malware distribution

AppWizard
March 20, 2025
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned about targeted cyberattacks against employees in the defense-industrial complex and members of the Defense Forces of Ukraine, which have been ongoing since at least summer 2024 and have intensified recently. Attackers are using the Signal messenger app to distribute malicious files by compromising trusted contacts' accounts. In March 2025, CERT-UA observed that attackers were sending archived messages through Signal, which included a PDF and an executable file called DarkTortilla, designed to activate the DarkCrystal RAT (DCRAT) software. The focus of these deceptive messages has shifted to critical topics like unmanned aerial vehicles (UAVs) and electronic warfare equipment. CERT-UA has labeled this activity UAC-0200 and advises reporting any suspicious messages immediately. They have also compiled indicators related to the attacks, including specific file hashes, IP addresses, and URLs linked to the attackers' infrastructure.
Winsage
March 9, 2025
Security researchers have identified a malware campaign targeting YouTubers to spread SilentCryptoMiner malware disguised as tools to bypass restrictions. Over 2,000 victims in Russia have been reported, with the actual number likely higher. The malware exploits Windows Packet Divert drivers, with over 2.4 million detections in the past six months. Threat actors issue copyright strikes to compel YouTubers to promote infected files, manipulating their reputations. One YouTuber with 60,000 subscribers linked to a malicious archive that was downloaded over 40,000 times. The infection starts with an archive containing a modified script that executes a malicious executable via PowerShell. If security software removes the file, users are prompted to disable their antivirus. The malware's infection chain is multi-staged, using a Python-crafted loader to retrieve payloads from specific domains. It employs anti-VM techniques, modifies defender exclusions, and stealthily mines cryptocurrencies while pausing during certain program activities. Security experts warn against using restriction bypass tools due to their association with malware distribution.
Tech Optimizer
March 5, 2025
In recent months, the use of Windows Packet Divert drivers in Russia has surged, nearly doubling between August 2023 and January 2024, primarily for tools that bypass access restrictions to foreign resources. Cybercriminals are exploiting this trend by distributing malware disguised as these tools, with some bloggers unknowingly promoting such malicious programs. An investigation revealed that a YouTube channel with 60,000 subscribers posted videos on bypassing restrictions, linking to a malicious archive that had been downloaded over 40,000 times. The malware, a variant of SilentCryptoMiner, is designed to mine cryptocurrencies while evading detection. Users are advised to ensure their devices have trusted protection, avoid obscure downloads, and be cautious of even reputable bloggers who may inadvertently share malware.
Winsage
February 12, 2025
The Sandworm group, a Russian military cyber-espionage entity, has intensified attacks on Windows users in Ukraine by distributing trojanized Microsoft Key Management Service (KMS) activators and counterfeit Windows updates since late 2023. Threat analysts at EclecticIQ have linked these activities to Sandworm through overlapping infrastructure and consistent tactics. The attackers use a BACKORDER loader to deploy DarkCrystal RAT (DcRAT) malware, with evidence of Russian military involvement indicated by debug symbols from a Russian-language build environment. Seven distinct malware distribution campaigns have been cataloged, with the latest incident on January 12, 2025, involving DcRAT during data exfiltration attacks. The counterfeit KMS tool installs a deceptive activation interface while secretly loading malware and disabling Windows Defender. The malware captures sensitive information, including keystrokes and saved credentials, and transmits it to the attackers' servers. Sandworm exploits the prevalence of pirated software in Ukraine, posing a significant threat to national security and critical infrastructure. The group has been active since at least 2009 and operates under Military Unit 74455 of the GRU, focusing on disruptive attacks against Ukraine.
AppWizard
December 18, 2024
Version 44.1 of the Google Play Store has removed the "Share apps" feature, which allowed users to share installed applications via Nearby Share. This feature was introduced in early 2021 and enabled app transfers without internet or mobile data usage. The change was noted by 9to5Google in the official changelog, and while Google has not commented on the removal, there are speculations about security concerns related to potential malware distribution. Users can still share apps using Files by Google or third-party file sharing applications.
Winsage
December 9, 2024
Microsoft will discontinue support for Windows 10 on October 14, 2025. Extended Security Updates (ESUs) will be available for a maximum of three years at approximately per device. Windows 10 is currently the most targeted among older Windows operating systems, facing high-severity vulnerabilities. Organizations should conduct an asset audit, evaluate ESUs, migrate critical systems to the cloud, and establish a decommission plan for legacy systems. Morphisec offers a lightweight security solution for legacy systems, utilizing Automated Moving Target Defense (AMTD) technology to protect against advanced threats without the need for updates or internet connectivity.
Search