Topic: malware campaign

  • Inside the PureRAT Attack: From Info Stealer to Full Control

    Inside the PureRAT Attack: From Info Stealer to Full Control

    A sophisticated cyberattack begins with phishing emails using sideloading techniques to deploy malware, escalating from credential theft to deploying the full-featured PureRAT remote access trojan for complete system control. The campaign employs multiple layers of obfuscation, including custom c...

    Read More »
  • ShadowV2 Botnet: The Alarming Rise of DDoS-for-Hire

    ShadowV2 Botnet: The Alarming Rise of DDoS-for-Hire

    A new botnet called ShadowV2 uses cloud tools like GitHub CodeSpaces and Docker to deploy malware that launches powerful DDoS attacks, targeting vulnerable cloud infrastructure. The operation functions as a sophisticated cybercrime-as-a-service platform, featuring a professional API, user managem...

    Read More »
  • MacOS Users Targeted by Atomic Stealer Malware on GitHub

    MacOS Users Targeted by Atomic Stealer Malware on GitHub

    A new campaign spreads Atomic Stealer malware by creating fake GitHub repositories that appear to offer legitimate Mac software downloads, tricking users through search engine optimization. The malware is installed via a social engineering trick where users manually run a malicious Terminal comma...

    Read More »