North Korea's Lazarus Group has leveraged the backdoored PDF reader app SwiftLoader used in the RustBucket campaign to facilitate the deployment of the KANDYKORN macOS malware in a bid to better evade detection, according to The Hacker News.
More advanced attack techniques are being exhibited by the WildCard advanced persistent threat operation, which has targeted Israel for the past eight years, amid the ongoing war between Israel and Palestinian militant group Hamas, CyberScoop reports.
Persistent updates have been made by the TA544 threat operation, also known as Zeus Panda and Bamboo Spider, to the advanced malware loader WailingCrab, also known as WikiLoader, to enhance stealth in attacks mainly facilitated by shipping-themed emails, The Hacker News reports.
BleepingComputer reports that Israel has been targeted in attacks with an updated Rust-based version of the multi-platform SysJoker malware by the Gaza Cybergang, which is affiliated with Palestinian militant group Hamas.
North Korea's Lazarus Group, also known as Diamond Sleet, has been leveraging a trojanized CyberLink app installer to facilitate the distribution of LambLoad malware in a new supply chain attack, according to SiliconAngle.
Threat actors have been targeting macOS devices with the Atomic Stealer information-stealing malware, also known as AMOS, through fraudulent web browser updates as part of the new "ClearFake" campaign, The Hacker News reports.