日本経済新聞社が不正ログイン被害にあった、Slackの認証トークンやCookieを狙うInfostealer型マルウェア(RedLine、Lumma、Rhadamanthysなど)は、感染端末からセッション情報を窃取し、多要素認証を回避して侵入します。
この構造により、たとえ企業がシングルサインオンを導入していても、端末が信頼できなければ認証は形骸化します。
newspicks.com/news/1540624...
この構造により、たとえ企業がシングルサインオンを導入していても、端末が信頼できなければ認証は形骸化します。
newspicks.com/news/1540624...
日本経済新聞社、社内チャット「Slack」に不正ログイン 社員の個人PCのウイルス感染が原因
日本経済新聞社は、社内で利用しているチャットツール「Slack」に外部からの不正ログインがあったと発表した。
newspicks.com
November 4, 2025 at 5:39 PM
Everybody can reply
📌 Sophisticated YouTube Ghost Network Distributes Lumma and Rhadamanthys Infostealers via Hijacked Channels https://www.cyberhub.blog/article/15181-sophisticated-youtube-ghost-network-distributes-lumma-and-rhadamanthys-infostealers-via-hijacked-channels
Sophisticated YouTube Ghost Network Distributes Lumma and Rhadamanthys Infostealers via Hijacked Channels
Check Point Research has uncovered a sophisticated operation dubbed the "YouTube Ghost Network," which leverages hijacked YouTube channels and bots to distribute the Lumma and Rhadamanthys Infostealer malwares. This campaign has utilized over 3,000 fake videos to propagate these malicious payloads, targeting unsuspecting users to steal their credentials and sensitive information.
The operation's methodology involves compromising legitimate YouTube channels and using automated bots to generate and distribute malicious videos at an unprecedented scale. This approach not only amplifies the reach of the malware but also exploits the trust users place in established platforms like YouTube. The Lumma and Rhadamanthys Infostealers are particularly dangerous due to their ability to exfiltrate a wide range of sensitive data, including login credentials, financial information, and personal details.
The impact of this operation on the cybersecurity landscape is significant. It demonstrates the increasing sophistication of cybercriminals in leveraging popular platforms and automation to scale their attacks. For cybersecurity professionals, this underscores the need for enhanced monitoring and detection capabilities to identify and mitigate such threats. Users must be educated about the risks associated with interacting with content on trusted platforms, as even these can be compromised.
Expert insights suggest that cybersecurity teams should implement advanced threat detection systems capable of identifying and blocking malicious videos and links. Additionally, user awareness programs should be updated to include information about sophisticated scams like the YouTube Ghost Network. Platform security measures must also be strengthened to prevent the hijacking of legitimate accounts and the distribution of malicious content.
In conclusion, the YouTube Ghost Network operation highlights the evolving tactics of cybercriminals and the importance of proactive cybersecurity measures. By staying vigilant and informed, both users and cybersecurity professionals can better protect themselves against such sophisticated threats.
www.cyberhub.blog
November 4, 2025 at 11:20 AM
Everybody can reply
YouTube ‘Ghost Network’ Spreads Infostealer via 3,000 Fake Videos
Check Point Research exposed a sophisticated, role-based operation called the YouTube Ghost Network, distributing dangerous Lumma and Rhadamanthys Infostealer malware. Learn how cybercriminals use hijacked channels…
#hackernews #news
Check Point Research exposed a sophisticated, role-based operation called the YouTube Ghost Network, distributing dangerous Lumma and Rhadamanthys Infostealer malware. Learn how cybercriminals use hijacked channels…
#hackernews #news
YouTube ‘Ghost Network’ Spreads Infostealer via 3,000 Fake Videos
Check Point Research exposed a sophisticated, role-based operation called the YouTube Ghost Network, distributing dangerous Lumma and Rhadamanthys Infostealer malware. Learn how cybercriminals use hijacked channels and bots to triple malicious video output and steal user credentials.
hackread.com
November 4, 2025 at 6:22 AM
Everybody can reply
1 reposts
⚠️ A YouTube Ghost Network is spreading Lumma and #Rhadamanthys infostealers through over 3,000 fake videos, hijacked channels, bots, and cloud links.
Details: hackread.com/youtube-ghos...
#CyberSecurity #YouTube #Malware #Infostealer
Details: hackread.com/youtube-ghos...
#CyberSecurity #YouTube #Malware #Infostealer
YouTube ‘Ghost Network’ Spreads Infostealer via 3,000 Fake Videos
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
November 3, 2025 at 11:24 AM
Everybody can reply
3 reposts
5 likes
Check Point's @Tera0017 analyses the YouTube Ghost Network, a collection of malicious accounts that take advantage of YouTube’s features to distribute infostealers like Lumma, Rhadamanthys, StealC, RedLine, 0debug & other Phemedrone variants. research.checkpoint.com/2025/youtube...
