#infostealers
偽のMalwarebytesキャンペーンはDLLサイドローディングを悪用してインフォスティーラーをドロップする

Fake Malwarebytes Campaign Exploits DLL Sideloading to Drop Infostealers #DailyCyberSecurity (Jan 19)

securityonline.info/fake-malware...
Fake Malwarebytes Campaign Exploits DLL Sideloading to Drop Infostealers
New malware campaign impersonates Malwarebytes installers. Hackers use DLL sideloading to deploy infostealers targeting crypto & MFA. Verify downloads now.
securityonline.info
January 20, 2026 at 11:00 PM
TamperedChef serves bad ads, with infostealers as the main course
TamperedChef serves bad ads, with infostealers as the main course
www.sophos.com
January 18, 2026 at 4:09 PM
TamperedChef Serves Bad Ads, With Infostealers As The Main Course https://packetstorm.news/news/view/40087 #news
January 16, 2026 at 4:23 PM
Apple Security in 2026: How Infostealers and AI Are Shaping the Threat Landscape

The world of Apple security is evolving faster than ever. From the rise of sophisticated malware to the integration of AI into both attacks and defenses, Mac and iOS users are navigating increasingly complex risks. In…
Apple Security in 2026: How Infostealers and AI Are Shaping the Threat Landscape
The world of Apple security is evolving faster than ever. From the rise of sophisticated malware to the integration of AI into both attacks and defenses, Mac and iOS users are navigating increasingly complex risks. In this latest episode of the 9to5Mac Security Bite podcast, host Arin Waichulis sits down with Jaron Bradley, author and Director at Jamf Threat Labs, to explore the past decade of Apple security, the emergence of infostealer malware as a major threat, and what the future may hold for Apple users in 2026.
undercodenews.com
January 16, 2026 at 2:47 PM
Trellix's Mallikarjun Wali & Mohideen Abdul Khader uncovered an active malware campaign that exploits a DLL sideloading vulnerability within the legitimate ahost.exe utility. The campaign primarily delivers commodity infostealers and RATs. www.trellix.com/blogs/resear...
January 16, 2026 at 10:58 AM
Group-IB researchers have spotted a ransomware strain (named DeadLock) abusing blockchain smart contracts for its operations.

The technique has been used before by APT crews and other cybercrime ops, such as crypto miners and infostealers.

www.group-ib.com/blog/deadloc...
www.group-ib.com
January 15, 2026 at 10:58 AM
Claims emerge of 8M Armenian government records for sale.
Officials deny an email breach but are investigating a possible platform-level data leak. Infostealers suspected.

#CyberSecurity #DataProtection
January 13, 2026 at 2:10 PM
They should also, ideally, reformat their device and reinstall the operating system from scratch. Some infostealers don't try to achieve persistence, to avoid potentially alerting the user too early, but with malware you can never be certain what code was able to run on the system.
January 13, 2026 at 5:05 AM
☕️ ownCloud, Nextcloud… : les vols de données se multiplient, activez la double authentification

next.ink/brief_articl...

Dans un rapport pour Infostealers, la société spécialisée en cybersécurité Hudson Rock explique qu’un pirate est « en train de mettre aux enchères des don…
ownCloud, Nextcloud… : les vols de données se multiplient, activez la double authentification - Next
S'abonner à
next.ink
January 10, 2026 at 11:43 AM
Are there any known instances of infostealers targeting AI chats yet?
January 10, 2026 at 6:12 AM
Lone Hacker Used Infostealers to Access Data at 50 Global Companies hackread.com/lone-hacker-...
Lone Hacker Used Infostealers to Access Data at 50 Global Companies
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
January 9, 2026 at 2:12 AM
Crack the Code: Exposing AuraStealer’s Secrets with Advanced Deobfuscation Tactics + Video

