SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 46

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang RVTools Bumblebee Malware Attack – How a Trusted IT Tool Became a Malware Delivery Vector   Malicious ‘Checker’ Packages on PyPI Probe TikTok and Instagram for Valid Accounts […]

May 25, 2025 - 15:01
 0
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 46

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape

Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang

RVTools Bumblebee Malware Attack – How a Trusted IT Tool Became a Malware Delivery Vector  

Malicious ‘Checker’ Packages on PyPI Probe TikTok and Instagram for Valid Accounts

RedisRaider: Weaponizing misconfigured Redis to mine cryptocurrency at scale 

Hidden Threats of Dual-Function Malware Found in Chrome Extensions       

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations 

Pure Harm: PureRAT Attacks Russian Organizations  

Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer

A Brief History of DanaBot, Longtime Ecrime Juggernaut Disrupted by Operation Endgame    

Bumblebee malware distributed via Zenmap, WinMRT SEO poisoning  

60 Malicious npm Packages Leak Network and Host Data in Active Malware Campaign 

Following the spiders: Investigating Lactrodectus malware 

TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead

Russian GRU Targeting Western Logistics Entities and Technology Companies

A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist 

From banks to battalions: SideWinder’s attacks on South Asia’s public sector

UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware

Consistent and Compatible Modelling of Cyber Intrusions and Incident Response Demonstrated in the Context of Malware Attacks on Critical Infrastructure

Malware families discovery via Open-Set Recognition on Android manifest permissions

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)