Fake government and Starlink apps used in malware campaign targeting Brazil

android
Image: Daniel Romero via Unsplash

Fake government and Starlink apps used in malware campaign targeting Brazil

Researchers discovered new Android malware capable of stealing banking credentials, tampering with cryptocurrency transactions and secretly mining digital currency on infected devices in Brazil.

The malware, dubbed BeatBanker by Russian cybersecurity firm Kaspersky, infects smartphones through fake applications that mimic legitimate services, including the Starlink satellite internet app and the Brazilian government portal INSS Reembolso. Both apps were available for download from a website masquerading as the official Google Play Store.

Once installed, the malware secretly mines the cryptocurrency Monero, draining the victim’s phone battery and processing power while also stealing banking credentials and manipulating cryptocurrency transactions, Kaspersky said in a report earlier this week.

The malware monitors factors such as battery temperature, battery level and user activity to determine when to start or stop the mining process, helping it remain undetected.

To maintain persistence on compromised devices, the malware uses an unusual technique: it continuously plays a nearly inaudible audio file so that the Android system does not terminate the application due to inactivity. Kaspersky noted that the audio file contains several Chinese words but did not attribute the campaign to a specific threat actor.

Beyond mining cryptocurrency, BeatBanker also deploys a banking trojan designed to manipulate digital asset transfers. When victims attempt to send USDT using apps such as Binance or Trust Wallet, the malware overlays the transaction screen with a realistic interface that replaces the intended destination wallet address with one controlled by the attackers.

Researchers also identified another variant of the campaign that uses a fake Starlink application as a lure. In that case, the malware delivers BTMOB, an Android remote-access trojan sold through a malware-as-a-service model.

Once installed, BTMOB gives attackers full remote control of the victim’s phone, including access to the camera, keystrokes, GPS location and other sensitive data. Researchers believe the creators of BeatBanker likely purchased the BTMOB malware from its developers and integrated it into their campaign, replacing the banking module used in earlier infections.

All observed infections linked to BeatBanker were detected in Brazil. Some samples distributing the BTMOB payload appeared to spread through WhatsApp messages and phishing pages.

Android trojans are widely used by cybercriminals to steal sensitive data and financial information. In recent months, researchers have identified other mobile threats, including Herodotus, a banking trojan capable of mimicking human behavior to evade detection, and Crocodilus, which manipulates victims’ contact lists to impersonate trusted phone numbers and bypass bank fraud protections.

Source: The Record — Read original article

Fake government and Starlink apps used in malware campaign targeting Brazil

android
Image: Daniel Romero via Unsplash

Fake government and Starlink apps used in malware campaign targeting Brazil

Researchers discovered new Android malware capable of stealing banking credentials, tampering with cryptocurrency transactions and secretly mining digital currency on infected devices in Brazil.

The malware, dubbed BeatBanker by Russian cybersecurity firm Kaspersky, infects smartphones through fake applications that mimic legitimate services, including the Starlink satellite internet app and the Brazilian government portal INSS Reembolso. Both apps were available for download from a website masquerading as the official Google Play Store.

Once installed, the malware secretly mines the cryptocurrency Monero, draining the victim’s phone battery and processing power while also stealing banking credentials and manipulating cryptocurrency transactions, Kaspersky said in a report earlier this week.

The malware monitors factors such as battery temperature, battery level and user activity to determine when to start or stop the mining process, helping it remain undetected.

To maintain persistence on compromised devices, the malware uses an unusual technique: it continuously plays a nearly inaudible audio file so that the Android system does not terminate the application due to inactivity. Kaspersky noted that the audio file contains several Chinese words but did not attribute the campaign to a specific threat actor.

Beyond mining cryptocurrency, BeatBanker also deploys a banking trojan designed to manipulate digital asset transfers. When victims attempt to send USDT using apps such as Binance or Trust Wallet, the malware overlays the transaction screen with a realistic interface that replaces the intended destination wallet address with one controlled by the attackers.

Researchers also identified another variant of the campaign that uses a fake Starlink application as a lure. In that case, the malware delivers BTMOB, an Android remote-access trojan sold through a malware-as-a-service model.

Once installed, BTMOB gives attackers full remote control of the victim’s phone, including access to the camera, keystrokes, GPS location and other sensitive data. Researchers believe the creators of BeatBanker likely purchased the BTMOB malware from its developers and integrated it into their campaign, replacing the banking module used in earlier infections.

All observed infections linked to BeatBanker were detected in Brazil. Some samples distributing the BTMOB payload appeared to spread through WhatsApp messages and phishing pages.

Android trojans are widely used by cybercriminals to steal sensitive data and financial information. In recent months, researchers have identified other mobile threats, including Herodotus, a banking trojan capable of mimicking human behavior to evade detection, and Crocodilus, which manipulates victims’ contact lists to impersonate trusted phone numbers and bypass bank fraud protections.

