photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

242
active users

#malware

30 posts26 participants1 post today
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Coyote" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Coyote</span></a> <a href="https://mastodon.thenewoil.org/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> abuses <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> accessibility framework for data theft</p><p><a href="https://www.bleepingcomputer.com/news/security/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
MalwareLab<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@BleepingComputer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>BleepingComputer</span></a></span> you mention that “AquaSec identified Serbia-based IP addresses used in the attacks, Serbian phrases in the scripts, and Slovak language in the GitHub repository hosting the miners, but it could make no confident attribution.”</p><p>In the original blog by AquaSec, they identified the GitHub account “vozstanica” as Slovak word for “train station”. But this is not true, in Slovak language, train station is either “vlaková stanica” or “železničná stanica”. <br>It seems that “vozstation” is incorrectly detected as Slovak word by Google Translate. </p><p>On the other hand, when I search for “vozstation”, there are few occurrences on websites in Serbian language. It also correlates with other AquaSec findings such as Serbian phrases in AI-generated code and Serbian IP used in the attack. In their article, the only clue for Slovak is the “vozstation” only, which is more Serbian than Slovak word. </p><p><a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/koske" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>koske</span></a></p>
heise Developer<p>Beliebtes JavaScript-Paket is: Malware durch Supply-Chain-Angriff</p><p>Nach einem Phishing-Angriff auf npm-Maintainer war das Paket is, das auf etwa 2,7 Millionen wöchentliche Downloads kommt, mit einem Malware-Loader infiziert.</p><p><a href="https://www.heise.de/news/Beliebtes-JavaScript-Paket-is-Malware-durch-Supply-Chain-Angriff-10499614.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Beliebtes-JavaSc</span><span class="invisible">ript-Paket-is-Malware-durch-Supply-Chain-Angriff-10499614.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a> <a href="https://social.heise.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Ham on Wry<p>Picture the U.S government as your computer.</p><p>Now picture little Donnie as the unchecked malware that’s slowing your system, releasing your personal data to anyone who wants it and who is rendering your system useless.</p><p>The more you know.</p><p><a href="https://mastodon.world/tags/politics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>politics</span></a> <a href="https://mastodon.world/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.world/tags/trump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trump</span></a> <a href="https://mastodon.world/tags/america" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>america</span></a> <a href="https://mastodon.world/tags/littledonnie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>littledonnie</span></a> <a href="https://mastodon.world/tags/republicans" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>republicans</span></a> <a href="https://mastodon.world/tags/government" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>government</span></a> <a href="https://mastodon.world/tags/DOGE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DOGE</span></a> <a href="https://mastodon.world/tags/MAGA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MAGA</span></a> <a href="https://mastodon.world/tags/technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technology</span></a> <a href="https://mastodon.world/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
ManiabelChris<p>AquaSec deckte jetzt eine üble Malware für Linux auf, wobei verseuchte Bilddateien den Angriffsvektor beinhalten: Koske verbreitet sich - aktuell - über präparierte Pandabärbilder, die ein Script in C mit der unangenehmen Payload mitbringen. Offensichtlich half ein LLM bei der Entwicklung der Malware. Schöne, neue KI-Welt.</p><p><a href="https://www.aquasec.com/blog/ai-generated-malware-in-panda-image-hides-persistent-linux-threat/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">aquasec.com/blog/ai-generated-</span><span class="invisible">malware-in-panda-image-hides-persistent-linux-threat/</span></a></p><p><a href="https://mastodon.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.de/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.de/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.de/tags/koske" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>koske</span></a> <a href="https://mastodon.de/tags/ki" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ki</span></a> <a href="https://mastodon.de/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Ukrainians" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukrainians</span></a> arrest alleged admin of major crime forum <a href="https://mas.to/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <br><a href="https://mas.to/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/tech-policy/2025/07/ukrainians-arrest-alleged-admin-of-major-crime-forum-xss/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/tech-policy/20</span><span class="invisible">25/07/ukrainians-arrest-alleged-admin-of-major-crime-forum-xss/</span></a></p>