October 27, 2025 at 10:10 AM
Everybody can reply
2 saves
【緊急・警戒】【セキュリティ】
視聴数の水増し・別アカで高評価・不自然な絶賛と誘導リンク
3000本の悪質動画が削除された衝撃の手口と偽装の全貌
わかりやすく詳細を徹底解説❗️ご視聴はこちら👇
www.youtube.com/watch?v=xwHq...
The shocking tactics that led to the removal of 3,000 malicious videos and the full details of the fraud
YouTube GhostNetwork LummaStealer Rhadamanthys
視聴数の水増し・別アカで高評価・不自然な絶賛と誘導リンク
3000本の悪質動画が削除された衝撃の手口と偽装の全貌
わかりやすく詳細を徹底解説❗️ご視聴はこちら👇
www.youtube.com/watch?v=xwHq...
The shocking tactics that led to the removal of 3,000 malicious videos and the full details of the fraud
YouTube GhostNetwork LummaStealer Rhadamanthys
【警戒】再生回数水増し、別アカウントで高評価。コメント欄で絶賛。3000本の悪質動画が削除された手口と偽装の全貌(YouTube/Ghost Network)【セキュリティ】
YouTube video by 情報の灯台【パソコン】ソース有り
www.youtube.com
October 25, 2025 at 9:14 AM
Everybody can reply
1 reposts
3 likes
Check Point Research scopre la YouTube Ghost Network: 3.000 video malevoli diffondono malware come Rhadamanthys e Lumma tramite tutorial falsi e crack software.
#CheckPointResearch #GhostNetwork #INFOSTEALER #Lumma #Rhadamanthys #Youtube
www.matricedigitale.it/2025/10/23/y...
#CheckPointResearch #GhostNetwork #INFOSTEALER #Lumma #Rhadamanthys #Youtube
www.matricedigitale.it/2025/10/23/y...
October 23, 2025 at 7:52 PM
Everybody can reply
2 reposts
~Checkpoint~
A coordinated network on YouTube distributes infostealers like Rhadamanthys via videos promoting game cheats and cracked software.
-
IOCs: 94. 74. 164. 157, openai-pidor-with-ai. com, 178. 16. 53. 236
-
#Malware #ThreatIntel #YouTube
A coordinated network on YouTube distributes infostealers like Rhadamanthys via videos promoting game cheats and cracked software.
-
IOCs: 94. 74. 164. 157, openai-pidor-with-ai. com, 178. 16. 53. 236
-
#Malware #ThreatIntel #YouTube
YouTube Ghost Network Malware
research.checkpoint.com
October 23, 2025 at 4:02 PM
Everybody can reply
2 reposts
1 likes
Day 22 of #Classicstober is Judge. Here is a 4th century BCE red figure vase featuring the 3 judges of the underworld: Rhadamanthys, Minos, &Aeakos. (P.S. I love late Sicilian vases) #classicstober25
October 22, 2025 at 10:30 AM
Everybody can reply
1 reposts
3 likes
RE: https://oldfriends.live/@paul/115389775460471191
The thread below has confirmation, but I am blocking website bridge account @peoplesdefender.com since the end links results in a website hijacker with a fake CloudFlare challenge that opens a full screen #rhadamanthys stealer that mimics […]
The thread below has confirmation, but I am blocking website bridge account @peoplesdefender.com since the end links results in a website hijacker with a fake CloudFlare challenge that opens a full screen #rhadamanthys stealer that mimics […]
October 18, 2025 at 5:36 PM
Everybody can reply
@paul Confirmed; drops #rhadamanthys via http://141.98.80\\.175/one.dat -> http:// xoiiasdpsdoasdpojas\\.com/
October 17, 2025 at 1:50 PM
Everybody can reply
新たな検出回避技術を備えた情報窃取型マルウェアの新バージョン「Rhadamanthys 0.9.2」を確認
Mapion
マピオンが提供するマピオンニュースへようこそ。注目のトピックを紹介します。サイバーセキュリティソリューションのパイオニアであり、世界的リーダーで ...
www.mapion.co.jp/news/release...
Mapion
マピオンが提供するマピオンニュースへようこそ。注目のトピックを紹介します。サイバーセキュリティソリューションのパイオニアであり、世界的リーダーで ...
www.mapion.co.jp/news/release...
