fake

Winsage
May 4, 2025
Microsoft has warned about the increasing use of PDF attachments in cyberattacks, particularly during the U.S. tax season. Attackers have been using PDFs with embedded links that redirect users to counterfeit pages, such as a fake DocuSign site. TrustWave SpiderLabs has identified a new campaign involving a fake payment SWIFT copy that leads to a malicious PDF containing obfuscated JavaScript, which downloads a script that conceals the RemcosRAT payload using steganography. This technique involves hiding links within images, making them difficult to detect. The latest attacks begin with phishing emails containing malicious PDFs that direct victims to harmful webpages, facilitating the delivery of RemcosRAT, a trojan that allows remote control of compromised systems. Users are advised to be cautious of emails labeled “SWIFT Copy” and to delete suspicious emails immediately.
AppWizard
April 25, 2025
A game called R.E.P.O Horror was released on the Nintendo eShop, misleading players into believing it was the authentic PC game R.E.P.O. Users reported that R.E.P.O Horror was of low quality and not published by the original developer, Semiwork. This incident is part of a broader trend of intellectual property infringement, as seen with other titles like The Backrooms 1998 and games such as TCG Card Shop Simulator, Only Up!, and Chained Together, which closely resemble their original versions. Consumers are advised to verify developer and publisher details before purchasing games on the Nintendo eShop to avoid counterfeit products. The original R.E.P.O game remains a reputable option in the co-op horror genre, with plans for future enhancements.
Winsage
April 23, 2025
The GBS Windows cartridge, created by Rubenretro using GB Studio, allows users to experience a faux version of Windows 3.1 on the Game Boy. It includes applications like Minesweeper, a media player, and Paint, enabling creative expression with features such as printing via a Game Boy printer. The cartridges have sold out due to high demand, but customers can sign up on Etsy for restock notifications.
AppWizard
April 10, 2025
A report from DomainTools LLC reveals that cybercriminals are using newly registered domains to distribute the SpyNote Android remote access trojan (RAT) by creating fake websites that resemble legitimate Google Play app installation pages. These counterfeit pages often include familiar visual elements to deceive users into downloading harmful APK files, such as a site mimicking the TikTok installation page. The downloaded files typically contain variants of SpyNote, which can conduct surveillance, harvest sensitive information, and execute remote commands on compromised devices. The delivery mechanism involves a two-stage process where a dropper APK installs a secondary APK with core spyware functionalities, utilizing JavaScript to trigger downloads from fake install buttons. Common characteristics of the domains distributing SpyNote include registration with NameSilo LLC and XinNet Technology Corp., hosting on infrastructure linked to Lightnode Ltd and Vultr Holdings LLC, and the presence of SSL certificates. The malware delivery sites contain code in both English and Chinese, suggesting a Chinese-speaking threat actor may be involved. SpyNote has been associated with advanced persistent threat groups targeting individuals in South Asia, including those in the Indian defense sector. Once installed, SpyNote requests intrusive permissions to access SMS, contacts, call logs, camera, microphone, and location services, and employs persistence mechanisms that make it difficult to remove. DomainTools advises users to be vigilant against spoofed app pages and avoid sideloading APKs from unverified sources.
Search