<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security News</title>
	<atom:link href="https://cybersecuritynews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://cybersecuritynews.com/</link>
	<description>World&#039;s #1 Premier Cybersecurity and Hacking News Portal</description>
	<lastBuildDate>Mon, 11 May 2026 13:21:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://cybersecuritynews.com/wp-content/uploads/2025/12/cropped-CSN-Favico-32x32.webp</url>
	<title>Cyber Security News</title>
	<link>https://cybersecuritynews.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">192061645</site>	<item>
		<title>ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program</title>
		<link>https://cybersecuritynews.com/shinyhunters-breaches-instructure-canvas-lms/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Mon, 11 May 2026 13:21:11 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149640</guid>

					<description><![CDATA[<p>The infamous hacking group ShinyHunters has struck again, this time targeting Instructure, the company behind Canvas Learning Management System (LMS). In early May 2026, Instructure confirmed unauthorized activity on its Canvas platform after detecting suspicious access on April 29, 2026. The breach exposed user names, email addresses, student ID numbers, and some private messages exchanged [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/shinyhunters-breaches-instructure-canvas-lms/">ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The infamous hacking group ShinyHunters has struck again, this time targeting Instructure, the company behind Canvas Learning Management System (LMS). In early May 2026, Instructure confirmed unauthorized activity on its Canvas platform after detecting suspicious access on April 29, 2026. </p>



<p>The breach exposed user names, email addresses, student ID numbers, and some private messages exchanged between Canvas users across thousands of schools worldwide.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/8dc6847b-2a47-47bc-9133-27e6816ec5df/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.pdf?AWSAccessKeyId=ASIA2F3EMEYEXKYAK7IX&amp;Signature=zTPRJOirHpGdOOrJbHQnh0VdVzw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQCLOoRiLC%2BAO6DtLeUYXhFsZpyXiiJYd30BlAEPkMR79AIhAO16VbAnOYPg%2BvUm30cU%2F1ZAy5HmHZUf4H8iw6gI5HU8KvMECBQQARoMNjk5NzUzMzA5NzA1IgxbgoG82fjrsVrfI6Iq0AQzRmd7sXXIAC3sL7Dt8Ad2AtAL688t62IZvrEi2Z2PC0VYfPZQYcDbO3MJnyLyp7zf6TP2L%2B8zIehsFxllPOHXWBxynL0y%2FDkx63bI9iDBtbFysyW72Rg6QzkoIt6vFc%2B0SrG644Oqrxdw5qPwIG9%2B3fQWesiNhVl5ds13fs2Dq99ivh7i5MNuoLRSiOj%2FXAYFlTWoTb%2B6NFv6mTmFKdLs3Njt34iRWKCACwBALHEa8j2tEZlSXnv7zDNxobIvLy9KeQHCfwEIzyX%2BTq3diNFPDnFEh%2Fm1uLTYme8KKq5O7e7QZfC9zsDuCwaGm%2Bmp1ZsMTmRwu6zgdsnFPmrrandP3tIGOcr%2B1G5eZfHVD1U4cIYJ9NuGNOzjWOK89MpreaCaFcKjS2NyJ50McM9QJCGiAGocADPe7WXPUZMYPnMqFfHajeFiTxoB1ZfE3HtwyUSy0tnQtuBjd8P38xFTbnJnl3I56D20CUngwTiKor8Ivwjf%2F4xES92qMyeVTkaLi8iMsb0SnZOHgNRaT5UCRfNxIV8OXwQDG%2BHtVw2VxeUaom%2FNl2oLLs6GWO%2FNuid29lZDQPFUFZOvHWxZeF%2F8Rtt0gkFkOPre526LapeNbz%2BbxQw8BUMCAtdrvzbddsbtFfvoyByPS9tsxS4SEaJFsXz%2FvvZosXImuGkPH6daSdIKIV67SnT6Fje4uYVqgWrOIrwk8Cb%2BG6B9tnjPEiklznm4t7Y%2B2Olz1dZlBMf4%2FnKkO7dQhdvkg3UlkkRQBC19Ief4UEtjZNm1ZoQqK6c%2Fc%2FedMPzxhtAGOpcBKaARc0Yri%2FSQ9Y7RStgRV7St6jmmy1oVUPJnM8Ev6JpFYZBBaoBTKgB4jdEDNmzfB5Z8Gfw2%2FEISKxJmHiCkbBm5TF%2FelUStwJYniYIuSJ%2Ffae25eLBeU6S7AMVcyAfH5XkLB8sVHIeBAQVaaTORuUPKKUuML9hLe3W%2Bg85Y1FJqrKQv1VOnut8l8E8Ot1DTJfDzPSsSVQ%3D%3D&amp;Expires=1778501014" target="_blank" rel="noreferrer noopener"></a></p>