Source: The Record — Read original article

AI-generated Slopoly malware used in Interlock ransomware attack

A new malware strain dubbed Slopoly, likely created using generative AI tools, allowed a threat actor to remain on a compromised server for more than a week and steal data in an Interlock ransomware attack.

The breach started with a ClickFix ruse, and in later stages of the attack, the hackers deployed the Slopoly backdoor as a PowerShell script acting as a client for the command-and-control (C2) framework.

IBM X-Force researchers analyzed the script and found strong indicators that it was created using a large language model (LLM), but could not determine which one.

Evidence pointing to AI-assisted development includes extensive commentary in the code, structured logging, error handling, and clearly named variables. All this is rare in human-developed malware.

They attributed the attack to a financially motivated group they track as Hive0163, “whose main objective is extortion through large-scale data exfiltration and ransomware.”

According to the researchers, Slopoly is rather unsophisticated, although its deployment in ransomware operators’ attack chains indicates that AI tools are actively used to accelerate custom malware development, which can help evade detection.

Although comments in the Slopoly script describe it as a “Polymorphic C2 Persistence Client,” IBM X-Force did not find any feature that would allow modifying its own code during execution.

“The script does not possess any advanced techniques and can hardly be considered polymorphic, since it’s unable to modify its own code during execution,” reads the IBM report.

“The builder may, however, generate new clients with different randomized configuration values and function names, which is standard practice among malware builders.”

IBM X-Force researchers believe that Slopoly was generated by a builder that inserted configuration values, such as beaconing intervals, command-and-control addresses, mutex names, and session IDs.

The malware is deployed in C:\ProgramData\Microsoft\Windows\Runtime\, and its main functions include:

  • Collecting system information
  • Sending a heartbeat beacon every 30 seconds to /api/commands
  • Polling for commands every 50 seconds
  • Executing received commands via cmd.exe
  • Sending command output back to the C2 server
  • Maintaining a rotating persistence.log file
  • Establishing persistence through a scheduled task named “Runtime Broker”

The commands it supports allow downloading and executing EXE, DLL, or JavaScript payloads; running shell commands and returning the results; changing beaconing intervals; updating itself; or exiting its own process.

The attack IBM observed started with a ClickFix social engineering flow, and deployed multiple malware components besides Slopoly, including the NodeSnake and InterlockRAT backdoors.

The observed attack chain
Attack chain deploying Slopoly in a later stage
Source: IBM X-Force

Interlock ransomware emerged in 2024 and was an early adopter of the ClickFix social engineering technique, and later also the FileFix variant.

The threat group has previously claimed attacks against high-profile organizations such as the Texas Tech University System, DaVita, Kettering Health, and the city of Saint Paul, Minnesota.

The Interlock ransomware payload observed in the attacks reported by IBM is a 64-bit Windows executable delivered via the JunkFiction loader.

It can execute as a scheduled task running as SYSTEM, and uses Windows Restart Manager API to release locked files, appending the ‘. !NT3RLOCK’ or ‘.int3R1Ock’ extensions on their encrypted copies.

IBM reports that Hive0163 may also have associations with the developers behind Broomstick, SocksShell, PortStarter, SystemBC, and the Rhysida ransomware operators.

Source: BleepingComputer — Read original article

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

Rust-Based VENON Malware

Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that’s written in Rust, marking a significant departure from other known Delphi-based malware families associated with the Latin American cybercrime ecosystem.

The malware, which is designed to infect Windows systems and was first discovered last month, has been codenamed VENON by Brazilian cybersecurity company ZenoX.

What makes VENON notable is that it shares behaviors that are consistent with established banking trojans targeting the region, such as Grandoreiro, Mekotio, and Coyote, specifically when it comes to features like banking overlay logic, active window monitoring, and a shortcut (LNK) hijacking mechanism.

The malware has not been attributed to any previously documented group or campaign. However, an earlier version of the artifact, dating back to January 2026, has been found to expose full paths from the malware author’s development environment. The paths repeatedly reference a Windows machine username “byst4” (e.g., “C:\Users\byst4\…”).

“The Rust code structure presents patterns suggesting a developer familiar with the capabilities of existing Latin American banking trojans, but who used generative AI to rewrite and expand these functionalities in Rust, a language that requires significant technical experience to use at the observed level of sophistication,” ZenoX said.

VENON is distributed by means of a sophisticated infection chain that uses DLL side-loading to launch a malicious DLL. It’s suspected that the campaign leverages social engineering ploys like ClickFix to trick users into downloading a ZIP archive containing the payloads by means of a PowerShell script.

