Tag Archive for: followup

This Week in Malware – A PyPI Phishing Follow-up Plus 120 Packages


This week in malware we discovered and analyzed 120 packages flagged as malicious, suspicious, or dependency confusion attacks.

As a follow-up to our coverage last week, new details emerged regarding a phishing campaign that sought to steal account credentials of PyPI maintainers and lace their packages with malware.

AppSec/API Security 2022

Phishing caught up in a larger scheme

An investigation of the malicious email campaign that plagued PyPI maintainers last week connected the phishing to part of a multi-step saga rather than a one-off trip.

SentinelOne and Checkmarx published a report yesterday that detailed how the threat actor behind the phishing upgraded from small-scale fraudulent applications and typosquatting to major-software-distributor supply chain attacks throughout the year. 

Security researchers at the companies identified a threat actor group named “JuiceLedger” as the perpetrator of last week’s phishing campaign. Researchers said the PyPI supply chain attack was the most recent malicious activity in a larger campaign carried out by the group.

Reportedly, the group attempts to distribute a .NET-based malware, dubbed “JuiceStealer,” that steals credential, browser, and cryptocurrency vault information and feeds the ill-gotten goods to a domain (linkedopports[.]com) purportedly controlled by JuiceLedger. 

JuiceStealer first appeared on VirusTotal in February 2022, with early iterations of the malware delivered via fake Python installer applications.

Later in the year, JuiceLedger apparently pivoted to packaging its malware in fraudulent crypto-themed applications. Researchers described these as “delivered in a similar scheme to the Python installer” and “embedded within a zip file with additional legitimate software.”

By August 2022, JuiceLedger escalated its threat efforts to supply chain attacks by targeting PyPI maintainers with poisoned open source packages. 

As we covered last week, this malware attempts delivery in a sequence of a phishing email purporting a validation process which in turn steals login credentials and (Read more…)

Source…

Follow-Up Report: Android Security Team Reacts To The Linux Kernel Flaw News – Droid Report


Droid Report

Follow-Up Report: Android Security Team Reacts To The Linux Kernel Flaw News
Droid Report
The fact remains that Google's Android Security Team was caught off guard, and the report of the flaw went to press before it could craft a more diplomatic response, or one that reassures the public that they're working on the task already. In any case
A Look at Linux, Android Zero-Days and the Perils of PatcheseWeek

all 4 news articles »

“android security” – read more

“Followup phish” targets possible victims of last month’s JP Morgan Chase card breach

Here’s a brief reminder of how cybercriminals use real security disasters to cause follow-up disasters of their own. This time, it’s a “followup phish” aimed at JP Morgan Chase customers…
Naked Security – Sophos

HK to follow-up Snowden US cyber warfare claims – Shanghai Daily (subscription)

HK to follow-up Snowden US cyber warfare claims
Shanghai Daily (subscription)
"We now understand, through recent revelations, that the US government has been operating their own blanket surveillance systems and allegedly conducting cyber warfare against Hong Kong. This is a violation of Human Rights of people of Hong Kong and 

cyber warfare – read more