news

Breaking Cyber News From Cyberint

Breaking news feed of the latest cyber incidents, breaches, vulnerabilities, malware, ransomware and so much more.

  • Jun 01, 2025

    • Credentials From Web Browsers
    • Password Managers
    • Input Capture
    • User Execution
    • Credentials From Password Stores
    • Obfuscated Files Or Information
    • Phishing
    • System Information Discovery
    • Command And Scripting Interpreter
    • Exfiltration Over C2 Channel
    • Virtualization/Sandbox Evasion
    • Screen Capture
    • Windows Credential Manager
    • Eddiestealer
    • Drive-By Compromise
    • File And Directory Discovery
    • Data From Local System

    EDDIESTEALER: New Rust-Based Infostealer Spreads via Fake CAPTCHA Campaigns

    "EDDIESTEALER," a sophisticated Rust-based infostealer distributed through fake CAPTCHA verification pages designed to trick users into executing a malicious PowerShell script. Once deployed, the malware targets and exfiltrates sensitive data such as credentials, browser information, and cryptocurrency wallet contents. Communicating with a command and control server, "EDDIESTEALER" uses advanced evasion techniques including string and API obfuscation. It specifically focuses on compromising crypto wallets, browsers, password managers, FTP clients, and messaging apps. Its use of the Rust programming language highlights a growing trend among cybercriminals favoring stealth and resistance to traditional detection methods.

  • May 26, 2025

    • Dynamic-Link Library Injection
    • Silver Fox
    • Asia
    • Regsvr32
    • Reflective Code Loading
    • Eastern Asia
    • Valleyrat
    • Process Discovery
    • Web Protocols
    • Scheduled Task
    • File Deletion
    • Powershell
    • Obfuscated Files Or Information: Encrypted Or Encoded Data
    • File And Directory Discovery
    • Ingress Tool Transfer
    • China
    • Malicious File
    • Masquerade Task Or Service
    • Rundll32
    • Disable Or Modify Tools

    New Malware Campaign Targets Chinese-Speaking Users with Winos 4.0

    Cybersecurity researchers have uncovered a malware campaign that employs fake software installers disguised as popular applications like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. First identified by Rapid7 in February 2025, the campaign utilizes a sophisticated multi-stage loader called Catena, which operates entirely in memory to evade traditional antivirus detection. The malware, attributed to a threat actor known as Silver Fox, specifically targets Chinese-speaking environments and has been active throughout 2025, adapting its tactics to maintain persistence and avoid detection. The campaign leverages trojanized NSIS installers and is characterized by its careful planning and execution.

Ready to
experience hyper-relevance?

See Argos Edge in action!

Schedule a demo