PrivacyDigest<p>Administrator of major dark web <a href="https://mas.to/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> forum arrested in <a href="https://mas.to/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a><br>EUROPE</p><p>The suspected administrator of major dark web cybercrime forum, XSS.is, was arrested in Ukraine, French prosecutors said on Wednesday. The Russian-language site is one of the main hubs for global cybercrime, enabling access to compromised systems, stolen data and the sale of <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>.<br><a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mas.to/tags/xssis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xssis</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> </p><p><a href="https://www.france24.com/en/europe/20250723-administrator-of-major-dark-web-cybercrime-forum-arrested-in-ukraine#" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">france24.com/en/europe/2025072</span><span class="invisible">3-administrator-of-major-dark-web-cybercrime-forum-arrested-in-ukraine#</span></a></p>
Scripter :verified_flashing:<p>Entwickler sollten handeln: Malware in prominente Javascript-Projekte eingeschleust - Golem.de<br><a href="https://www.golem.de/news/entwickler-sollten-handeln-malware-in-prominente-javascript-projekte-eingeschleust-2507-198445.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/entwickler-sollt</span><span class="invisible">en-handeln-malware-in-prominente-javascript-projekte-eingeschleust-2507-198445.html</span></a> <a href="https://social.tchncs.de/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.tchncs.de/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://social.tchncs.de/tags/JavaScript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JavaScript</span></a></p>
Jon Snow<p>Microsoft silently installs Power Automate Chrome extension during Windows update—no prompt, no permission</p><p>* Microsoft is modifying a competing browser’s behavior via the OS update mechanism.<br>* The extension has sweeping permissions.<br>* There's no meaningful consent process.</p><p><a href="https://www.reddit.com/r/privacy/comments/1m7lpnz/microsoft_silently_installs_power_automate_chrome/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reddit.com/r/privacy/comments/</span><span class="invisible">1m7lpnz/microsoft_silently_installs_power_automate_chrome/</span></a></p><p><a href="https://mastodon.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.online/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://mastodon.online/tags/windows11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows11</span></a> <a href="https://mastodon.online/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://mastodon.online/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://mastodon.online/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.online/tags/enshittification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enshittification</span></a> <a href="https://mastodon.online/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://mastodon.online/tags/tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tech</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://aus.social/@static" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>static</span></a></span> <span class="h-card" translate="no"><a href="https://toot.community/@Noisecolor" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Noisecolor</span></a></span> TBH, <a href="https://infosec.space/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> suffers the same problems and then some as <a href="https://infosec.space/tags/AUR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AUR</span></a> and has seen it's fair share of <a href="https://infosec.space/tags/abuse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>abuse</span></a> and <a href="https://infosec.space/tags/CyberVandalism" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberVandalism</span></a> ranging from malicious commits to flat-out <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> distribution, so it has the <a href="https://infosec.space/tags/centralization" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>centralization</span></a> problem!</p>
MediaFaro News Digest<p>An administrator of a major dark web cybercrime forum was arrested.</p><p>The suspected administrator of XSS.is was arrested in Ukraine, French prosecutors said on Wednesday.</p><p>The Russian-language site is one of the main hubs for global cybercrime, enabling access to compromised systems, stolen data and the sale of malware.</p><p><a href="https://mediafaro.org/article/20250723-an-administrator-of-a-major-dark-web-cybercrime-forum-was-arrested?mf_channel=mastodon&amp;action=forward" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mediafaro.org/article/20250723</span><span class="invisible">-an-administrator-of-a-major-dark-web-cybercrime-forum-was-arrested?mf_channel=mastodon&amp;action=forward</span></a></p><p><a href="https://mastodon.mediafaro.org/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> <a href="https://mastodon.mediafaro.org/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybercrime</span></a> <a href="https://mastodon.mediafaro.org/tags/Crime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Crime</span></a> <a href="https://mastodon.mediafaro.org/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://mastodon.mediafaro.org/tags/DarkWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkWeb</span></a> <a href="https://mastodon.mediafaro.org/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://mastodon.mediafaro.org/tags/Policing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Policing</span></a> <a href="https://mastodon.mediafaro.org/tags/Europol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europol</span></a> <a href="https://mastodon.mediafaro.org/tags/France" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>France</span></a></p>
