Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

    • Cyber Attack & Data Breach
    • Daily Recap
    • Disclaimer
    • Hacked: Web Defacement
    • Security Report
    • Web Statistics
    • YouTube Overview
    • Welcome!
    • Threat Research
    • Security News
    • Ransom Monitor
    • Interesting Stuff

Tag: SUPPLY CHAIN

Threat Research

Analysis of Attack Cases: From Korean VPN Installations to MeshAgent Infections – ASEC BLOG

May 18, 2023October 16, 2025 Securonix

ASEC documents renewed campaigns distributing SparkRAT through a VPN installer, aided by GoLang-based droppers and MeshAgent to enable remote control via MeshCentral. The operation mirrors past activity but shifts to GoLang malware while expanding remote-deskt…

Read More
Threat Research

RATs found hiding in the npm attic

May 12, 2023October 22, 2025 Securonix

Researchers from ReversingLabs uncovered malicious npm packages that masquerade as legitimate dependencies, embedding a TurkoRat-based PE and enabling data theft. The attacks leverage typosquatting and deceptive naming to spread, and when the pieces are analyz…

Read More
Threat Research

SparkRAT Being Distributed Within a Korean VPN Installer – ASEC BLOG

May 12, 2023October 14, 2025 Securonix

ASEC reports SparkRAT was found distributed inside a VPN installer, indicating a supply-chain style compromise. The dropper creates SparkRAT in a local path, registers it for persistence, and enables remote control, information theft, and other malicious actio…

Read More
Threat Research

Package names repurposed to push malware on PyPI

April 20, 2023October 15, 2025 Securonix

A malicious PyPI package named termcolour reappeared in March as a three-stage downloader, illustrating how repurposing an abandoned package name can seed a supply-chain attack. The incident shows how PyPI’s name-reuse policy and lack of visibility into who re…

Read More
Threat Research

X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe

April 19, 2023October 13, 2025 Securonix

Symantec’s Threat Hunter Team links a broader X_Trader software supply chain attack to multiple victims, including two critical infrastructure organizations in the energy sector in the U.S. and Europe, plus two other financial trading firms. The operation uses…

Read More
Threat Research

Following the Lazarus group by tracking DeathNote campaign

April 5, 2023October 20, 2025 Securonix

The Lazarus group’s DeathNote cluster uses weaponized Word documents with decoys related to cryptocurrency to drop multi-stage payloads, evolving to target defense contractors and supply chains with new infection methods like remote template injection and Troj…

Read More
Threat Research

Analysis of the First NuGet (.Net) Malicious Package Attack | JFrog

April 5, 2023October 16, 2025 Securonix

JFrog Security analyzes a NuGet supply-chain attack delivering Impala Stealer, a custom crypto stealer used against Exodus Wallet via typosquatting NuGet packages. The campaign uses a two-stage payload: a PowerShell init.ps1 that downloads and runs a Windows e…

Read More
Threat Research

Who Broke NPM?: Malicious Packages Flood Leading to Denial of Service

April 4, 2023October 14, 2025 Securonix

Malicious campaigns targeting open-source npm ecosystems trigger a flood of spam, SEO poisoning, and malware infections, leading to npm instability and service outages. The operations span malware drops, referral scams tied to AliExpress, and crypto scams, und…

Read More
Threat Research

Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack

April 4, 2023October 14, 2025 Securonix

Security researchers анализed a 3CX supply-chain attack and found that manipulated MSI installers of 3CXDesktopApp deliver a malicious DLL which decrypts and executes shellcode, dropping a backdoor named Gopuram along with an infostealer. Attribution points to…

Read More
Threat Research

Proxyjacking has Entered the Chat

March 31, 2023October 15, 2025 Securonix

Sysdig’s Threat Research Team (TRT) uncovered proxyjacking, where attackers leverage the Log4j vulnerability to gain access to a container and then turn compromised pods into proxy servers to monetize IP addresses via proxyware services such as Pawns.app, IPRo…

Read More
Threat Research

3CX Supply Chain Compromise Leads to ICONIC Incident

March 30, 2023October 13, 2025 Volexity

Volexity analyzed a supply-chain compromise of the 3CX Desktop App in which a malicious ffmpeg library inserted into signed installers decoded encrypted blobs, fetched staged payloads, and reflectively loaded a 64-bit information-stealer dubbed ICONIC/ICONICST…

Read More
Threat Research

Attackers are starting to target .NET developers with malicious-code NuGet packages | JFrog

March 15, 2023October 15, 2025 Securonix

JFrog Security Research uncovered a sophisticated NuGet-based campaign targeting .NET developers, employing typosquatting and deceptive metadata to push a PowerShell-based dropper that downloads a second-stage Impala payload. The attack demonstrates how NuGet …

Read More
Threat Research

The slow Tick-ing time bomb: Tick APT group compromise of a DLP software developer in East Asia

March 8, 2023October 14, 2025 Securonix

ESET linked a campaign to the Tick APT group targeting an East Asian data-loss prevention (DLP) software developer, where attackers trojanized installers and compromised update servers to spread malware to the company’s customers. The operation involved Shadow…

Read More
Threat Research

How NPM Packages Were Used to Spread Phishing Links

February 19, 2023October 13, 2025 Securonix

Checkmarx researchers uncovered a mass-spam campaign in the NPM ecosystem where automated processes published thousands of malicious packages that link to phishing campaigns. The operation involved automated package creation, masquerading as legitimate entries…

Read More
Threat Research

Developers beware: Imposter HTTP libraries lurk on PyPI

February 17, 2023October 13, 2025 Securonix

Researchers from ReversingLabs found a surge of malicious PyPI packages masquerading as HTTP libraries, using typosquatting and deceptive naming to distribute downloaders and info stealers. The campaign shows how open-source repositories continue to be abused …

Read More

Posts pagination

Previous 1 … 139 140 141 142 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian

Website Disclaimer

Proudly powered by WordPress | Theme: Fairy Dark by Candid Themes.