<p>This is not the first time ShinyHunters has gone after Instructure. The group previously targeted the company in September 2024, using social engineering tactics to compromise Salesforce business systems, though that attack did not touch any Canvas product data. </p>



<p>The May 2026 incident is a direct assault on the Canvas platform itself, making it far more serious for the millions of students and educators who depend on it daily. The two incidents also represent different attack classes against separate parts of Instructure infrastructure.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/8dc6847b-2a47-47bc-9133-27e6816ec5df/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.pdf?AWSAccessKeyId=ASIA2F3EMEYEXKYAK7IX&amp;Signature=zTPRJOirHpGdOOrJbHQnh0VdVzw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQCLOoRiLC%2BAO6DtLeUYXhFsZpyXiiJYd30BlAEPkMR79AIhAO16VbAnOYPg%2BvUm30cU%2F1ZAy5HmHZUf4H8iw6gI5HU8KvMECBQQARoMNjk5NzUzMzA5NzA1IgxbgoG82fjrsVrfI6Iq0AQzRmd7sXXIAC3sL7Dt8Ad2AtAL688t62IZvrEi2Z2PC0VYfPZQYcDbO3MJnyLyp7zf6TP2L%2B8zIehsFxllPOHXWBxynL0y%2FDkx63bI9iDBtbFysyW72Rg6QzkoIt6vFc%2B0SrG644Oqrxdw5qPwIG9%2B3fQWesiNhVl5ds13fs2Dq99ivh7i5MNuoLRSiOj%2FXAYFlTWoTb%2B6NFv6mTmFKdLs3Njt34iRWKCACwBALHEa8j2tEZlSXnv7zDNxobIvLy9KeQHCfwEIzyX%2BTq3diNFPDnFEh%2Fm1uLTYme8KKq5O7e7QZfC9zsDuCwaGm%2Bmp1ZsMTmRwu6zgdsnFPmrrandP3tIGOcr%2B1G5eZfHVD1U4cIYJ9NuGNOzjWOK89MpreaCaFcKjS2NyJ50McM9QJCGiAGocADPe7WXPUZMYPnMqFfHajeFiTxoB1ZfE3HtwyUSy0tnQtuBjd8P38xFTbnJnl3I56D20CUngwTiKor8Ivwjf%2F4xES92qMyeVTkaLi8iMsb0SnZOHgNRaT5UCRfNxIV8OXwQDG%2BHtVw2VxeUaom%2FNl2oLLs6GWO%2FNuid29lZDQPFUFZOvHWxZeF%2F8Rtt0gkFkOPre526LapeNbz%2BbxQw8BUMCAtdrvzbddsbtFfvoyByPS9tsxS4SEaJFsXz%2FvvZosXImuGkPH6daSdIKIV67SnT6Fje4uYVqgWrOIrwk8Cb%2BG6B9tnjPEiklznm4t7Y%2B2Olz1dZlBMf4%2FnKkO7dQhdvkg3UlkkRQBC19Ief4UEtjZNm1ZoQqK6c%2Fc%2FedMPzxhtAGOpcBKaARc0Yri%2FSQ9Y7RStgRV7St6jmmy1oVUPJnM8Ev6JpFYZBBaoBTKgB4jdEDNmzfB5Z8Gfw2%2FEISKxJmHiCkbBm5TF%2FelUStwJYniYIuSJ%2Ffae25eLBeU6S7AMVcyAfH5XkLB8sVHIeBAQVaaTORuUPKKUuML9hLe3W%2Bg85Y1FJqrKQv1VOnut8l8E8Ot1DTJfDzPSsSVQ%3D%3D&amp;Expires=1778501014" target="_blank" rel="noreferrer noopener"></a></p>



