article thumbnail

PLAYFULGHOST backdoor supports multiple information stealing features

Security Affairs

“Mandiant observed a second, more sophisticated execution scenario which begins with a Windows LNK file named QQLaunch.lnk. ThisLNK file combines a text file named h which contains the characters “MZ” and a second file t which contains the rest of PE payload to construct a new malicious DLL named libcurl.dll.”

article thumbnail

MikroTik botnet relies on DNS misconfiguration to spread malware

Security Affairs

In late November, the experts spotted a malspam campaign impersonating DHL which used emails about freight invoices, attaching zip files named “Invoice###.zip” The zip archive contains an obfuscated JavaScript file, which creates and executes a PowerShell script that connects to the C2 (62.133.60[.]137),

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog

Security Affairs

Cybersecurity and Infrastructure Security Agency (CISA) adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog. Cybersecurity and Infrastructure Security Agency (CISA) added an Apache Tomcat path equivalence vulnerability, tracked as CVE-2025-24813 , to its Known Exploited Vulnerabilities (KEV) catalog.

IT 273
article thumbnail

Internet Archive data breach impacted 31M users

Security Affairs

The Internet Archive disclosed a data breach, the security incident impacted more than 31 million users of its “The Wayback Machine.” HIBP confirmed that the stolen archive had 31M records, including email address, screen name, bcrypt password hash, and timestamps for password changes.

Archiving 302
article thumbnail

Glove Stealer bypasses Chrome’s App-Bound Encryption to steal cookies

Security Affairs

Since App-Bound encryption enforces path validation, the supporting module must be placed within Chrome’s Program Files directory, requiring Glove Stealer first to obtain local admin privileges. It then connects to the C2 server to confirm a successful bypass (ID=4).

article thumbnail

Experts warn of a new wave of Bumblebee malware attacks

Security Affairs

The Bumblebee infection detected by Netskope likely begins with a phishing email containing a ZIP file with an LNK file named “Report-41952.lnk” “the new Bumblebee payload is delivered via MSI files. lnk” that, once executed, starts the attack chain. Once executed, it downloads the payload directly into memory.

article thumbnail

CERT-UA warns of a phishing campaign targeting government entities

Security Affairs

CERT-UA warned that Russia-linked actor is impersonating the Security Service of Ukraine (SSU) in a new phishing campaign to distribute malware. Threat actors sent out emails attempting to impersonate Security Service of Ukraine (SSU) and contains a link to download a file named “Documents.zip.”

Phishing 345