Cyble Research reported finding a campaign using DarkTortilla malware on phishing sites. (Coast Guard)Researchers reported on a campaign where they observed threat actors dropping DarkTortilla malware on phishing sites masquerading as legitimate Grammarly and Cisco sites. In a Dec. 16 blog post, Cyble Research and Intelligence Labs (CRIL) described DarkTortilla as a complex, .Net-based malware that has been active since 2015. The researchers said that malware has been best known to drop malware stealers and remote access trojans (RATs) such as AgentTesla, AsyncRAT, and NanoCore.During the summer, security researchers at Secureworks published a blog about DarkTortilla and detailed its behavior. While the Secureworks researchers said DarkTortilla uses spam email with malicious attachments to reach users, it was CRIL researchers who found that the bad actors around DarkTortilla created phishing sites for distributing the malware.
The group behind this attack has been repurposing existing malware (think-cheap-to-do) and coupling an attack style known as a watering hole attack, said Andrew Barratt, vice president at Coalfire. Barratt said the “watering holes” are all intended to look like common websites using a typo-squat — where a misspell of a common domain name is used. This potentially lets them attract victims who have limited defenses, which then in turn means that a repurposed and quite an old piece of malware may still be effective against them. “When you look at some of the names the malware is masquerading as, one is the blizzard installer — a common installer for gamers,” Barratt said. “The group could be trying to use this to target gamers who have a habit of switching off their antivirus to increase game performance. The capabilities are highly versatile, so I’d bet the threat actor behind this is looking to build up a portfolio of initial access — to then sell on the wholesale market.”
Malicious actors have utilized a trojanized version of the crossplatform SSH client and servermanagement tool Termius to deliver an updated iteration of the ZuRu macOS malware, according to The Hacker News.
More than 2.3 million Google Chrome and Microsoft Edge users had their browsers hijacked as part of the RedDirection attack campaign involving 18 nefarious extensions, according to The Register.
Unique malware detections during the first three months of 2025 were 171% higher than the last three months of 2024, signifying the largest jump in novel payloads yet, according to Channel Futures.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news