Once the DLL is executed, it performs nine evasion techniques, including anti-sandbox checks, indirect syscalls, ETW bypass, AMSI bypass, before actually initiating any malicious actions. It also reaches out to a Google Cloud Storage URL to retrieve a configuration, install a scheduled task, and establish a WebSocket connection to the command-and-control (C2) server.

Also extracted from the DLL are two Visual Basic Script blocks that implement a shortcut hijacking mechanism exclusively targeting the Itaú banking application. The components work by replacing the legitimate system shortcuts with tampered versions that redirect the victim to a web page under the threat actor’s control.

The attack also supports an uninstall step to undo the modifications, suggesting that the operation can be remotely controlled by the operator to restore the shortcuts to what they originally were to cover up the tracks.

In all, the banking malware is equipped to target 33 financial institutions and digital asset platforms by monitoring the window title and active browser domain, springing into action only when any of the targeted applications or websites are opened to facilitate credential theft by serving fake overlays.

The disclosure comes amid campaigns where threat actors are exploiting the ubiquity of WhatsApp in Brazil to distribute a worm named SORVEPOTEL via the messaging platform’s desktop web version. The attack hinges on abusing previously authenticated chats to deliver malicious lures directly to victims, ultimately resulting in the deployment of banking malware such as Maverick, Casbaneiro, or Astaroth.

“A single WhatsApp message delivered through a hijacked SORVEPOTEL session was sufficient to draw a victim into a multi-stage chain that ultimately resulted in an Astaroth implant running fully in memory,” Blackpoint Cyber said.

“The combination of local automation tooling, unsupervised browser drivers, and user-writable runtimes created an unusually permissive environment, allowing both the worm and the final payload to establish themselves with minimal friction.”

Source: The Hacker News — Read original article

Google paid $17.1 million for vulnerability reports in 2025

Google paid over $17 million to 747 security researchers who reported security bugs through its Vulnerability Reward Program (VRP) in 2025.

The company says it has awarded over $81.6 million in bug bounties since the first Vulnerability Reward Program went live in 2010, while the highest reward paid last year was of $250,000.

“Our VRP once again confirmed the ongoing value of engaging with the external security research community to make Google and its products safer,” Google said.

“This was more evident than ever as we awarded over $17 million (an all-time high and more than 40% increase compared to 2024!) to over 700 researchers based in countries around the globe – across all of our programs.”

Among last year’s highlights, Google launched an AI Vulnerability Rewards Program for security researchers targeting the company’s AI systems and added new reward categories to the Chrome VRP for AI bugs.

It also launched a rewards program for OSV-SCALIBR, the company’s open source tool for finding security flaws in software dependencies.

In 2025, the Android and Google Devices Security Reward Program paid over $2,900,000, the Chrome security team awarded $3,716,750 to over 100 reporters, while 143 researchers were rewarded $3,574,399 during the Cloud Vulnerability Reward Program’s first full year of operation.

Google Vulnerability Reward Program in 2025
Google Vulnerability Reward Program in 2025 (Google)

​​Last year, Google awarded another $12 million to 660 security researchers who found and reported vulnerabilities throughout 2024.

The highest bug bounty of 2024 was $100,115 for a MiraclePtr Bypass, after Google more than doubled rewards for MiraclePtr bypasses to $250,128 from $100,115 when the program launched.

“Our goal remains to stay ahead of emerging threats, adapt to evolving technologies, and continue to strengthen the security posture of Google’s products and services – all of which is only possible in collaboration with the external community of researchers we are so lucky to collaborate with,” Google added.

“In this spirit, we’d like to extend a huge thank you to our bug hunter community for helping us make Google products and platforms more safe and secure for our users around the world – and invite researchers not yet engaged with the Vulnerability Reward Program to join us in our mission to keep Google safe.”

Source: BleepingComputer — Read original article

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud.

The Android malware range from traditional banking trojans like PixRevolution, TaxiSpy RAT, BeatBanker, Mirax, and Oblivion RAT to full-fledged remote administration tools such as SURXRAT.

PixRevolution, according to Zimperium, targets Brazil’s Pix instant payment platform, hijacking victims’ money transfers in real-time to route them to the threat actors instead of the intended payee.

“This new strain of malware operates stealthily within the device until the moment the victim initiates a Pix transfer,” security researcher Aazim Yaswant said. “What distinguishes this threat from conventional banking trojans is its fundamental design: a human or AI agent operator is actively engaged on the remote end, observing the victim’s phone screen instantaneously, poised to act at the precise moment of transaction.”

The Android malware propagates via fake Google Play Store app listing pages for apps like Expedia, Sicredi, and Correios to trick users into installing the malicious dropper APK files. Once installed, the apps urge users to enable accessibility services to realize their goals.

