TAXISPY RAT : Analysis of TaxiSpy RAT – Russian Banking – Focused Android Malware with Full Remote Control – CYFIRMA

Analysis of a sophisticated Android banking Trojan (tracked as TaxiSpy) reveals integrated RAT functionality, native library obfuscation, rolling XOR string encryption, Firebase-backed C2, and real-time VNC-like remote control specifically targeting Russian banking apps. The malware exfiltrates SMS, contacts, call logs, notifications, clipboard and keylogging data, can become the default SMS app, and communicates with C2 at 193.233.112[.]229 while using identifiers like worker key 9bc096a5f4ec7ba133d743cbaf4b8a2e. #TaxiSpy #RuTaxi

Read More
Fake imToken Chrome Extension Steals Seed Phrases via Phishi…

Socket’s Threat Research Team discovered a malicious Chrome extension, lmToken Chromophore (extension ID bbhaganppipihlhjgaaeeeefbaoihcgi), that impersonates imToken while posing as a hex color visualizer and immediately redirects users to threat actor-controlled phishing pages. The extension fetches a remote target from a hardcoded JSONKeeper endpoint and opens lookalike domains that capture 12/24-word seed phrases or private keys, enabling immediate wallet takeover. #imToken #lmTokenChromophore

Read More
Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition | Google Cloud Blog

This blog post provides comprehensive, practical guidance to prepare for, detect, and recover from destructive cyberattacks by hardening identity, backups, virtualization, cloud, OT/IT segmentation, and CI/CD/Kubernetes pipelines while listing detection opportunities and recommended controls. It also includes actionable detection rules and resilience practices (examples: BABYWIPER detection rules, domain controller backup commands) to reduce impact and speed recovery. #BABYWIPER #ActiveDirectory

Read More
An Investigation Into Years of Undetected Operations Targeting High-Value Sectors

Since at least 2020, a China‑communicating threat cluster tracked as CL-UNK-1068 has targeted high‑value organizations across South, Southeast and East Asia using web shells, custom and open‑source tools, DLL side‑loading, FRP tunneling and extensive credential theft. The group’s toolkit includes GodZilla, AntSword, Xnote, ScanPortPlus and custom FRP variants and the activity…

Read More
New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages

BoryptGrab is a newly identified data‑stealing stealer delivered via SEO‑optimized fake GitHub repositories and deceptive download pages that harvests browser data, cryptocurrency wallet information, system data, screenshots, Telegram/Discord tokens, and other files. The campaign uses multiple staged download routes (DLL side‑loading, VBS and .NET downloaders, Golang loaders) and delivers additional payloads…

Read More
Fake CleanMyMac site installs SHub Stealer and backdoors crypto wallets

A fake CleanMyMac website tricks macOS users into pasting a Terminal command that downloads and executes a loader which installs SHub Stealer to harvest passwords, Keychain contents, browser data, cryptocurrency wallets, and Telegram sessions. The malware also backdoors Electron-based wallet apps (Exodus, Atomic Wallet, Ledger Wallet, Ledger Live, Trezor Suite), installs…

Read More
Dark Web Profile: APT41

APT41 is a long-running, China-linked intrusion set that operates with a dual mission of state-aligned espionage and financially motivated cybercrime, using rapid vulnerability weaponization and long-dwell, living-off-the-land tradecraft. The group has exploited a range of public-facing systems and cloud services (including Log4Shell and Google Calendar-based C2) and has been tied to campaigns such as TOUGHPROGRESS and U.S. state government intrusions. #APT41 #TOUGHPROGRESS

Read More
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company

Seedworm (aka MuddyWater/Temp Zagros/Static Kitten) has been observed active on multiple U.S. corporate and NGO networks since February 2026, deploying novel backdoors (Dindoor using Deno, and Python-based Fakeset) and attempting exfiltration via Rclone to cloud storage. The activity involved signed malware (certificates issued to “Amy Cherne” and “Donald Gay”), hosting on Backblaze S3 endpoints, and links to previously observed Stagecomp/Darkcomp activity, indicating a coordinated Iranian espionage campaign with potential for disruptive follow-on attacks. #Seedworm #Dindoor

Read More
Learn more about the DEV#POPPER remote access trojan and how to protect your organization from this threat.

eSentire TRU analyzed a multi-stage supply-chain attack where a weaponized GitHub repository named “ShoeVista” deployed highly obfuscated Node.js and Python stagers to retrieve DEV#POPPER RAT and the OmniStealer payloads from blockchain transactions and remote C2 servers. The campaign—attributed with high confidence to a North Korean state-sponsored APT—focused on developer-targeted credential and crypto-wallet theft; eSentire published tooling (DEV#STOPPER.js), detection guidance, and remediation recommendations. #DEVPOPPER #OmniStealer

Read More
ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader

Cyble identified ClipXDaemon, an autonomous Linux clipboard hijacker that targets X11 sessions to intercept and replace copied cryptocurrency wallet addresses with attacker-controlled addresses, operating entirely without network command-and-control. The threat is delivered via a bincrypter-based encrypted shell loader, stages an in-memory dropper and a persisted ELF under ~/.local/bin, and uses ChaCha20-encrypted regexes, process masquerading, and Wayland avoidance to evade detection. #ClipXDaemon #X11

Read More
MAAS VIP_Keylogger Campaign

An email-based campaign delivers a RAR attachment that unpacks an executable which loads VIP_Keylogger entirely in memory via steganography, AES decryption, and process hollowing or CLR-based loading depending on the sample. K7Labs analysed two kill-chains, detailed the keylogger’s data-stealing features and exfiltration methods, and provided IOCs including hashes, C2 domains and an IP address. #VIP_Keylogger #K7Labs

Read More
A Threat Actor Landscape Assessment of ICS/OT Targeting in the 2026 Iran-US Conflict AND THE SCALE OF THE RISK

The report warns that a long‑building cyber threat to US critical infrastructure has accelerated, driven by nation‑state APTs, proxies, and dozens of hacktivist groups exploiting internet‑exposed ICS devices, phishing OT personnel, and long‑dwell IT‑to‑OT intrusions. Immediate defensive actions recommended include removing ICS interfaces from the internet, changing default credentials (e.g., Unitronics 1111), blocking industrial protocol ports, and auditing MSP/RMM access #VoltTyphoon #Unitronics

Read More
Look What You Made Us Patch: 2025 Zero-Days in Review

GTIG tracked 90 zero-days exploited in the wild in 2025, with a record 48% targeting enterprise technologies and notable increases in OS and mobile exploitation while browser exploitation declined. The report highlights rising commercial surveillance vendor activity, sustained PRC‑nexus focus on edge/security appliances, high-profile chains such as the SonicWall full-chain and DNG-based Samsung exploits, and warns that AI will accelerate both exploit discovery and exploit development. #BRICKSTORM #SonicWall

Read More
The Iran War: What You Need to Know

The United States and Israel launched coordinated strikes on Iran (Operation Epic Fury / Operation Lion’s Roar) that killed Supreme Leader Ali Khamenei and senior commanders, triggering widespread Iranian missile and drone retaliation across the region and significant commercial disruption such as a 90% decline in Strait of Hormuz transits and Qatar declaring force majeure. Cyber and influence operations are already active and expected to escalate, with identified Iranian-aligned hacktivist and IO networks (e.g., Handala Hack Team, Storm-2035) likely to employ scanning, brute forcing, password spraying, DDoS, and targeted influence campaigns. #HandalaHackTeam #APT34

Read More