<p>Researchers and threat intelligence analysts at Bitdefender documented ShinyHunters&#8217; operating pattern as that of an extortion-as-a-service group, <a href="https://cybersecuritynews.com/social-engineering-tactics/" id="105131" target="_blank" rel="noreferrer noopener">historically relying on voice phishing and social engineering</a> to gain initial access, often impersonating IT support or trusted internal personnel. </p>



<p>The group launched a public extortion campaign on May 3, 2026, setting an original deadline of May 8, which was later extended to May 12, 2026. Instructure took Canvas, Canvas Beta, and Canvas Test offline for investigation on May 8, restored service the next day, and permanently shut down the Free-For-Teacher account program as part of its response.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/8dc6847b-2a47-47bc-9133-27e6816ec5df/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.pdf?AWSAccessKeyId=ASIA2F3EMEYEXKYAK7IX&amp;Signature=zTPRJOirHpGdOOrJbHQnh0VdVzw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQCLOoRiLC%2BAO6DtLeUYXhFsZpyXiiJYd30BlAEPkMR79AIhAO16VbAnOYPg%2BvUm30cU%2F1ZAy5HmHZUf4H8iw6gI5HU8KvMECBQQARoMNjk5NzUzMzA5NzA1IgxbgoG82fjrsVrfI6Iq0AQzRmd7sXXIAC3sL7Dt8Ad2AtAL688t62IZvrEi2Z2PC0VYfPZQYcDbO3MJnyLyp7zf6TP2L%2B8zIehsFxllPOHXWBxynL0y%2FDkx63bI9iDBtbFysyW72Rg6QzkoIt6vFc%2B0SrG644Oqrxdw5qPwIG9%2B3fQWesiNhVl5ds13fs2Dq99ivh7i5MNuoLRSiOj%2FXAYFlTWoTb%2B6NFv6mTmFKdLs3Njt34iRWKCACwBALHEa8j2tEZlSXnv7zDNxobIvLy9KeQHCfwEIzyX%2BTq3diNFPDnFEh%2Fm1uLTYme8KKq5O7e7QZfC9zsDuCwaGm%2Bmp1ZsMTmRwu6zgdsnFPmrrandP3tIGOcr%2B1G5eZfHVD1U4cIYJ9NuGNOzjWOK89MpreaCaFcKjS2NyJ50McM9QJCGiAGocADPe7WXPUZMYPnMqFfHajeFiTxoB1ZfE3HtwyUSy0tnQtuBjd8P38xFTbnJnl3I56D20CUngwTiKor8Ivwjf%2F4xES92qMyeVTkaLi8iMsb0SnZOHgNRaT5UCRfNxIV8OXwQDG%2BHtVw2VxeUaom%2FNl2oLLs6GWO%2FNuid29lZDQPFUFZOvHWxZeF%2F8Rtt0gkFkOPre526LapeNbz%2BbxQw8BUMCAtdrvzbddsbtFfvoyByPS9tsxS4SEaJFsXz%2FvvZosXImuGkPH6daSdIKIV67SnT6Fje4uYVqgWrOIrwk8Cb%2BG6B9tnjPEiklznm4t7Y%2B2Olz1dZlBMf4%2FnKkO7dQhdvkg3UlkkRQBC19Ief4UEtjZNm1ZoQqK6c%2Fc%2FedMPzxhtAGOpcBKaARc0Yri%2FSQ9Y7RStgRV7St6jmmy1oVUPJnM8Ev6JpFYZBBaoBTKgB4jdEDNmzfB5Z8Gfw2%2FEISKxJmHiCkbBm5TF%2FelUStwJYniYIuSJ%2Ffae25eLBeU6S7AMVcyAfH5XkLB8sVHIeBAQVaaTORuUPKKUuML9hLe3W%2Bg85Y1FJqrKQv1VOnut8l8E8Ot1DTJfDzPSsSVQ%3D%3D&amp;Expires=1778501014" target="_blank" rel="noreferrer