It also connects to an external server over TCP on port 9000 to send periodic heartbeat messages containing device information and activate real-time screen capture using Android’s MediaProjection API. The main functionality of PixRevolution, though, is the monitoring of the victim’s screen and serving a fake overlay as soon as a victim enters the desired amount and the Pix key of the recipient to initiate the payment.

At that point, the trojan shows a fake WebView overlay that says “Aguarde…” (meaning “wait” in Portuguese/Spanish), while, in the background, it edits the Pix key with that of the attacker’s to complete the funds transfer. In the final stage, the overlay is removed, and the victim is displayed a “transfer complete” confirmation screen in the Pix app.

“From the victim’s perspective, nothing unusual happened,” Yaswant said. “The app briefly showed a loading indicator, something that occurs routinely during legitimate banking operations. The transfer was confirmed successfully. The amount they intended to send was deducted from their account.”

“It is only later, sometimes much later, that the victim discovers the money went to the wrong account. And because Pix transfers are instant and final, recovery is extraordinarily difficult.”

Brazilian users have also become the target of another Android‑based malware campaign called BeatBanker, which spreads primarily through phishing attacks via a website disguised as the Google Play Store. BeatBanker gets its name from the use of an unusual persistence mechanism that involves playing an almost inaudible audio file, a 5-second recording featuring Chinese words, on a loop to prevent it from being terminated.

Besides incorporating runtime checks for emulated or analysis environments, the malware monitors battery temperature and percentage, and verifies whether the user is using the device to start or stop the Monero miner as required. It uses Google’s Firebase Cloud Messaging (FCM) for command‑and‑control (C2).

“To achieve their goals, the malicious APKs carry multiple components, including a cryptocurrency miner and a banking trojan capable of completely hijacking the device and spoofing screens, among other things,” Kaspersky said. “When the user tries to make a USDT transaction, BeatBanker creates overlay pages for Binance and Trust Wallet, covertly replacing the destination address with the threat actor’s transfer address.”

The banking module also monitors web browsers like Chrome, Edge, Firefox, Brave, Opera, DuckDuckGo, Dolphin Browser, and sBrowser to URLs accessed by the victim. In addition, it supports the ability to receive a long list of commands from the server to collect personal information and gain complete control of the device.

Recent iterations of the campaign have been found to drop BTMOB RAT instead of the banking module. It provides operators with comprehensive remote control, persistent access, and surveillance over compromised devices. BTMOB is assessed to be an evolution of CraxsRAT, CypherRAT, and SpySolr families, all of which have been linked to a Syrian threat actor who goes by the online alias EVLF.

“We also saw the distribution and sale of leaked BTMOB source code on some dark web forums,” the Russian security vendor said. “This may suggest that the creator of BeatBanker acquired BTMOB from its original author or the source of the leak and is utilizing it as the final payload.”

TaxiSpy RAT, similar to PixRevolution, abuses Android’s accessibility service and MediaProjection APIs to collect SMS messages, contacts, call logs, clipboard contents, installed apps list, notifications, lock screen PINs, and keystrokes, as well as target Russian banking, cryptocurrency, and government apps by serving overlays to conduct credential theft.

The malware combines traditional banking trojan functionality with full RAT capabilities, enabling threat actors to gather sensitive data and execute commands sent via Firebase push messages. Several TaxiSpy samples have been discovered by both CYFIRMA and Zimperium, indicating active efforts on the part of attackers to evade signature-based detection and blacklist defenses.

“The malware leverages advanced evasion techniques, such as native library encryption, rolling XOR string obfuscation, and real-time VNC-like remote control via WebSocket,” CYFIRMA said. “Its design allows comprehensive device surveillance, including SMS, call logs, contacts, notifications, and banking app monitoring, highlighting its financially motivated and region-specific focus.”

Another Android banking trojan of note is Mirax, which has been advertised by a threat actor named Mirax Bot as a private malware-as-a-service (MaaS) offering for a monthly price of $2,500 for a full version or $1,750 for a light variant. Mirax claims to offer banking overlays, information gathering (e.g., keystrokes, SMS, lock patterns), and a SOCKS5 proxy to route malicious traffic through compromised devices.

Mirax is not the only Android MaaS offering detected in recent months. A new Android remote access trojan called Oblivion is being sold for around $300 per month (or $1,900 per year and $2,200 for lifetime access) and claims to bypass detection and security features on devices from major manufacturers.

Once installed, the malware employs an automated permission-granting mechanism that requires no interaction from the victim. This approach, per the seller, works across MIUI / HyperOS (Xiaomi), One UI (Samsung), ColorOS (OPPO), MagicOS (Honor), and OxygenOS (OnePlus).

“What sets it apart isn’t any single feature. It’s the combination: automated permission bypass, hidden remote control, deep persistence, and a point-and-click builder that puts all of it within reach of would-be hackers with even the most minimal level of technical skill,” Certos said.

