article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 197
article thumbnail

A New ‘It RAT’: Stealthy ‘Resolver’ Malware Burrows In 

Ooda Loop

The […] The post A New ‘It RAT’: Stealthy ‘Resolver’ Malware Burrows In appeared first on OODAloop. Actors are using the previously undocumented tool, which features very sophisticated methods of avoiding detection by email services, in new phishing campaigns.

Malware 59
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Human firewalls: The first line of defense against cyber threats in 2025

CIO

In the past few months, infostealer malware has gained ground. Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS). Both the software and its data are sold on the dark web in the form of Malware-as-a-Service (MaaS).

Firewall 146
article thumbnail

Telegram Android flaw enables hackers to disguise malware as videos

Ooda Loop

Malware is being disguised as videos in order to trick Telegram users into downloading it. Attackers on Telegram have begun to disguise malware as videos in order to trick users into dowloading it. If a Telegram user plays the video it will trigger the download process.

Malware 59
article thumbnail

AndroxGhost – the python malware exploiting your AWS keys

Lacework

And the majority of this activity has been linked to the same python malware dubbed AndroxGh0st with at least one incident tied to an actor known as Xcatze. For AWS specifically, the malware scans for and parses AWS keys but also has the ability to generate keys for brute force attacks. AndroxGh0st options.

Malware 145
article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO

The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example. Vault Panda has used many malware families shared by Chinese threat actors, including KEYPLUG, Winnti, Melofee, HelloBot, and ShadowPad.

Industry 147
article thumbnail

GenAI in Cybersecurity — Threats and Defenses

Palo Alto Networks

GenAI and Malware Creation Our research into GenAI and malware creation shows that while AI can't yet generate novel malware from scratch, it can accelerate attackers' activities. AI serves as a capable co-pilot for less skilled attackers and can regenerate or impersonate certain existing types of malware.

Malware 99