This cybersecurity update highlights recent active threats, including APT41’s use of Google Calendar for command-and-control and the takedown of services aiding malware obfuscation. Key incidents involve nation-state cyberattacks, vulnerabilities in popular software, and innovative malware such as GhostSpy and Lumma Stealer. #APT41 #VoidBlizzard
Keypoints
- APT41 exploited Google Calendar to create a malware-based command-and-control infrastructure.
- Law enforcement seized domains hosting counter-antivirus and crypting services used by cybercriminals.
- New malware like GhostSpy and Lumma Stealer target Android and persist despite takedown efforts.
- Critical vulnerabilities in software such as ConnectWise and vBulletin are actively being exploited by threat actors.
- Nation-state and cyber espionage campaigns continue targeting government, military, and critical infrastructure systems.
Read More: https://thehackernews.com/2025/06/weekly-recap-apt-intrusions-ai-malware.html