12h05 ▪
3
…
Ethereum has become the latest front for software supply chain attacks.Researchers at ReversingLabs earlier this week uncovered two malicious NPM packages that used Ethereum smart contracts to conceal harmful code,…
In brief
Hackers are using fake Captchas to distribute Lumma Stealer malware, new research has found.
Once installed by an unsuspecting user, the malware searches infected devices for credentials, including crypto wallet…
In brief
Hackers are using fake Captchas to distribute Lumma Stealer malware, new research has found.
Once installed by an unsuspecting user, the malware searches infected devices for credentials, including crypto wallet…
In brief
A game released on Steam Early Access contained malicious software that could have compromised victims' data, according to a report from cybersecurity firm Prodaft.
Steam appears to have pulled the…
In brief
At least 3,500 websites are running a hidden Monero mining script delivered through a malicious injection chain.
Attackers reused access from past campaigns, targeting unpatched sites and e-commerce servers.
The malware…
Cybersecurity firm Kaspersky has warned of a newly discovered malware known as SparkKitty, which steals photos from infected devices in the hopes of finding crypto seed phrases.Kaspersky analysts Sergey Puzan…
A North Korean hacking group is targeting crypto workers with a Python-based malware disguised as part of a fake job application process, researchers at Cisco Talos said earlier this week.Most…
Key Points:North Korean hackers target crypto professionals with PylangGhost malware.Hackers impersonate Coinbase and Uniswap in fake interviews.Focuses on accessing individual crypto wallets and credentials.
North Korean hackers are reportedly targeting cryptocurrency…
In brief
North Korean hackers are targeting crypto professionals with fake job interviews to deploy new Python-based malware, PylangGhost.
The malware steals credentials from 80+ browser extensions, including Metamask and 1Password, and…
