UINAT
NewsRankingsCompaniesGuidesBreachesCompliance
TagsAbout
Home/Tags/malware

malware

15 articles tagged with "malware".

DEAD#VAX Campaign Uses IPFS-Hosted VHD Files to Deploy AsyncRAT via Fileless Execution

Securonix researchers document a sophisticated malware campaign that chains IPFS hosting, virtual hard disk abuse, and in-memory shellcode injection to deliver AsyncRAT while evading traditional detection.

February 4, 2026 malwareAsyncRATIPFS

APT28 Deploys LAMEHUG: First Known Malware Using LLMs in Live Operations

Russia's APT28 has deployed LAMEHUG and PROMPTSTEAL malware that queries large language models via Hugging Face to dynamically generate attack commands, marking the first confirmed use of AI-powered malware in active cyber operations.

February 4, 2026 APT28RussiaAI

SK Telecom — 25 Million Subscribers Exposed in South Korea's Worst Telecom Breach

A sophisticated malware attack on South Korea's largest mobile carrier compromised USIM authentication data for nearly the entire subscriber base, forcing mass SIM replacements and costing over $120 million.

February 3, 2026 telecommalwareBPFDoor

Notepad++ Update Mechanism Hijacked by Chinese Threat Actors to Deliver Malware

Lotus Blossom APT compromised Notepad++'s hosting provider to intercept update traffic and deliver the Chrysalis backdoor to targeted government and financial organizations over a six-month period.

February 2, 2026 supply chainmalwareChina

400+ Malicious OpenClaw Skills Flood ClawHub With Info-Stealing Malware

Over 400 malicious OpenClaw AI agent skills on ClawHub deploy Atomic Stealer via ClickFix-style social engineering. The hightower6eu account alone published 314 malicious skills targeting crypto and developer credentials.

February 2, 2026 OpenClawMoltBotmalware

WinRAR Vulnerability Still Widely Exploited by Nation-State and Cybercrime Groups

CVE-2025-8088 (CVSS 8.8), a path traversal flaw abusing Windows Alternate Data Streams, continues to be exploited by Russian APTs, Chinese actors, and cybercriminals to achieve persistence via Startup folder drops.

February 2, 2026 WinRARCVE-2025-8088APT

GlassWorm: Self-Spreading Malware Hits VS Code Extensions on Open VSX

GlassWorm, a self-propagating worm using Solana blockchain for C2 and invisible Unicode obfuscation, has infected 35,800+ developers through compromised VS Code extensions on Open VSX.

January 31, 2026 supply chain attackVS Codemalware

GootLoader Uses 500-1,000 Concatenated ZIP Archives to Evade Detection

The GootLoader malware loader now creates malformed ZIP files containing hundreds of concatenated archives, causing security tools to extract harmless files while Windows extracts malicious JavaScript.

January 30, 2026 GootLoadermalwareevasion

eScan Antivirus Update Server Breached, Trojanized Updates Distributed to Customers

Attackers compromised an eScan regional update server on January 20, 2026, distributing signed malicious updates that deployed a multi-stage backdoor. IOCs and detection guidance included.

January 29, 2026 supply chainantiviruseScan

Fake AI Coding Assistant on VS Code Marketplace Drops ScreenConnect RAT

A malicious VS Code extension posing as an AI coding assistant deploys ConnectWise ScreenConnect for persistent remote access using quadruple impersonation tactics and Rust-based backup delivery.

January 29, 2026 VS Codemalwaresupply chain

ClickFix Attacks Combine Fake CAPTCHAs with Signed Microsoft Scripts to Deploy Stealer

The EVALUSION campaign uses social engineering, Google Calendar C2, and steganography to distribute Amatera information stealer—part of a technique now used in 47% of observed attacks.

January 27, 2026 malwaresocial engineeringinfostealer

China-Linked Mustang Panda Deploys Updated COOLCLIENT Backdoor Against Governments

APT group targets government entities across Southeast Asia with enhanced malware featuring clipboard monitoring, browser credential theft, and kernel-mode rootkit capabilities.

January 27, 2026 APTChinaMustang Panda

Malicious PyPI Packages Masquerading as Spellcheckers Deliver RAT Malware

Packages 'spellcheckerpy' and 'spellcheckpy' downloaded over 1,000 times use multi-layer encryption and fileless execution to deliver cryptocurrency-stealing RAT. Same threat actor linked to November 2025 campaign.

January 21, 2026 supply chainPyPImalware

Malicious Chrome Extensions Impersonate Workday, NetSuite to Hijack Enterprise Accounts

Five malicious Chrome extensions disguised as HR and ERP platforms like Workday, NetSuite, and SuccessFactors stole authentication tokens and enabled account takeover before being removed from the Chrome Web Store.

January 19, 2026 Chrome extensionsmalwareaccount takeover

Iranian MuddyWater APT Deploys New Rust-Based 'RustyWater' Implant

CloudSEK analysis reveals MuddyWater's upgraded toolkit targeting diplomatic, maritime, financial, and telecom entities across the Middle East with Rust-based malware featuring advanced evasion techniques.

January 8, 2026 APTIranMuddyWater
SYS ONLINE
PAGES 963
UPDATED 2026-02-06
UINAT

Security news, vulnerability alerts, and expert resources for professionals who defend the perimeter.

// Sections

  • › News
  • › Rankings
  • › Companies
  • › Breaches

// Resources

  • › Guides
  • › Compliance
  • › Tags
  • › About

// Feeds

  • › All Content
  • › News Only
  • › Breaches Only

> © 2026 UINAT. All rights reserved.

[ DEFEND THE PERIMETER ]

Search