New BrowserVenom malware spread via DeepSeek spoofing Numerous computers across Mexico, Brazil, Cuba, India, Nepal, Egypt, and South Africa have been compromised with the novel BrowserVenom malware in a phishing campaign involving the impersonation of Chinese artificial intelligence platform DeepSeek-R1, reports The Register.
More than 20,000 information-stealing malware-linked IP addresses and domains were disrupted, while 41 servers underpinning infostealer operations were sequestered between January and April as part of the Interpol-led global law enforcement effort Operation Secure, according to BleepingComputer.
Malware-as-a-service platform Danabot had operational information over the past three years exposed by a command-and-control infrastructure vulnerability, potentially aiding in its disruption as part of the ongoing international law enforcement effort Operation Endgame, according to Cyber Security News.
Windows systems could be completely compromised in attacks involving the advanced DuplexSpy RAT malware, which uses a complex persistence technique on top of sophisticated encryption methods.
Suspected Russian threat actors have exploited the ClickFix attack technique to distribute the Atomic macOS Stealer, or AMOS, malware on macOS systems, according to The Hacker News.
Attacks with the nascent PathWiper malware have been deployed by a Russian advanced persistent threat operation against Ukrainian critical infrastructure organizations, The Register reports.
Fast Five
Selected by the SC Media Editorial team every Tuesday.
Sign up now for the top five issues cybersecurity pros need to know this week.