Cybersecurity researchers have identified multiple coordinated cyberattack campaigns exploiting popular technologies and platforms. A fake antivirus website impersonating a well-known security provider has been used to distribute the VenomRAT Trojan alongside other malware designed to steal passwords, cryptocurrency wallets, and maintain long-term persistence. This campaign leverages open-source tools, multi-factor authentication bypass techniques, and real-time phishing tactics. Concurrently, a new botnet named PumaBot is targeting embedded Linux-based Internet of Things (IoT) devices by brute-forcing SSH credentials, mining cryptocurrency, and hijacking device controls. PumaBot evades detection by impersonating Redis services and uses systemd persistence to survive reboots. Another major threat involves over 9,000 ASUS routers globally compromised with persistent, malware-free SSH backdoors that survive firmware updates and reboots. This stealthy intrusion campaign, linked to a group behind a previous Cisco honeypot botnet, potentially aims to build a large-scale botnet. Users remain vulnerable even after updating router firmware. Additionally, the China-linked hacking group APT41 has been found exploiting Google Calendar as a command-and-control (C2) channel for its TOUGHPROGRESS malware to target government agencies. Google Threat Intelligence Group has developed detection methods to counter these attacks. Cybercriminals are also exploiting the growing interest in AI tools by distributing malware-laden installers posing as popular AI video generators and ChatGPT-like applications through ads on Facebook and LinkedIn. These installers spread ransomware and destructive malware such as CyberLock, Lucky_Gh0$t, and Numero. The campaigns highlight emerging trends in cyber threats that combine social engineering, exploitation of trusted platforms, and advanced persistence techniques across various devices and software.
ASUS Router Backdoors Affect 9,000 Devices, Persists After Firmware Updates https://t.co/eujuc6cIZ6
APT41 Uses Google Calendar Events for C2: https://t.co/dXyaDMCMYZ by darkreading #infosec #cybersecurity #technology #news
New Botnet Plants Persistent Backdoors in ASUS Routers: https://t.co/9MkK0dV1jb by darkreading #infosec #cybersecurity #technology #news