The Noodlophile malware campaign uses sophisticated spear-phishing techniques and evasion tactics to target enterprises worldwide. The threat actors continuously update their methods, including exploiting legitimate software vulnerabilities and leveraging Telegram for command-and-control. #Noodlophile #SpearPhishing
Keypoints
- The campaign involves spear-phishing emails impersonating copyright infringement notices to infect organizations.
- Attackers use fake AI-powered tools and social media ads to lure victims into downloading malware.
- Malicious payloads are delivered via Dropbox links in phishing emails, with obfuscated execution techniques.
- The malware leverages Telegram as a covert channel to fetch server information and evade detection.
- Noodlophile is capable of expanding its functionalities, including keylogging, screenshot capture, and file exfiltration.
Read More: https://thehackernews.com/2025/08/noodlophile-malware-campaign-expands.html