User ID

AppWizard
October 24, 2025
A Python-based remote access trojan (RAT) has emerged in the gaming community, disguised as a legitimate Minecraft client named “Nursultan Client.” It uses the Telegram Bot API for command and control, allowing attackers to exfiltrate sensitive data and interact with compromised machines. The malware is packaged with PyInstaller and has a large executable size of 68.5 MB to evade security tools. Upon execution, it hides its console window and presents a fake installation progress bar. Researchers identified the executable with the SHA256 hash 847ef096af4226f657cdd5c8b9c9e2c924d0dbab24bb9804d4b3afaf2ddf5a61. It attempts to create a registry key for persistence but has a flawed startup command. The malware includes a hardcoded Telegram Bot Token (8362039368:AAGj_jyw6oYftV2QQYiYoUslJOmXq6bsAYs) and a restricted list of user IDs (6804277757) for command authorization. It targets Discord authentication tokens and scans local storage and user data directories of major web browsers to extract tokens. Additionally, it features surveillance capabilities like screenshot capture and webcam photography, compiling detailed system profiles.
AppWizard
October 24, 2025
A new Python-based remote-access trojan (RAT) has been discovered, targeting gamers by impersonating the legitimate “Nursultan Client” application used by Eastern European Minecraft players. It utilizes the Telegram Bot API for command-and-control operations, allowing attackers to exfiltrate sensitive data and control systems on Windows, Linux, and macOS. The malware employs deceptive installation screens and manipulates the Windows registry to appear as legitimate software, but its persistence mechanism is flawed, failing to survive system reboots. It contains hardcoded credentials, enabling specific attacker control, and can perform functions like system reconnaissance, data theft, and remote surveillance, particularly targeting Discord authentication tokens. The RAT can capture screenshots and activate webcams, sending this information through the Telegram API, which complicates detection. It also has adware-like features that display URLs and images on victims' systems. Researchers believe this malware is part of a Malware-as-a-Service ecosystem, and its signature is identified as QD:Trojan.GenericKDQ.F8A018F2A0 by Netskope’s Advanced Threat Protection.
AppWizard
October 20, 2025
Duet Night Abyss is a 3D action gacha game that does not feature character gacha mechanics, instead offering gems for skins, outfits, and customization. The game is set to launch on October 28, 2024, following a redesign based on player feedback, eliminating traditional gacha and stamina systems. Currently, there are no active codes, but players can expect pre-release codes during a livestream on October 25. The code redemption process will be clarified at launch, likely involving navigation to the settings page or in-game store. Players can anticipate additional codes during future livestreams and social media announcements.
Tech Optimizer
November 22, 2024
The Angular framework has recently been updated, prompting the author to refresh their skills by developing a data visualization dashboard. The project utilized a dataset from the article "41 Percent of Fliers Say It’s Rude To Recline Your Airplane Seat." The development stack included Angular for the front-end framework, PostgreSQL for database management, and Flexmonster for data visualization. The project setup involved creating an Angular application using Angular CLI, establishing a PostgreSQL database on ElephantSQL, and integrating Flexmonster's API for visualizations. The PostgreSQL database was populated with data from a CSV file, and DBeaver was used for database management. Flexmonster was installed and configured in the Angular project, and a connection was established between Flexmonster and the PostgreSQL database using the Flexmonster Data Server. The project was launched using npm start, resulting in a functional pivot table for data analysis. The completed project is available on GitHub.
Tech Optimizer
November 18, 2024
The PostgreSQL Global Development Group has released a critical security update for all supported versions of PostgreSQL, including 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21. The update addresses four security vulnerabilities: 1. CVE-2024-10976: A row security vulnerability with a CVSS v3.1 Base Score of 4.2, affecting versions 12 through 17. 2. CVE-2024-10977: An issue related to libpq error message retention, with a CVSS v3.1 Base Score of 3.1, affecting versions 12 to 17. 3. CVE-2024-10978: A user ID reset issue with a CVSS v3.1 Base Score of 4.2, impacting versions 12 to 17. 4. CVE-2024-10979: A critical vulnerability allowing unprivileged users to alter sensitive process environment variables, with a CVSS v3.1 Base Score of 8.8, affecting versions 12 to 17. This release marks the final update for PostgreSQL 12. The update includes over 35 bug fixes and updates time zone data files to tzdata release 2024b. Users must shut down PostgreSQL and update its binaries to apply the update, with additional steps required for certain scenarios. It is recommended for users running PostgreSQL 12 in production to upgrade to a newer version for continued security and bug fixes.
Search