π 0 π 0 π¬ 1 π 0
Analysts warn the attack reflects a wider trend: hotels are prime targets due to nonstop operations and pressure to restore services fast. Exposure of employee data suggests deliberate data theft. Under EU regulations, the incident may carry legal, financial, and reputational fallout.
26.01.2026 09:42 β π 0 π 0 π¬ 0 π 0
π¨ Bulgariaβs Vitosha Park Hotel was hit by ransomware linked to the Anubis threat actor. Employee data is confirmed exposed, with full impact still under review. The case shows how digitally dependent hotels face growing extortion risk from modern ransomware groups #Ransomware #Anubis #CyberSecurity
26.01.2026 09:42 β π 0 π 0 π¬ 1 π 0
Home of the Cybersecurity News hub. Information sharing and raising awareness. Think, talk and grow while on the go. Visit https://www.cybersecuritynews.today/ for more coverage.
Cybersecurity News Today! is on buymeacoffee.com/cybersecuritynewstoday
Your weekly go-to cybersecurity newsletter, curated and commented on by our senior analysts, in your mailbox soon...
https://x.com/IntCyberDigest
https://infosec.exchange/@InternationalCyberDigest
Threat Researcher @TrendMicro, waffle maker, and dad. My statements and opinions are my own and do not reflect my company.
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach reports, expert analysis, and actionable [β¦]
π bridged from π https://thehackernews.com/: https://fed.brid.gy/web/thehackernews.com
Follow us for the latest #cybersecurity news in Asia.
Join 5,000+ members β π https://linktr.ee/cyberasia
SCtoCS is your go-to partner for complete cyber protection and for latest Cyber Security News.
Threat Intelligence Researcher. Co-founder of Natto Thoughts.
https://www.nattothoughts.com/
China-Focused Consultant @SentinelOne | Nonresident Fellow @ACGlobalChina | Adjunct @Georgetown | Unprofessional Cook | β€οΈππ
https://linktr.ee/dakotaindc
Advanced Practices π¦
@Google Threat Intelligence Group
Threat Attribution, Frontline Intelligence, Malware Analysis, Threat Hunting, Incident Response
#attributionmatters
I'm an effective altruist mainly reading and boosting posts, but occasionally I'll muse and doodle about effective altruism. I take a balanced approach, so will highlight under-represented viewsβmy opinions will no doubt become apparent :)
Blogger, main interests are cybersecurity and privacy. Dutch, fluent in English and German. Can manage a casual conversation in French.
Posting the latest updates on phishing attacks.
Bot by @evanbaldonado.com (automated posts tagged #PhishingNews).
See also: @deepfakenews.bsky.social
We track verified, real-world cyber attacks to help you develop effective Cybersecurity strategies. Try HackRisk.io, your Strategic Threat Intelligence platform.
π hackmanac.com
π hackrisk.io
Your daily, and weekly, cybersecurity digest. I curate and categorize the day's and week's top security incidents, vulnerabilities, and threats. Essential intelligence without the overwhelm.
DC resident and cybersecurity writer, analyst, book author, publisher. https://metacurity.com/ https://cyberriskbook.com/
https://www.csoonline.com/profile/cynthia-brumfield/ https://infosec.exchange/@metacurity
Send tips to Cynthia.507 via Signal.
Vistage Chair, Executive Coach, Group Facilitator
in San Antonio, TX
Software, AI, playing with LLMs, gamedev
Chairman of CDU-parlimentary group in Bohmte; Head of Competence Center Cyber & Crime of ARTUS AG, #espressoliebhaber #radiohoerer #dokospieler #cybercrimebekaempfer #bohmter #familienmensch #kreistagsabgeordneter #landkind
https://www.onlyorange.de