noopener"></a><a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/8dc6847b-2a47-47bc-9133-27e6816ec5df/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.pdf?AWSAccessKeyId=ASIA2F3EMEYEXKYAK7IX&amp;Signature=zTPRJOirHpGdOOrJbHQnh0VdVzw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQCLOoRiLC%2BAO6DtLeUYXhFsZpyXiiJYd30BlAEPkMR79AIhAO16VbAnOYPg%2BvUm30cU%2F1ZAy5HmHZUf4H8iw6gI5HU8KvMECBQQARoMNjk5NzUzMzA5NzA1IgxbgoG82fjrsVrfI6Iq0AQzRmd7sXXIAC3sL7Dt8Ad2AtAL688t62IZvrEi2Z2PC0VYfPZQYcDbO3MJnyLyp7zf6TP2L%2B8zIehsFxllPOHXWBxynL0y%2FDkx63bI9iDBtbFysyW72Rg6QzkoIt6vFc%2B0SrG644Oqrxdw5qPwIG9%2B3fQWesiNhVl5ds13fs2Dq99ivh7i5MNuoLRSiOj%2FXAYFlTWoTb%2B6NFv6mTmFKdLs3Njt34iRWKCACwBALHEa8j2tEZlSXnv7zDNxobIvLy9KeQHCfwEIzyX%2BTq3diNFPDnFEh%2Fm1uLTYme8KKq5O7e7QZfC9zsDuCwaGm%2Bmp1ZsMTmRwu6zgdsnFPmrrandP3tIGOcr%2B1G5eZfHVD1U4cIYJ9NuGNOzjWOK89MpreaCaFcKjS2NyJ50McM9QJCGiAGocADPe7WXPUZMYPnMqFfHajeFiTxoB1ZfE3HtwyUSy0tnQtuBjd8P38xFTbnJnl3I56D20CUngwTiKor8Ivwjf%2F4xES92qMyeVTkaLi8iMsb0SnZOHgNRaT5UCRfNxIV8OXwQDG%2BHtVw2VxeUaom%2FNl2oLLs6GWO%2FNuid29lZDQPFUFZOvHWxZeF%2F8Rtt0gkFkOPre526LapeNbz%2BbxQw8BUMCAtdrvzbddsbtFfvoyByPS9tsxS4SEaJFsXz%2FvvZosXImuGkPH6daSdIKIV67SnT6Fje4uYVqgWrOIrwk8Cb%2BG6B9tnjPEiklznm4t7Y%2B2Olz1dZlBMf4%2FnKkO7dQhdvkg3UlkkRQBC19Ief4UEtjZNm1ZoQqK6c%2Fc%2FedMPzxhtAGOpcBKaARc0Yri%2FSQ9Y7RStgRV7St6jmmy1oVUPJnM8Ev6JpFYZBBaoBTKgB4jdEDNmzfB5Z8Gfw2%2FEISKxJmHiCkbBm5TF%2FelUStwJYniYIuSJ%2Ffae25eLBeU6S7AMVcyAfH5XkLB8sVHIeBAQVaaTORuUPKKUuML9hLe3W%2Bg85Y1FJqrKQv1VOnut8l8E8Ot1DTJfDzPSsSVQ%3D%3D&amp;Expires=1778501014" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="how-the-free-for-teacher-program-was-exploited"><strong>Free-For-Teacher Program Was Exploited</strong></h2>



<p>ShinyHunters claims to have stolen 3.6 TB of data covering approximately 285 million users across 9,000 schools, though Instructure has not confirmed those figures. What the company officially confirmed includes names, email addresses, student IDs, and some private messages between Canvas users. </p>



<p>Instructure stated there is no evidence of exposure for passwords, dates of birth, government identifiers, or financial information. Named institutions affected include the University of Pennsylvania, Harvard, MIT, Oxford, Rutgers, the University of North Carolina system, multiple Missouri colleges, and educational organizations in Australia and the EU.</p>



