Remove brief github-search-exploited-for-malware-distribution
article thumbnail

The SOC files: Rumble in the jungle or APT41’s new target in Africa

SecureList

The attackers used hardcoded names of internal services, IP addresses, and proxy servers embedded within their malware. Privilege escalation and lateral movement After a brief lull, the attackers sprang back into action. They distributed the tool as an encrypted file, typically with a TXT or INI extension.

article thumbnail

Outlaw is Back, a New Crypto-Botnet Targets European Organizations

Security Affairs

The Outlaw Hacking Group is back, malware researchers from Cybaze-Yoroi ZLab have uncovered a new botnet that is targeting European organizations. During our daily monitoring activities, we intercepted a singular Linux malware trying to penetrate the network of some of our customers. Introduction. Sample information.

article thumbnail

IT threat evolution Q2 2024

SecureList

Targeted attacks XZ backdoor: a supply chain attack in the making On March 29, a message on the Openwall oss-security mailing list announced the discovery of a backdoor in XZ, a compression utility included in many popular Linux distributions. Upon execution, the malware initiates a series of decoy API calls that serve no practical purpose.

Malware 106