malicious JavaScript

AppWizard
March 9, 2025
A new malware targeting Android users on Telegram has been discovered, involving videos that conceal malicious code activated upon download. The malware, named EvilLoader, exploits how Telegram processes media files, misclassifying '.htm' files as videos, which allows HTML code to execute in a browser. This malware can lead to credential theft, private data loss, and the installation of banking trojans. It can bypass security measures by redirecting users to their browsers or prompting them to open files as HTML documents, executing malicious JavaScript that sends IP information to attackers. EvilLoader has evolved to check for sandbox environments and generate fake security warnings. Users are advised to update their Telegram app and be cautious with unfamiliar video files. Telegram has stated that the exploit does not indicate a flaw in their platform and has implemented a server-side fix for enhanced protection.
Winsage
September 28, 2024
A new malware strain called Peaklight is targeting Windows PCs through illegal movie downloads. It operates exclusively in a computer's memory (RAM), allowing it to evade traditional detection methods. Peaklight is distributed by hackers who disguise harmful Windows shortcut files within ZIP folders of popular films. When users attempt to access these files, they unknowingly connect to a hidden content delivery network that triggers a PowerShell script to activate Peaklight, which then downloads additional malware such as Lumma Stealer, Hijack Loader, and CryptBot. To protect against Peaklight, experts advise avoiding illegal download sites and using legal streaming services along with updated antivirus software.
AppWizard
September 27, 2024
Researchers uncovered a cyber espionage campaign called “SilentSelfie” targeting Kurdish communities, exploiting 25 compromised websites with four variants of malicious JavaScript. The campaign, active since late 2022, utilized watering hole attacks and a covert Android application disguised as a news app to collect sensitive data, including location and contacts. The attackers employed obfuscation techniques and used compromised web servers for communication. A total of 21 Kurdish websites were affected, primarily linked to “Rojava” and Kurdish political entities. The campaign remained undetected for over 18 months, with potential links to Turkish intelligence, Syrian government agencies, and the Kurdistan Regional Government of Iraq. Compromised sites included ‘RojNews’ and ‘YPG Rojava.’
Search