Wednesday, April 29, 2026

Malware

Fake Tax Audits and Updates Fuel Silver Fox Malware Campaign

A China-linked threat group known as Silver Fox is running a new wave of cyber campaigns using fake tax audit notifications and software update lures to deliver malware across...

Fake KYC Android Malware Spreads via WhatsApp to Hijack Bank Accounts

A new Android malware campaign is masquerading as a “Banking KYC” verification app and spreading via WhatsApp messages to target banking users in India....

Fake Document Reader App Hits 10K Downloads, Spreads Anatsa Malware

A newly discovered malicious Android application masquerading as a document reader was found on the Google Play Store, infecting users with the notorious Anatsa...

New Malware Hides Behind Obfuscation and Staged Payloads

A newly identified malware campaign is leveraging advanced obfuscation techniques and multi-stage payload delivery to bypass traditional security defenses, according to recent analysis from...

Fake YouTube Downloads Spread Vidar Malware to Steal Corporate Logins

A new Vidar infostealer campaign is abusing fake software download links on YouTube to compromise corporate employees and sell their stolen credentials on Russian...

Fake Income Tax Notices Used to Spread Malware

Cybercriminals are exploiting India's tax season by launching sophisticated phishing campaigns that impersonate the Income Tax Department to deliver dangerous malware to unsuspecting taxpayers....

Linux ELF Malware Generator Evades ML Detection With Semantic-Preserving Changes

As Linux continues to dominate high-performance computing, cloud services, and Internet of Things (IoT) devices, it has become a prime target for cybercriminals. However,...

North Korean Hackers Target Pharma Firms with Malware-Laced Excel Attacks

North Korean state-backed hackers are using weaponized Excel-themed files to infect pharmaceutical and life science companies with malware, abusing Windows shortcut files, PowerShell, and...

Vidar Malware Conceals Payloads in JPEG, TXT Files to Evade Detection

Vidar has evolved from a basic Arkei-based credential stealer into a multi-stage, stealth-focused infostealer that now hides second‑stage payloads within JPEG and TXT files to...

Fast16 Malware Targets High-Value Systems With Sabotage Capabilities

A previously unknown cyber sabotage framework called fast16, whose core components date back to 2005. This makes it the earliest known sabotage malware of...

Void Dokkaebi Hackers Spread Malware Through Fake Job Interviews

Void Dokkaebi, also known as Famous Chollima, is expanding its cyber operations by turning fake job interviews into a large-scale malware distribution campaign targeting...