SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 92

Wait 5 sec.

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscapeThirty-Six Malicious npm Strapi Packages Deploy Redis RCE, Database Theft, and Persistent C2  Malicious LNK Files Distributing a Python-Based Backdoor and Changes in Distribution Techniques (Kimsuky Group)  Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy Botnet  Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities  Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy BotnetMasjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT EvasionEXPMON detected sophisticated zero-day fingerprinting attack targeting Adobe Reader users      New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations     Critical Supply Chain Compromise in Smart Slider 3 Pro: Full Malware Analysis  GlassWorm goes native: New Zig dropper infects every IDE on your machine  ClickFix malware hits DoD cybersecurity vendor homepage  Beyond BITTER: MENA Civil Society Targeted in Hack-For-Hire Operation Linked to BITTER APT  Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box ThreatsExplainability-Guided Adversarial Attacks on Transformer-Based Malware Detectors Using Control Flow GraphsMitigating Metamorphic Malware Through Adversarial Learning TechniquesAI-Amplification Indicator: An Actor-Level Scoring Framework for Ransomware Operations on the Dark WebAutomating the Detection of Evasive Windows Malware: An Evaluated YARA Rule Library for Anti-VM and Anti-Sandbox TechniquesFollow me on Twitter: @securityaffairs and Facebook and MastodonPierluigi Paganini(SecurityAffairs – hacking, newsletter)