Skip to content
Threat Feed

Tag

Malware

31 briefs RSS
medium advisory

Suspicious Windows PowerShell Arguments Detected

This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.

Elastic Defend +5 powershell malware execution
3r 4t
high advisory

Malware Distribution via Hugging Face and ClawHub

Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.

Atomic macOS Stealer malware social-engineering ai-platforms
2r 1t
critical advisory

Compromised PyTorch Lightning Packages on PyPI Steal Developer Credentials

Compromised PyTorch Lightning packages versions 2.6.2 and 2.6.3 on PyPI contain malicious code to steal developer credentials from cloud and developer environments, and republish infected packages.

pytorch-lightning supply-chain pypi credential-theft malware
2r 2t
high advisory

ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer

The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.

Microsoft Windows +2 clickfix malware social-engineering rat infostealer castleloader netsupport
2r 3t 1i
high threat

UNC6692 Combines Social Engineering, Malware, and Cloud Abuse

UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.

Microsoft Teams +1 UNC6692 social-engineering malware cloud-abuse credential-theft lateral-movement
2r 12t
high advisory

CanisterSprawl: Self-Propagating npm Malware Campaign

The CanisterSprawl malware campaign targets npm packages, using a self-propagating approach to steal sensitive data from developer machines, including tokens and API keys, and attempting to publish malicious packages using hijacked credentials.

npm packages supply-chain malware npm
2r 6t
medium advisory

Suspicious Processes Connecting to Large Language Model Endpoints

This rule detects DNS queries to known Large Language Model (LLM) domains by unsigned binaries or common Windows scripting utilities, indicating potential command and control activity leveraging LLMs for dynamic actions on compromised systems.

command_and_control malware llm
3r 1t
high advisory

Notepad++ Updater (gup.exe) Creates Uncommon Files

The Notepad++ updater (gup.exe) creating files in suspicious locations can indicate potential exploitation for malware delivery or unwarranted file placement, potentially leading to credential access and collection.

supply-chain malware notepad++
2r 3t
high advisory

Dragon Boss Solutions Adware Disabling Antivirus Protections

Digitally signed adware from Dragon Boss Solutions LLC deploys payloads with SYSTEM privileges to disable antivirus protections on thousands of endpoints across education, utilities, government, and healthcare sectors.

adware antivirus-evasion malware windows
2r 2t 2i
high advisory

n8n AI Workflow Automation Platform Abused for Malware Delivery and Device Fingerprinting

Threat actors are abusing the n8n AI workflow automation platform to deliver malware and fingerprint devices via phishing campaigns, bypassing traditional security filters by leveraging trusted infrastructure.

n8n phishing malware workflow-automation
2r 6t 2i
medium advisory

OpenClaw Agent Suspicious Child Process Execution

Malicious actors are exploiting OpenClaw, Moltbot, and Clawdbot AI coding agents via Node.js to execute arbitrary shell commands and download-and-execute commands, potentially targeting cryptocurrency wallets and credentials.

ai-agent execution malware credential-theft
2r 10t 3i
high advisory

Malicious NPM Packages Target Strapi Users

A threat actor published 36 malicious NPM packages disguised as Strapi plugins in a supply chain attack, designed to execute code, escape containers, harvest credentials, and establish persistent implants on Linux systems targeting Strapi users, with specific focus on the Guardarian cryptocurrency payment gateway.

supply-chain npm strapi malware
3r 6t
critical advisory

Malicious LiteLLM Versions Harvest Credentials

Compromised versions of the LiteLLM package (1.82.7 and 1.82.8) on PyPI contained malware designed to harvest sensitive credentials and files, exfiltrating them to a remote API, impacting users who installed and ran the package.

supply-chain malware credential-theft
2r 2t
high threat

TeamPCP Deploys CanisterWorm on NPM After Trivy Compromise

TeamPCP deployed the CanisterWorm malware on the NPM package registry following a compromise of the Trivy scanning tool.

TeamPCP supply-chain malware npm canisterworm
2r 3t
high advisory

GhostLoader Malware Targeting macOS via GitHub and AI Workflows

GhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.

github malware macos credential-theft ai
2r 1t
high advisory

Speagle Malware Hijacks Cobra DocGuard for Data Exfiltration

The Speagle malware hijacks the Cobra DocGuard application to exfiltrate sensitive data from infected machines to attacker-controlled Cobra DocGuard servers, effectively masking malicious traffic as legitimate DocGuard communication.

malware data-exfiltration cobra-docguard speagle
2r 1t
high advisory

SnappyClient Malware Delivered via HijackLoader

SnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.

snappyclient hijackloader malware infostealer keylogger
2r 3t
medium advisory

StoatWaffle Malware Used by WaterPlum Actor

StoatWaffle is malware employed by the WaterPlum threat actor, used for an unknown purpose.

WaterPlum stoatwaffle malware
2r 1t
medium advisory

GlassWorm Campaign Deploying Wave 3 Windows Payload

The GlassWorm campaign has been observed deploying a Wave 3 Windows payload, indicating ongoing malicious activity targeting Windows systems.

glassworm malware windows
2r 2t
high advisory

Malware Spreading Through Fake 'Claude Code' Google Ads

Malware is distributed via malicious advertisements on Google impersonating 'Claude Code', targeting both Windows and macOS operating systems with the goal of infecting users.

malware google_ads initial_access windows macos
2r 1t
high advisory

Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories

The Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.

supply-chain unicode malware github
3r 4t 1i
medium advisory

GlassWorm V2 Infrastructure Rotation and GitHub Injection Analysis

Analysis of GlassWorm V2 reveals infrastructure rotation and GitHub injection techniques.

malware github infrastructure
2r 2t
medium advisory

Maltrail IOCs Report: Tracking Multiple Threat Actors

This brief analyzes IOCs aggregated by Maltrail on February 27, 2026, highlighting network activity associated with diverse threat actors including APT_UNC2465, Lazarus Group, Gorat, APT_Bitter, Android_Joker, PowerShell Injector, SmokeLoader, and FakeApp campaigns targeting various sectors.

maltrail threat-intelligence apt malware
3r 5t 27i
high advisory

Suspicious PowerShell Script Using Cryptography Namespace

The analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.

Splunk Enterprise +2 powershell cryptography malware asyncrat xworm vip keylogger
2r 1t
high advisory

Non-Firefox Process Accessing Firefox Profile Directory

This analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.

Firefox +3 credential-access malware
2r 1t
medium advisory

Windows Time-Based Evasion via Choice Exec

Detection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.

Windows +3 time-based-evasion malware persistence defense-evasion
2r 1t
high advisory

Suspicious Child Processes Spawned by WScript or CScript

Detects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.

Splunk Enterprise +2 wscript cscript lolbin malware defense-evasion
2r 3t
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Malware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.

Windows execution script-execution malware
2r 1t
high threat

Braodo Stealer Screen Capture in TEMP Directory

This analytic detects the creation of screen capture files in the TEMP directory, specifically targeting activity associated with the Braodo stealer malware, which captures screenshots of the victim's desktop as part of its data theft activities.

Splunk Enterprise +2 Braodo Stealer stealc-stealer crypto-stealer braodo-stealer apt37 hellcat-ransomware vip-keylogger screen-capture malware
2r 1t
medium advisory

Masquerading Business Application Installers

Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.

Elastic Defend +22 masquerading defense-evasion initial-access malware windows
2r 4t
medium advisory

Suspicious MS Outlook Child Process

Detection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.

Microsoft Outlook +3 initial-access phishing malware windows
2r 3t