Netcrook Logo

Tag: Malware

161 article(s)

Malware Masquerade: How Hackers Turned GitHub Desktop Into a Trojan Horse

28 Jan 2026 news

Attackers hijacked GitHub's Desktop repository using repo squatting and malvertising, distributing advanced malware through what looked like the official installer. Find out how this sophisticated campaign worked and why supply chain security is more critical than ever.

#Malware | #GitHub | #Cybersecurity

Repo Roulette: Hackers Turned GitHub Desktop into a Trojan Horse

27 Jan 2026 news

Hackers hijacked the GitHub Desktop repository, using repo squatting and GPU-based evasion to spread malware as legitimate updates. This investigative feature unpacks the GPUGate supply chain attack and its implications for developer security.

#GitHub | #malware | #supply chain

Malware Hidden in Fake Notepad++ and 7-Zip Sites: RMM Tools Abused in New Attacks

27 Jan 2026 news

Fake Notepad++ and 7-Zip download sites are distributing remote monitoring malware that evades antivirus detection. Discover how cybercriminals turn trusted utilities into powerful attack tools—and how to protect yourself.

#Malware | #Phishing | #RMM

Cybercriminals Exploit Microsoft App-V Scripts to Spread Stealthy Amatera Infostealer

27 Jan 2026 news

A new wave of attacks blends fake CAPTCHAs, Microsoft App-V scripts, and steganography to deliver the Amatera infostealer, exposing how legitimate Windows tools are being weaponized against unsuspecting users.

#Cybersecurity | #Malware | #Social Engineering

Stanley Malware Service: How Phishing Extensions Infiltrate the Chrome Web Store

27 Jan 2026 news 🌍 North America

Stanley, a new malware-as-a-service, is enabling attackers to publish phishing extensions directly to the Chrome Web Store. Here’s how it works, why it’s dangerous, and what users need to know.

#Phishing | #Malware | #Chrome Extensions

Chrome’s Dirty Secret: ‘Stanley’ Toolkit Lets Hackers Fake Any Website Without a Trace

26 Jan 2026 news

A new malware toolkit named Stanley is enabling cybercriminals to run undetectable phishing attacks via Chrome extensions, fooling users by keeping the address bar unchanged. Here’s how this sophisticated scam is changing the game.

#Malware | #Phishing | #Browser Extension

Poisoned Downloads: EmEditor Supply Chain Attack Exposes Users to Stealer Malware

26 Jan 2026 news 🌍 Asia

EmEditor's trusted installer was compromised in a sophisticated supply chain attack, distributing credential-stealing malware to unsuspecting users. Our investigation reveals how the attackers operated and what organizations must do to defend against similar threats.

#EmEditor | #supply chain attack | #malware

Fake CAPTCHA Pages Fuel New Wave of Stealthy Malware Attacks

26 Jan 2026 news

A new breed of cybercrime is using fake CAPTCHA verification pages to deliver malware through trusted web workflows, evading detection with ever-evolving tactics and exploiting the trust users place in familiar security checks.

#CAPTCHA | #Malware | #Cybercrime

AI Supercharges North Korean KONNI Hackers’ Malware in APAC Crypto Attacks

26 Jan 2026 news 🌍 Asia

North Korean hackers have unleashed a new breed of AI-generated malware, targeting developers and engineers across Asia’s blockchain and cryptocurrency industries. This investigative feature exposes KONNI’s latest campaign and its implications for cybersecurity.

#AI Espionage | #North Korea | #Malware

MacSync Malware: How a Single Terminal Command Hijacks Crypto Wallets on macOS

23 Jan 2026 news

A sophisticated MacSync infostealer campaign targets macOS crypto users with a single Terminal command, bypassing security, hijacking wallets, and stealing credentials through deceptive installer prompts and app trojanization.

#MacSync | #malware | #cryptocurrency