“Google has made progressive restrictions on accessibility service abuse a priority across successive Android versions. A tool that credibly bypasses those protections on the latest release – and does so across devices from Samsung, Xiaomi, OPPO, and others – represents a genuine challenge to platform-level defenses.”

Also commercially distributed through a Telegram-based MaaS ecosystem is an Android malware family called SURXRAT, which is assessed to be an improved version of Arsink. The malware abuses accessibility permissions for persistent control and communicates with a Firebase-based C2 infrastructure to commandeer infected devices. The malware is marketed on a Telegram channel managed by an Indonesian threat actor.

What’s notable about some of the new samples is the presence of a large language model (LLM) component, indicating that the threat actors behind the malware are experimenting with artificial intelligence (AI) capabilities, along with traditional surveillance. That said, the download of the LLM module is triggered only when specific gaming applications are active on the victim’s device, or when it receives alternative target package names dynamically from the server –

  • Free Fire MAX x JUJUTSU KAISEN (com.dts.freefiremax)
  • Free Fire x JUJUTSU KAISEN (com.dts.freefireth)

Select SURXRAT samples also incorporate a ransomware-style screen locker module that makes it possible for a remote operator to hijack control of a victim’s device and deny access by displaying a full-screen lock message until a payment is made.

“This evolution highlights how existing Android RAT frameworks continue to be repurposed and expanded by threat actors, accelerating malware development cycles and enabling rapid introduction of new surveillance and control functionalities,” Cyble said. “The observed experimentation with large AI model integration further indicates that threat actors are actively exploring emerging technologies to enhance operational effectiveness and evade detection.”

Source: The Hacker News — Read original article

Contagious Interview: Malware delivered through fake developer job interviews

Microsoft Defender Experts has observed the Contagious Interview campaign, a sophisticated social engineering operation active since at least December 2022. Microsoft continues to detect activity associated with this campaign in recent customer environments, targeting software developers at enterprise solution providers and media and communications firms by abusing the trust inherent in modern recruitment workflows.

Threat actors repeatedly achieve initial access through convincingly staged recruitment processes that mirror legitimate technical interviews. These engagements often include recruiter outreach, technical discussions, assignments, and follow-ups, ultimately persuading victims to execute malicious packages or commands under the guise of routine evaluation tasks.

This campaign represents a shift in initial access tradecraft. By embedding targeted malware delivery directly into interview tools, coding exercises, and assessment workflows developers inherently trust, threat actors exploit the trust job seekers place in the hiring process during periods of high motivation and time pressure, lowering suspicion and resistance.

Attack chain overview

Initial access

As part of a fake job interview process, threat actors pose as recruiters from cryptocurrency trading firms or AI-based solution providers. Victims who fall for the lure are instructed to clone and execute an NPM package hosted on popular code hosting platforms such as GitHub, GitLab, or Bitbucket. In this scenario, the executed NPM package directly loads a follow-on payload.

Execution of the malicious package triggers additional scripts that ultimately deploy the backdoor in the background. In recent intrusions, threat actors have adapted their technique to leverage Visual Studio Code workflows. When victims open the downloaded package in Visual Studio Code, they are prompted to trust the repository author. If trust is granted, Visual Studio Code automatically executes the repository’s task configuration file, which then fetches and loads the backdoor.

A typical repository hosted on Bitbucket, posing as a blockchain-powered game.
Sample task found in the repository (right: URL shortener redirecting to vercel.app).

Follow-up payloads: Invisible Ferret

In the early stages of this campaign, Invisible Ferret was primarily delivered via BeaverTail, an information stealer that also functioned as a loader. In more recent intrusions, however, Invisible Ferret is predominantly deployed as a follow-on payload, introduced after initial access has been established through the beaconing agent or OtterCookie.

Invisible Ferret is a Python-based backdoor used in later stages of the attack chain, enabling remote command execution, extended system reconnaissance, and persistent control after initial access has been secured by the primary backdoor.

Process tree snippet from an incident where the beaconing agent deploys Invisible Ferret.

Other Campaigns

Another notable backdoor observed in this campaign is FlexibleFerret, a modular backdoor implemented in both Go and Python variants. It leverages encrypted HTTP(S) and TCP command and control channels to dynamically load plugins, execute remote commands, and support file upload and download operations with full data exfiltration. FlexibleFerret establishes persistence through RUN registry modifications and includes built-in reconnaissance and lateral movement capabilities. Its plugin-based architecture, layered obfuscation, and configurable beaconing behavior contribute to its stealth and make analysis more challenging.

