A malicious package has been discovered in the Go ecosystem, imitating the BoltDB package. This package contains a backdoor, allowing remote code execution. The vulnerability exploits the Go Module Mirror’s caching mechanism, enabling the malware to persist undetected for an extended period. Developers who manually audited the package on GitHub did not find malicious code. The package’s strategic alteration of the git tag on GitHub further concealed the malware from manual review.
Trimble Cityworks, a GIS-centric asset management and permitting software, is affected by a zero-day vulnerability (CVE-2025-0994). This vulnerability has been actively exploited in attacks targeting local governments and utilities, potentially allowing the deployment of malware. The vulnerability allows attackers to exploit deserialization flaws, potentially leading to malware delivery or other malicious activity.
The Kimsuky APT group is actively employing a custom-built RDP Wrapper and proxy tools to gain unauthorized access to infected machines, enabling persistent cyber espionage. This involves spear-phishing tactics and the distribution of malicious shortcut files disguised as legitimate documents. AhnLab’s ASEC team has released a blog post detailing additional malware used in these attacks. This highlights the group’s evolving tactics and persistent threat to organizations.
The Russian-speaking cybercrime gang known as Crazy Evil has been observed using various social media scams to trick victims into installing malware like StealC, AMOS (Atomic macOS Stealer), and Angel Drainer. These attacks focus on identity theft and financial fraud, targeting cryptocurrency users in particular. The sophistication of their lures and the diverse malware employed indicate a well-resourced and organized operation.
Nova Stealer, a modified variant of SnakeLogger, is being sold on hacking forums as Malware-as-a-Service (MaaS) for as low as $50. This malware is designed to steal sensitive information, including credentials and financial data, making it a significant threat to individuals and organizations. The malware’s affordability and ease of deployment contribute to its widespread use by cybercriminals, increasing the risk of data breaches and financial losses.
Fortinet’s FortiGuard Labs has issued a high-severity alert regarding the Coyote Banking Trojan, a sophisticated malware targeting Microsoft Windows users. This trojan is distributed through malicious LNK files that execute PowerShell commands, initiating a multi-stage attack. The primary objective is to harvest sensitive information, including system details and antivirus product lists, and to bypass sandbox discovery. The updated Coyote malware now targets 1,030 sites and 73 financial institutions.
The attacks involving the new Coyote trojan variant include the deployment of an LNK file executing a PowerShell command, which facilitates the retrieval of a next-stage PowerShell script for launching the trojan. The malware is designed to gather system information and avoid detection by security measures, highlighting the need for robust endpoint protection and vigilant monitoring of system activities.
This cluster describes a sophisticated malware campaign distributing Lumma Stealer, a data-stealing malware, through GitHub infrastructure. The campaign also involved other malware variants, including SectopRAT, Vidar, and Cobeacon. The attackers abused GitHub’s release infrastructure for initial access and utilized Tactics, Techniques and Procedures (TTPs) that exhibit significant overlaps with those used by the Stargazer Goblin group.
Multiple reports detail a wave of cyber incidents, showcasing the diverse range of attacks. A vulnerability in SimpleHelp RMM tools may have led to healthcare data breaches. A widespread campaign uses the TorNet backdoor deployed by PureCrypter malware. There is also a rise in OAuth redirect flaws in airline travel integration systems. Additionally, many Wordpress websites were found to be delivering both MacOS and Microsoft malware. These incidents highlight the growing sophistication and reach of cyber threats across various platforms and industries.
A new malicious AI chatbot, GhostGPT, is being advertised on underground forums as a tool for creating malware, executing BEC attacks, and other cybercrimes. This tool lowers the barrier for less-skilled hackers to launch attacks, which is very concerning. GhostGPT is an uncensored AI chatbot which does not have any ethical safeguards which can be found in similar AI tools, and it provides unrestricted responses to malicious queries.
This is one of the first use cases of a malicious AI chatbot being used in cyber crime, and is an indicator of things to come. This new frontier in AI is a major concern.