<p>The Free-For-Teacher account program allowed educators to create Canvas accounts without institutional verification, giving them access to Canvas features for classroom use. These accounts ran on the same production Canvas infrastructure shared with paid institutional tenants, meaning they were logically separated but backed by the same systems. </p>



<p><a href="https://cybersecuritynews.com/shinyhunters-breaches/" id="121522" target="_blank" rel="noreferrer noopener">ShinyHunters exploited this gap, and an attacker using a compromised free account had access patterns</a> indistinguishable from a legitimate teacher piloting Canvas before their school adopted the platform.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/8dc6847b-2a47-47bc-9133-27e6816ec5df/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.pdf?AWSAccessKeyId=ASIA2F3EMEYEXKYAK7IX&amp;Signature=zTPRJOirHpGdOOrJbHQnh0VdVzw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQCLOoRiLC%2BAO6DtLeUYXhFsZpyXiiJYd30BlAEPkMR79AIhAO16VbAnOYPg%2BvUm30cU%2F1ZAy5HmHZUf4H8iw6gI5HU8KvMECBQQARoMNjk5NzUzMzA5NzA1IgxbgoG82fjrsVrfI6Iq0AQzRmd7sXXIAC3sL7Dt8Ad2AtAL688t62IZvrEi2Z2PC0VYfPZQYcDbO3MJnyLyp7zf6TP2L%2B8zIehsFxllPOHXWBxynL0y%2FDkx63bI9iDBtbFysyW72Rg6QzkoIt6vFc%2B0SrG644Oqrxdw5qPwIG9%2B3fQWesiNhVl5ds13fs2Dq99ivh7i5MNuoLRSiOj%2FXAYFlTWoTb%2B6NFv6mTmFKdLs3Njt34iRWKCACwBALHEa8j2tEZlSXnv7zDNxobIvLy9KeQHCfwEIzyX%2BTq3diNFPDnFEh%2Fm1uLTYme8KKq5O7e7QZfC9zsDuCwaGm%2Bmp1ZsMTmRwu6zgdsnFPmrrandP3tIGOcr%2B1G5eZfHVD1U4cIYJ9NuGNOzjWOK89MpreaCaFcKjS2NyJ50McM9QJCGiAGocADPe7WXPUZMYPnMqFfHajeFiTxoB1ZfE3HtwyUSy0tnQtuBjd8P38xFTbnJnl3I56D20CUngwTiKor8Ivwjf%2F4xES92qMyeVTkaLi8iMsb0SnZOHgNRaT5UCRfNxIV8OXwQDG%2BHtVw2VxeUaom%2FNl2oLLs6GWO%2FNuid29lZDQPFUFZOvHWxZeF%2F8Rtt0gkFkOPre526LapeNbz%2BbxQw8BUMCAtdrvzbddsbtFfvoyByPS9tsxS4SEaJFsXz%2FvvZosXImuGkPH6daSdIKIV67SnT6Fje4uYVqgWrOIrwk8Cb%2BG6B9tnjPEiklznm4t7Y%2B2Olz1dZlBMf4%2FnKkO7dQhdvkg3UlkkRQBC19Ief4UEtjZNm1ZoQqK6c%2Fc%2FedMPzxhtAGOpcBKaARc0Yri%2FSQ9Y7RStgRV7St6jmmy1oVUPJnM8Ev6JpFYZBBaoBTKgB4jdEDNmzfB5Z8Gfw2%2FEISKxJmHiCkbBm5TF%2FelUStwJYniYIuSJ%2Ffae25eLBeU6S7AMVcyAfH5XkLB8sVHIeBAQVaaTORuUPKKUuML9hLe3W%2Bg85Y1FJqrKQv1VOnut8l8E8Ot1DTJfDzPSsSVQ%3D%3D&amp;Expires=1778501014" target="_blank" rel="noreferrer noopener"></a></p>



<p>Schools had no native way to identify which Free-For-Teacher accounts accessed their institutional Canvas tenant, whether through legitimate course integrations or malicious activity during the exposure window. The exposure window ran from April 30 to May 8, 2026, when Instructure shut down the program and rotated privileged credentials and API keys. </p>