While Microsoft Defender Experts have observed FlexibleFerret less frequently than the backdoors discussed in earlier sections, it remains active in the wild. Campaigns deploying this backdoor rely on similar social engineering techniques, where victims are directed to a fraudulent interview or screening website impersonating a legitimate platform. During the process, users encounter a fabricated technical error and are instructed to copy and paste a command to resolve the issue. This command retrieves additional payloads, ultimately leading to the execution of the FlexibleFerret backdoor.

Code quality observations

Recent samples exhibit characteristics that differ from traditionally engineered malware. The beaconing agent script contains inconsistent error handling, empty catch blocks, and redundant reporting logic that appear minimally refined. Similarly, the FlexibleFerret Python variant combines tutorial-style comments, emoji-based logging, and placeholder secret key markers alongside functional malware logic.

These patterns, including instructional narrative structure and rapid iteration cycles, suggest development workflows that prioritize speed and functional output over refined engineering. While these characteristics may indicate the use of development acceleration tools, they primarily reflect evolving threat actor development practices and rapid tooling adaptation that enable quick iteration on malicious code.

Snippets from the Python variant of FlexibleFerret highlighting tutorial‑style comments and AI‑assisted code with icon‑based logging.

Security implications

This campaign weaponizes hiring processes into a persistent attack channel. Threat actors exploit technical interviews and coding assessments to execute malware through dependency installations and repository tasks, targeting developer endpoints that provide access to source code, CI/CD pipelines, and production infrastructure.

Threat actors harvest API tokens, cloud credentials, signing keys, cryptocurrency wallets, and password manager artifacts. Modular backdoors enable infrastructure rotation while maintaining access and complicating detection.

Organizations should treat recruitment workflows as attack surfaces by deploying isolated interview environments, monitoring developer endpoints and build tools, and hunting for suspicious repository activity and dependency execution patterns.

Mitigation and protection guidance

Harden developer and interview workflows

  • Use a dedicated, isolated environment for coding tests and take-home assignments (for example, a non-persistent virtual machine). Do not use a primary corporate workstation that has access to production credentials, internal repositories, or privileged cloud sessions.
  • Establish a policy that requires review of any recruiter-provided repository before running scripts, installing dependencies, or executing tasks. Treat “paste-and-run” commands and “quick fix” instructions as high-risk.
  • Provide guidance to developers on common red flags: short links redirecting to file hosts, newly created repositories or accounts, unusually complex “assessment” setup steps, and instructions that request disabling security controls or trusting unknown repository authors.

Reduce attack surface from tools commonly abused in this campaign

  • Ensure tamper protection and real-time antivirus protection are enabled, and that endpoints receive security updates. These campaigns often rely on script execution and commodity tooling rather than exploiting a single vulnerability, so layered endpoint protection remains effective.
  • Restrict scripting and developer runtimes where possible (Node.js, Python, PowerShell). In high-risk groups, consider application control policies that limit which binaries can execute and where they can be launched from (for example, preventing developer tool execution from Downloads and temporary folders).
  • Monitor for and consider blocking common “download-and-execute” patterns used as stagers, such as curl/wget piping to shells, and outbound requests to low-reputation hosts used to serve payloads (including short-link redirection services).

Protect secrets and limit downstream impact

  • Reduce the exposure of secrets on developer endpoints. Use just-in-time and short-lived credentials, store secrets in vaults, and avoid long-lived tokens in environment files or local configuration.
  • Enforce multifactor authentication and conditional access for source control, CI/CD, cloud consoles, and identity providers to mitigate credential theft from compromised endpoints.
  • Review and restrict access to password manager vaults and developer signing keys. This campaign explicitly targets artifacts such as wallet material, password databases, private keys, and other high-value developer-held secrets.

Detect, investigate, and respond

  • Hunt for execution chains that start from a code editor or developer tool and quickly transition into shell or scripting execution (for example, Visual Studio Code/Cursor App→ cmd/PowerShell/bash → curl/wget → script execution). Review repository task configurations and build scripts when such chains are observed.
  • Monitor Node.js and Python processes for behaviors consistent with this campaign, including broad filesystem enumeration for credential and key material, clipboard monitoring, screenshot capture, and HTTP POST uploads of collected data.
  • If compromise is suspected, isolate the device, rotate credentials and tokens that may have been exposed, review recent access to code repositories and CI/CD systems, and assess for follow-on payloads and persistence.

Microsoft Defender XDR detections

Microsoft Defender XDR customers can refer to the list of applicable detections below. Microsoft Defender XDR coordinates detection, prevention, investigation, and response across endpoints, identities, email, and apps to provide integrated protection against attacks like the threat discussed in this blog.