Introduction: Modern infostealers like AuraStealer employ sophisticated obfuscation techniques to evade detection and steal sensitive data. This article provides practical deobfuscation workflows, empowering…
Crack the Code: Exposing AuraStealer’s Secrets with Advanced Deobfuscation Tactics + Video
Introduction: Modern infostealers like AuraStealer employ sophisticated obfuscation techniques to evade detection and steal sensitive data. This article provides practical deobfuscation workflows, empowering cybersecurity professionals to dissect and neutralize such threats. By mastering these methods, you can bolster defenses against data exfiltration attacks and enhance your incident response capabilities. Learning Objectives: Understand the differences between polymorphic and monolithic malware obfuscation.
undercodetesting.com
January 9, 2026 at 1:01 AM
A threat actor has successfully wielded infostealers in dozens of attacks against notable global organizations to steal credentials and then breach their corporate networks via widely used collaboration platforms, mainly because the affected companies did not enable multifactor
January 8, 2026 at 5:45 PM
Lone Hacker Used Infostealers to Access Data at 50 Global Companies

A Hudson Rock report reveals how an Iranian hacker named Zestix breached 50 global companies, including Iberia Airlines and Pickett & Associates, by using stolen passwords and a lack of MFA.
#hackernews #news
Lone Hacker Used Infostealers to Access Data at 50 Global Companies
A Hudson Rock report reveals how an Iranian hacker named Zestix breached 50 global companies, including Iberia Airlines and Pickett & Associates, by using stolen passwords and a lack of MFA.
hackread.com
January 8, 2026 at 2:07 PM
An emerging threat actor that goes by "Zestix" used an assortment of infostealers to obtain credentials and breach file-sharing instances of approximately 50 enterprises. www.darkreading.com/cloud-securi...
Lack of MFA Is Common Thread in Vast Cloud Credential Heist
A threat actor that goes by "Zestix" used several infostealers to obtain credentials and breach file-sharing instances of approximately 50 enterprises.
www.darkreading.com
January 8, 2026 at 1:44 PM
Infostealers and Lack of MFA Led to Dozens of Major Breaches Infostealer infections compounded by a lack of multi-factor authentication (MFA) have resulted in dozens of breaches at major global com...

#Cyber #News #Data #Breach #News #Firewall #Daily […]

[Original post on thecyberexpress.com]
January 8, 2026 at 1:08 PM
Infostealers and Lack of MFA Led to Dozens of Major Breaches Infostealer infections compounded by a lack of multi-factor authentication (MFA) have resulted in dozens of breaches at major global com...

#Cyber #News #Data #Breach #News #Firewall #Daily […]

[Original post on thecyberexpress.com]
January 9, 2026 at 9:00 AM
The 'Zestix' threat actor executed a significant cloud credential heist, leveraging infostealers to compromise file-sharing platforms of around fifty enterprises. The absence of MFA stands out as the common vulnerability exploited in these incidents.
January 7, 2026 at 4:21 PM
Researchers say a lone attacker accessed internal systems at around 50 companies worldwide using infostealer malware and stolen credentials, often where MFA was not enabled, and is offering the access for sale.

Read: hackread.com/lone-hacker-...

#CyberSecurity #Infostealers #Malware #MFA #Infosec
Lone Hacker Used Infostealers to Access Data at 50 Global Companies
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
January 7, 2026 at 3:41 PM
A recent report uncovers that multiple enterprises fell victim to a sophisticated credential-stealing operation by threat actors known as "Zestix". Employing diverse infostealers, they compromised file-sharing services of about 50 businesses.
January 7, 2026 at 3:34 PM
Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers
Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers
www.gendigital.com
January 7, 2026 at 7:54 AM
Dozens of organizations fall victim to infostealers after failing to enforce MFA https://cstu.io/89769a #robotics #india #future
Dozens of organizations fall victim to infostealers after failing to enforce MFA
50 companies allowed access to cloud instances with just a password
cstu.io
January 6, 2026 at 6:52 PM
#TechRadar Dozens of organizations fall victim to infostealers after failing to enforce MFA https://techrad.ar/xc2j #Security #Pro
January 6, 2026 at 6:37 PM
Hudson Rock, an Israeli cybersecurity company that specializes in infostealers.

Rock Hudson?
January 6, 2026 at 9:33 AM