<p><a href="https://cybersecuritynews.com/unauthorized-access-attempts-in-active-directory/" id="106529" target="_blank" rel="noreferrer noopener">The attacker gained unauthorized access</a> to production Canvas data and potentially achieved write access sufficient to deface login pages at multiple institutions. The stolen data, including student IDs, email addresses, and private message content, represents high-quality material for personalized phishing campaigns targeting students and faculty.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/8dc6847b-2a47-47bc-9133-27e6816ec5df/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.pdf?AWSAccessKeyId=ASIA2F3EMEYEXKYAK7IX&amp;Signature=zTPRJOirHpGdOOrJbHQnh0VdVzw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQCLOoRiLC%2BAO6DtLeUYXhFsZpyXiiJYd30BlAEPkMR79AIhAO16VbAnOYPg%2BvUm30cU%2F1ZAy5HmHZUf4H8iw6gI5HU8KvMECBQQARoMNjk5NzUzMzA5NzA1IgxbgoG82fjrsVrfI6Iq0AQzRmd7sXXIAC3sL7Dt8Ad2AtAL688t62IZvrEi2Z2PC0VYfPZQYcDbO3MJnyLyp7zf6TP2L%2B8zIehsFxllPOHXWBxynL0y%2FDkx63bI9iDBtbFysyW72Rg6QzkoIt6vFc%2B0SrG644Oqrxdw5qPwIG9%2B3fQWesiNhVl5ds13fs2Dq99ivh7i5MNuoLRSiOj%2FXAYFlTWoTb%2B6NFv6mTmFKdLs3Njt34iRWKCACwBALHEa8j2tEZlSXnv7zDNxobIvLy9KeQHCfwEIzyX%2BTq3diNFPDnFEh%2Fm1uLTYme8KKq5O7e7QZfC9zsDuCwaGm%2Bmp1ZsMTmRwu6zgdsnFPmrrandP3tIGOcr%2B1G5eZfHVD1U4cIYJ9NuGNOzjWOK89MpreaCaFcKjS2NyJ50McM9QJCGiAGocADPe7WXPUZMYPnMqFfHajeFiTxoB1ZfE3HtwyUSy0tnQtuBjd8P38xFTbnJnl3I56D20CUngwTiKor8Ivwjf%2F4xES92qMyeVTkaLi8iMsb0SnZOHgNRaT5UCRfNxIV8OXwQDG%2BHtVw2VxeUaom%2FNl2oLLs6GWO%2FNuid29lZDQPFUFZOvHWxZeF%2F8Rtt0gkFkOPre526LapeNbz%2BbxQw8BUMCAtdrvzbddsbtFfvoyByPS9tsxS4SEaJFsXz%2FvvZosXImuGkPH6daSdIKIV67SnT6Fje4uYVqgWrOIrwk8Cb%2BG6B9tnjPEiklznm4t7Y%2B2Olz1dZlBMf4%2FnKkO7dQhdvkg3UlkkRQBC19Ief4UEtjZNm1ZoQqK6c%2Fc%2FedMPzxhtAGOpcBKaARc0Yri%2FSQ9Y7RStgRV7St6jmmy1oVUPJnM8Ev6JpFYZBBaoBTKgB4jdEDNmzfB5Z8Gfw2%2FEISKxJmHiCkbBm5TF%2FelUStwJYniYIuSJ%2Ffae25eLBeU6S7AMVcyAfH5XkLB8sVHIeBAQVaaTORuUPKKUuML9hLe3W%2Bg85Y1FJqrKQv1VOnut8l8E8Ot1DTJfDzPSsSVQ%3D%3D&amp;Expires=1778501014" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="the-broader-phishing-risk-ahead"><strong>The Broader Phishing Risk Ahead</strong></h2>



<p>The risk does not end once a breach window closes. Stolen Canvas data is particularly dangerous because it enables highly convincing spear phishing campaigns that generic attacks simply cannot replicate. </p>