TacticObserved ActivityMicrosoft Defender Coverage
Executioncurl or wget command launched from NPM package to fetch script from vercel.app or URL shortnerMicrosoft Defender for Endpoint
Suspicious process execution
ExecutionBackdoor (Beaconing agent, OtterCookie, InvisibleFerret, FlexibleFerret) executionMicrosoft Defender for Endpoint
Suspicious Node.js process behavior
Possible OtterCookie malware activity
Suspicious Python library load
Suspicious connection to remote service

Microsoft Defender for Antivirus
Suspicious ‘BeaverTail’ behavior was blocked

Credential AccessEnumerating sensitive dataMicrosoft Defender for Endpoint
Enumeration of files with sensitive data
DiscoveryGathering basic system information and enumerating sensitive dataMicrosoft Defender for Endpoint
System information discovery
Suspicious System Hardware Discovery
Suspicious Process Discovery
CollectionClipboard data read by Node.js scriptMicrosoft Defender for Endpoint
Source: Microsoft Security Blog — Read original article

Iran-linked hackers claim cyberattack on Albania’s parliament email systems

albania parliament
Image: Pasztilla aka Attila Terbócs via Wikimedia Commons (CC BY 4.0)

Iran-linked hackers claim cyberattack on Albania’s parliament email systems

Albania’s parliament said late Tuesday that it had been targeted by a “sophisticated” cyberattack aimed at deleting data and compromising several internal systems.

In a statement shared with local media, parliament said its main systems and official website remained operational but confirmed that internal email services used by the parliamentary administration had been temporarily suspended. The disruption affected both incoming and outgoing communications.

Local media reported that parliamentary staff and lawmakers were unable to access computers and email systems for several hours following the attack.

Authorities have not publicly attributed the incident, but earlier this week a hacker group known as Homeland Justice claimed responsibility, saying it had obtained internal communications involving Albanian lawmakers. The group also posted screenshots of what it said were leaked documents on its Telegram channel.

Albanian authorities have not publicly verified the hackers’ claims and the country’s cybersecurity agencies are still investigating the incident.

Homeland Justice has previously been linked by security researchers and Western officials to Iran’s Islamic Revolutionary Guard Corps (IRGC). The group has claimed responsibility for a series of cyberattacks against Albanian targets in recent years, including operations against the country’s parliament, national airline, telecommunications firms and national statistics agency.

The latest incident comes amid heightened security concerns in Albania following retaliatory actions by Iran against countries hosting U.S. military bases after the United States and Israel began bombing Tehran in recent weeks.

Many of the cyber operations attributed to Homeland Justice have been linked to Albania’s hosting of members of the Iranian opposition group Mujahedeen-e-Khalq (MEK), who are based in the coastal county of Durrës.

In a Telegram post on Tuesday, Homeland Justice said the latest cyberattack was retaliation for Albania’s support of MEK.

The claim follows recent statements by MEK leader Maryam Rajavi announcing the formation of what she described as a provisional government aimed at replacing Iran’s current leadership with a democratic republic.

Source: The Record — Read original article

KadNap bot compromises 14,000+ devices to route malicious traffic

KadNap malware infects 14,000+ edge devices, mainly Asus routers, turning them into a stealth proxy botnet used to route malicious internet traffic.

KadNap malware infects more than 14,000 edge devices, mainly ASUS routers, and turns them into a proxy botnet used to route malicious traffic. First detected in August 2025, the campaign heavily targets the United States, which accounts for over 60% of infections. Researchers also observed victims across several countries, including Taiwan, Hong Kong, the U.K., Brazil, France, Italy, and Spain.

The malware hides its command infrastructure using a peer-to-peer system based on the Kademlia protocol, making detection harder. Infected devices route malicious traffic through a proxy service called Doppelganger, likely a rebrand of the Faceless network linked to TheMoon malware.

In August 2025, researchers identified over 10,000 ASUS routers communicating with suspicious servers. A malicious script downloaded and installed KadNap malware, setting up persistence through scheduled tasks and executing a malicious binary. Using a custom version of the Kademlia peer-to-peer system allows the malware to hide command-and-control servers, and infected devices to locate them without exposing their real IP addresses.

“KadNap employs a custom version of the Kademlia Distributed Hash Table (DHT) protocol, which is used to conceal the IP address of their infrastructure within a peer-to-peer system to evade traditional network monitoring.” reads the report published by Lumen. “Infected devices use the DHT protocol to locate and connect with a command-and-control (C2) server, while defenders cannot easily find and add those C2s to threat lists.”

KadNap installs as an ELF binary on infected devices and runs on both ARM and MIPS systems. The bot hides activity by redirecting input and output to /dev/null, then collects the device’s external IP and synchronizes time using public NTP servers. The malware uses this data to generate hashes and join a peer-to-peer network based on the Kademlia protocol.

It connects to peers, exchanges encrypted data, and downloads additional payloads such as scripts that modify firewall rules or open new communication channels.

