Topic: security evasion
-
Akira Ransomware Hijacks Victim's Remote Management Tool
Hackers used the trusted Datto RMM tool and a Living Off The Land strategy to deploy Akira ransomware, disguising their actions as normal IT operations to avoid detection. The attack was halted by Barracuda Managed XDR, which detected the encryption activity and immediately isolated the compromis...
Read More » -
Google AI Detects Malware That Morphs During Attacks
Google has identified a new generation of AI-powered malware that rewrites its own code during attacks, making it more resilient and harder to detect by dynamically altering behavior and evading security systems. Several malware families, such as FRUITSHELL, PROMPTFLUX, and PROMPTLOCK, are active...
Read More » -
Legit Tools Turned Malicious: Velociraptor and Nezha Weaponized
Legitimate open-source tools Velociraptor and Nezha are being weaponized by threat actors to maintain access, evade detection, and deploy ransomware or malware on enterprise systems. A China-linked ransomware group exploited an outdated Velociraptor version with a privilege escalation flaw to dep...
Read More » -
TamperedChef Infostealer Spreads via Fake PDF Editor
A malware campaign is distributing the TamperedChef infostealer through fake PDF editing software promoted via Google Ads, using over 50 domains and counterfeit certificates to appear legitimate. The malware, disguised as AppSuite PDF Editor, activated data-stealing capabilities on August 21st, h...
Read More » -
AI Fuels 100% Surge in Phishing Attacks
AI has fueled a 100% surge in phishing attack rates, with security systems now intercepting one malicious email every nineteen seconds, doubling the previous year's frequency. Cybercriminals use AI to create polymorphic, multi-channel campaigns that constantly adapt their appearance and personali...
Read More » -
Chinese Hackers Hide ToneShell Malware with Rootkit
A new cyberespionage campaign targets Asian governments using an advanced kernel-mode rootkit to deploy the ToneShell backdoor, attributed to the Mustang Panda hacking group. The rootkit employs sophisticated stealth techniques, including a stolen certificate, dynamic API resolution, and active i...
Read More »