チェック・ポイント・リサーチ、新たな検出回避技術を備えた情報窃取型マルウェアの新バージョン「Rhadamanthys 0.9.2」を確認:マピオンニュースの注目トピック
マピオンが提供するマピオンニュースへようこそ。注目のトピックを紹介します。サイバーセキュリティソリューションのパイオニアであり、世界的リーダーであるチェック・ポイント・ソフトウェア・テクノロジーズ(Check Point(R) Sof...
www.mapion.co.jp
October 15, 2025 at 10:32 PM
Everybody can reply
Check Point Research Unveils New Version of Rhadamanthys Malware with Advanced Evasion Techniques#None#Malware#Check_Point#Rhadamanthys
Check Point Research Unveils New Version of Rhadamanthys Malware with Advanced Evasion Techniques
Check Point Research has revealed a new version of the Rhadamanthys malware, now with advanced techniques to evade detection, posing a growing threat to businesses and individuals.
third-news.com
October 15, 2025 at 5:10 AM
Everybody can reply
進化する情報窃取型マルウェア「Rhadamanthys 0.9.2」の新知見とその影響#サイバーセキュリティ#チェック・ポイント#Rhadamanthys
チェック・ポイント・リサーチが発表した新たな情報窃取型マルウェア「Rhadamanthys 0.9.2」。その新機能と影響について詳述します。
チェック・ポイント・リサーチが発表した新たな情報窃取型マルウェア「Rhadamanthys 0.9.2」。その新機能と影響について詳述します。
進化する情報窃取型マルウェア「Rhadamanthys 0.9.2」の新知見とその影響
チェック・ポイント・リサーチが発表した新たな情報窃取型マルウェア「Rhadamanthys 0.9.2」。その新機能と影響について詳述します。
tokyo.publishing.3rd-in.co.jp
October 15, 2025 at 4:56 AM
Everybody can reply
新興マルウェア「Rhadamanthys 0.9.2」が新技術を搭載し登場!#サイバーセキュリティ#チェック・ポイント#Rhadamanthys
新たな情報窃取型マルウェア「Rhadamanthys 0.9.2」が、進化した検出回避技術を搭載。セキュリティへの影響を詳解します。
新たな情報窃取型マルウェア「Rhadamanthys 0.9.2」が、進化した検出回避技術を搭載。セキュリティへの影響を詳解します。
新興マルウェア「Rhadamanthys 0.9.2」が新技術を搭載し登場!
新たな情報窃取型マルウェア「Rhadamanthys 0.9.2」が、進化した検出回避技術を搭載。セキュリティへの影響を詳解します。
news.3rd-in.co.jp
October 15, 2025 at 4:45 AM
Everybody can reply
TA585 usa MonsterV2 per attacchi mirati contro aziende finanziarie, controllando l’intera catena d’infezione con RAT, stealer e loader avanzati.
#ClickFix #LummaStealer #MonsterV2 #Proofpoint #Rhadamanthys #TA585
www.matricedigitale.it/2025/10/14/t...
#ClickFix #LummaStealer #MonsterV2 #Proofpoint #Rhadamanthys #TA585
www.matricedigitale.it/2025/10/14/t...
October 14, 2025 at 7:37 AM
Everybody can reply
Our blog also details TA585 campaigns. One interesting example was in August 2025, when it leveraged GitHub email notifications to deliver Rhadamanthys.
October 13, 2025 at 8:35 PM
Everybody can reply
2025-10-01 (Wed) I've posted #malware samples and a #pcap of the post-infection traffic from an infection by possible #Rhadamanthys malware at www.malware-traffic-analysis.net/2025/10/01/i...
This is from a file disguised as a cracked version of software, and I usually see #LummaStealer from this.
This is from a file disguised as a cracked version of software, and I usually see #LummaStealer from this.
October 6, 2025 at 6:52 PM
Everybody can reply
3 reposts
2 likes
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads thehackernews.com/2025/10/rhad...
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
Check Point: Rhadamanthys MaaS stealer (v0.9.2) expands fingerprinting, PNG steganography, and tiered pricing from $299–$499/month.
thehackernews.com
October 6, 2025 at 9:42 AM
Everybody can reply
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads thehackernews.com/2025/10/rhad...
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
Check Point: Rhadamanthys MaaS stealer (v0.9.2) expands fingerprinting, PNG steganography, and tiered pricing from $299–$499/month.
thehackernews.com
October 5, 2025 at 3:32 PM
Everybody can reply
Rhadamanthys Stealer upgraded: HIGH severity malware now fingerprints devices & hides data in PNGs. EU orgs: boost EDR, monitor image transfers, enforce MFA. Stay ahead! More: https://radar.offseq.com/threat/rhadamanthys-stealer-evolves-adds-device-fingerpri-0edbd286 #OffSeq #Malware #Cybersecurity
October 5, 2025 at 3:03 AM
Everybody can reply
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to…
#hackernews #news
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to…
#hackernews #news
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others.
"Rhadamanthys was initially promoted through posts on cybercrime forums, but soon it became clear that the author had a
thehackernews.com
October 4, 2025 at 7:13 PM
Everybody can reply