KadNap “find_peers” implementation of the Kademlia DHT protocol. Creates a custom hash and then stores that value.
KadNap “find_peers” implementation of the Kademlia DHT protocol. Creates a custom hash and then stores that value.

One payload stores command-and-control addresses, allowing the malware to contact remote servers, receive instructions, and execute files. This process lets infected devices join the botnet and maintain persistent communication with attacker’s infrastructure.

Analysis shows KadNap uses a weak custom implementation of the Kademlia network. Instead of dynamically reaching different peers, infected devices always contact the same two intermediary nodes before connecting to command-and-control servers.

“In a true Kademlia peer-to-peer network, the final peer changes over time, reflecting its decentralized nature. However, in analyzing our KadNap samples dating back to August 2025, we consistently found the same two final hop nodes before reaching the C2 servers.” continues the report. “This indicates the attackers maintain persistent nodes to retain control over the network. Those two longstanding nodes were 45.135.180[.]38 and 45.135.180[.]177.”

The experts conclude that the KadNap botnet differs from many proxy botnets because it uses a decentralized peer-to-peer network based on the Kademlia protocol.

“Their intention is clear: avoid detection and make it difficult for defenders to protect against. KadNap’s bots are sold through Doppelganger, a service whose users leverage these hijacked devices for a range of malicious purposes, including brute-force attacks and highly targeted exploitation campaigns.” concludes the report. “As a result, every IP address associated with this botnet represents a significant, persistent risk to organizations and individuals alike.”

Source: SecurityAffairs — Read original article

New ‘BlackSanta’ EDR killer spotted targeting HR departments

For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.

Described as “sophisticated,” the campaign mixes social engineering with advanced evasion techniques to steal sensitive information from compromised systems.

It is unclear how the attack begins, but researchers at Aryaka, a network and security solutions provider, suspect that the malware is distributed via spear-phishing emails.

They believe that targets are directed to download ISO image files that appear as resumes and are hosted on cloud storage services, such as Dropbox.

One malicious ISO analyzed contained four files: a Windows shortcut (.LNK) disguised as a PDF file, a PowerShell script, an image, and a .ICO file.

ISO file contents
ISO file contents
Source: Aryaka

The shortcut launches PowerShell and executes the script, which extracts data hidden in the image file using steganography and executes it in system memory.

The code also downloads a ZIP archive containing a legitimate SumatraPDF executable and a malicious DLL (DWrite.dll) to load using the DLL sideloading technique.

Decrypted PowerShell script
Decrypted PowerShell script
Source: Aryaka

The malware performs system fingerprinting and sends the information to the command-and-control (C2) server, and then performs extensive environment checks to stop execution if sandboxes, virtual machines, or debugging tools are detected.

It also modifies Windows Defender settings to weaken security at the host, performs disk-write tests, and then downloads additional payloads from the C2, which are executed via process hollowing, inside legitimate processes.

BlackSanta EDR killer

A key component delivered in the campaign is an executable identified as the BlackSanta EDR killer, a module that silences endpoint security solutions before deploying malicious payloads.

BlackSanta adds Microsoft Defender exclusions for ‘.dls’ and ‘.sys’ files, and modifies a Registry value to reduce telemetry and automatic sample submission to Microsoft security cloud endpoints.

The researchers’ report notes that BlackSanta can also suppress Windows notifications to minimize or completely silence user alerts. The core function of BlackSanta is to terminate security processes, which it does by:

  1. enumerating running processes
  2. comparing the names against a large hardcoded list of antivirus, EDR, SIEM, and forensic tools
  3. retrieving the matching process IDs
  4. using the loaded drivers to unlock and terminate those processes at the kernel level
Part of the hardcoded list
Source: Aryaka

Aryaka did not share details about the target organizations or the threat actors behind the campaign, and couldn’t retrieve the final payload used in the observed case, as the C2 server was unavailable at the time of their examination.

The researchers were able to identify additional infrastructure used by the same threat actor and discovered multiple IP addresses related to the same campaign. This is how they learned that the operation had been running unnoticed for the past year.

Looking at the IP addresses, the researchers uncovered that the malware also downloaded Bring Your Own Driver (BYOD) components that included the RogueKiller Antirootkit driver v3.1.0 from Adlice Software, and IObitUnlocker.sys v1.2.0.1 from IObit.

These drivers have been used in malware operations to gain elevated privileges on the compromised machine and suppress security tools.

RogueKiller (truesight.sys) allows manipulation of kernel hooks and memory monitoring, while IObitUnlocker.sys allows bypassing file and process locks. This combination provides the malware with low-level access to system memory and processes.

Aryaka researchers say the threat actor behind the campaign shows strong operational security and uses context-aware, stealthy infection chains to deploy components such as BlackSanta EDR.

Source: BleepingComputer — Read original article