AAKL<p>Charming.</p><p>Socket: Surveillance Malware Hidden in npm and PyPI Packages Targets Developers with Keyloggers, Webcam Capture, and Credential Theft <a href="https://socket.dev/blog/surveillance-malware-hidden-in-npm-and-pypi-packages" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">socket.dev/blog/surveillance-m</span><span class="invisible">alware-hidden-in-npm-and-pypi-packages</span></a> <span class="h-card" translate="no"><a href="https://fosstodon.org/@SocketSecurity" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>SocketSecurity</span></a></span> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
PrivacyDigest<p><a href="https://mas.to/tags/Hacker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacker</span></a> Plants Computer 'Wiping' Commands in Amazon's <a href="https://mas.to/tags/AICoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AICoding</span></a> <a href="https://mas.to/tags/Agent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Agent</span></a> </p><p>“The ghost’s goal? Expose their ‘AI’ <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> theater. A wiper designed to be defective as a warning to see if they'd publicly own up to their bad security,” a person who presented themselves as the hacker responsible told 404 Media.<br><a href="https://mas.to/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://mas.to/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p><p><a href="https://www.404media.co/hacker-plants-computer-wiping-commands-in-amazons-ai-coding-agent/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">404media.co/hacker-plants-comp</span><span class="invisible">uter-wiping-commands-in-amazons-ai-coding-agent/</span></a></p>
The Spamhaus Project<p>Following the return of “Operation Endgame 2.0” two malware families have dropped out of the Top 20 malware associated with botnet C&amp;Cs! </p><p>Find out which ones and read the FREE report here 🔎<br><a href="https://www.spamhaus.org/resource-hub/botnet-c-c/botnet-threat-update-january-to-june-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/botn</span><span class="invisible">et-c-c/botnet-threat-update-january-to-june-2025/</span></a> </p><p><a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/BotnetCC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BotnetCC</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a></p>
Karl Voit :emacs: :orgmode:<p><a href="https://graz.social/tags/Gro%C3%9Fbritannien" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Großbritannien</span></a> plant Meldepflicht und Zahlungsverbote bei <a href="https://graz.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a>-Angriffen<br><a href="https://www.derstandard.at/story/3000000280596/grossbritannien-plant-meldepflicht-und-zahlungsverbote-bei-ransomware-angriffen" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">derstandard.at/story/300000028</span><span class="invisible">0596/grossbritannien-plant-meldepflicht-und-zahlungsverbote-bei-ransomware-angriffen</span></a></p><p>Sehr spannender Ansatz. Dem kann ich viel abgewinnen.</p><p><a href="https://graz.social/tags/Sicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheit</span></a> <a href="https://graz.social/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://graz.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://graz.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://graz.social/tags/Outlook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Outlook</span></a> <a href="https://graz.social/tags/Exchange" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exchange</span></a> <a href="https://graz.social/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint</span></a> <a href="https://graz.social/tags/Firmenspionage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Firmenspionage</span></a> <a href="https://graz.social/tags/Sicherheitsprozesse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsprozesse</span></a></p>

🚨 Security alert: GitHub users are being targeted by a multi-layered malware campaign using Emmenthal & Amadey loaders. Attackers are abusing public repos, so all devs—especially those in open source—should stay vigilant! 🔒👀 Read more: techradar.com/pro/security/git #cybersecurity #GitHub #malware #newz

TechRadar · GitHub users targeted with dangerous malware attacks - here's what we knowBy Sead Fadilpašić

Update: Neue Version von Sharepoint 2016 behebt Toolshell-Lücke

Microsoft legt nach und veröffentlicht auch für die 2016er-Ausgabe von Sharepoint einen Flicken. Admins sollten diesen unverzüglich einspielen.

heise.de/news/Update-Neue-Vers

heise online · Update: Neue Version von Sharepoint 2016 behebt Toolshell-Lücke
More from Dr. Christopher Kunz