Flux RSS

— Sources secondaires
Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure
Malware & RansomwareSecurityWeekhier

The state-sponsored threat actor deployed kernel implants and passive backdoors enabling long-term, high-level espionage. The post Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure appeared first on SecurityWeek.

Alleged RedLine Malware Administrator Extradited to US
Malware & RansomwareSecurityWeekavant-hier

Hambardzum Minasyan of Armenia has been accused of being involved in the development and administration of the infostealer malware. The post Alleged RedLine Malware Administrator Extradited to US appeared first on SecurityWeek.

Russian Hacker Sentenced to 2 Years for TA551 Botnet-Driven Ransomware Attacks
Malware & RansomwareThe Hacker Newsavant-hier

The U.S. Department of Justice (DoJ) said a Russian national has been sentenced to two years in prison for managing a botnet that was used to launch ransomware attacks against U.S. companies. Ilya Angelov, 40, of Tolyatti, Russia, was also fined $100,000. Angelov, who went by the online aliases "milan" and "okart," is said to have co-managed a Russia-based cybercriminal group known as TA551 (aka

TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise
Malware & RansomwareThe Hacker Newsil y a 3 jours

TeamPCP, the threat actor behind the recent compromises of Trivy and KICS, has now compromised a popular Python package named litellm, pushing two malicious versions containing a credential harvester, a Kubernetes lateral movement toolkit, and a persistent backdoor. Multiple security vendors, including Endor Labs and JFrog, revealed that litellm versions 1.82.7 and 1.82.8 were published on March

Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR
Malware & RansomwareThe Hacker Newsil y a 3 jours

A large-scale malvertising campaign active since January 2026 has been observed targeting U.S.-based individuals searching for tax-related documents to serve rogue installers for ConnectWise ScreenConnect that drop a tool named HwAudKiller to blind security programs using the bring your own vulnerable driver (BYOVD) technique. "The campaign abuses Google Ads to serve rogue ScreenConnect (

Hackers Use Fake Resumes to Steal Enterprise Credentials and Deploy Crypto Miner
Malware & RansomwareThe Hacker Newsil y a 3 jours

An ongoing phishing campaign is targeting French-speaking corporate environments with fake resumes that lead to the deployment of cryptocurrency miners and information stealers. "The campaign uses highly obfuscated VBScript files disguised as resume/CV documents, delivered through phishing emails," Securonix researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee said in a report shared

Russian initial access broker who fed ransomware crews gets 81 months in US prison
Malware & RansomwareThe Register Securityil y a 3 jours

Aleksei Volkov sentenced after enabling attacks that cost victims millions A Russian national who sold the keys to corporate networks faces nearly seven years in a US prison after prosecutors tied his handiwork to a string of ransomware attacks costing victims millions of dollars.…

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials
Malware & RansomwareThe Hacker Newsil y a 4 jours

Two more GitHub Actions workflows have become the latest to be compromised by credential-stealing malware by a threat actor known as TeamPCP, the cloud-native cybercriminal operation also behind the Trivy supply chain attack. The workflows, both maintained by the supply chain security company Checkmarx, are listed below - checkmarx/ast-github-action checkmarx/kics-github-action Cloud security

U.S. Sentences Russian Hacker to 6.75 Years for Role in $9M Ransomware Damage
Malware & RansomwareThe Hacker Newsil y a 4 jours

A 26-year-old Russian citizen has been sentenced in the U.S. to 6.75 years (81 months) in prison for his role in assisting major cybercrime groups, including the Yanluowang ransomware crew, in conducting numerous attacks against U.S. companies and other organizations. According to the U.S. Department of Justice (DoJ), Aleksei Olegovich Volkov facilitated dozens of ransomware attacks across the

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
Malware & RansomwareThe Hacker Newsil y a 4 jours

The North Korean threat actors behind the Contagious Interview campaign, also tracked as WaterPlum, have been attributed to a malware family tracked as StoatWaffle that's distributed via malicious Microsoft Visual Studio Code (VS Code) projects. The use of VS Code "tasks.json" to distribute malware is a relatively new tactic adopted by the threat actor since December 2025, with the attacks