A new variant of the Snake Keylogger is targeting Windows users, particularly in China, Turkey, Indonesia, Taiwan, and Spain. Over the past year, more than 280 million infection attempts have been blocked, with the malware delivered primarily through phishing emails. The keylogger logs keystrokes, steals credentials, and monitors clipboards from browsers. In a related development, the Mustang Panda group, believed to be state-backed from China, has been leveraging Microsoft’s MAVInject.exe to bypass antivirus solutions and inject malware into external processes. This method allows the group to remain undetected during their cyberattacks. Additionally, a new report highlights that North Korean hackers are embedding malicious software within GitHub and NPM packages, targeting crypto developers through fake job interviews to deploy malware and steal credentials. The evolving tactics of these cybercriminals underline the ongoing threat to users and the need for enhanced cybersecurity measures.
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware: https://t.co/77uYKESkmH by The Hacker News #infosec #cybersecurity #technology #news
This high-risk keylogger malware is a growing threat to Windows users https://t.co/Sjl4GFmbaO https://t.co/Sjl4GFmbaO
🚨 Freelance developers are under attack. North Korean hackers use fake job interviews on Upwork and GitHub to infect crypto developers with BeaverTail and InvisibleFerret malware, stealing credentials and funds. 👉 Get the full story: https://t.co/BPSML7oUTk