<p>An email referencing a specific Canvas course, quoting an actual private Canvas message, or including the recipient&#8217;s real student ID establishes false credibility that can fool even careful users.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/8dc6847b-2a47-47bc-9133-27e6816ec5df/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.pdf?AWSAccessKeyId=ASIA2F3EMEYEXKYAK7IX&amp;Signature=zTPRJOirHpGdOOrJbHQnh0VdVzw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQCLOoRiLC%2BAO6DtLeUYXhFsZpyXiiJYd30BlAEPkMR79AIhAO16VbAnOYPg%2BvUm30cU%2F1ZAy5HmHZUf4H8iw6gI5HU8KvMECBQQARoMNjk5NzUzMzA5NzA1IgxbgoG82fjrsVrfI6Iq0AQzRmd7sXXIAC3sL7Dt8Ad2AtAL688t62IZvrEi2Z2PC0VYfPZQYcDbO3MJnyLyp7zf6TP2L%2B8zIehsFxllPOHXWBxynL0y%2FDkx63bI9iDBtbFysyW72Rg6QzkoIt6vFc%2B0SrG644Oqrxdw5qPwIG9%2B3fQWesiNhVl5ds13fs2Dq99ivh7i5MNuoLRSiOj%2FXAYFlTWoTb%2B6NFv6mTmFKdLs3Njt34iRWKCACwBALHEa8j2tEZlSXnv7zDNxobIvLy9KeQHCfwEIzyX%2BTq3diNFPDnFEh%2Fm1uLTYme8KKq5O7e7QZfC9zsDuCwaGm%2Bmp1ZsMTmRwu6zgdsnFPmrrandP3tIGOcr%2B1G5eZfHVD1U4cIYJ9NuGNOzjWOK89MpreaCaFcKjS2NyJ50McM9QJCGiAGocADPe7WXPUZMYPnMqFfHajeFiTxoB1ZfE3HtwyUSy0tnQtuBjd8P38xFTbnJnl3I56D20CUngwTiKor8Ivwjf%2F4xES92qMyeVTkaLi8iMsb0SnZOHgNRaT5UCRfNxIV8OXwQDG%2BHtVw2VxeUaom%2FNl2oLLs6GWO%2FNuid29lZDQPFUFZOvHWxZeF%2F8Rtt0gkFkOPre526LapeNbz%2BbxQw8BUMCAtdrvzbddsbtFfvoyByPS9tsxS4SEaJFsXz%2FvvZosXImuGkPH6daSdIKIV67SnT6Fje4uYVqgWrOIrwk8Cb%2BG6B9tnjPEiklznm4t7Y%2B2Olz1dZlBMf4%2FnKkO7dQhdvkg3UlkkRQBC19Ief4UEtjZNm1ZoQqK6c%2Fc%2FedMPzxhtAGOpcBKaARc0Yri%2FSQ9Y7RStgRV7St6jmmy1oVUPJnM8Ev6JpFYZBBaoBTKgB4jdEDNmzfB5Z8Gfw2%2FEISKxJmHiCkbBm5TF%2FelUStwJYniYIuSJ%2Ffae25eLBeU6S7AMVcyAfH5XkLB8sVHIeBAQVaaTORuUPKKUuML9hLe3W%2Bg85Y1FJqrKQv1VOnut8l8E8Ot1DTJfDzPSsSVQ%3D%3D&amp;Expires=1778501014" target="_blank" rel="noreferrer noopener"></a></p>



<p>Instructure has recommended that schools rotate API credentials, <a href="https://cybersecuritynews.com/beyond-phishing-why-email-deliverability-and-domain-reputation-are-key-for-cybersecurity/" id="149502" target="_blank" rel="noreferrer noopener">monitor for phishing emails appearing to come from Canvas</a>, check login pages for unauthorized changes, and alert students, faculty, and staff immediately. Schools should also review Canvas logs for accounts with external email addresses that accessed courses or messages during the April 30 to May 8 exposure window. </p>



<p>Bitdefender MDR customers whose institutions appeared on the ShinyHunters disclosure list were notified directly with recommended actions. Monitoring continues for the full disclosure cycle in case additional Canvas data surfaces on threat actor channels.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/8dc6847b-2a47-47bc-9133-27e6816ec5df/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.pdf?AWSAccessKeyId=ASIA2F3EMEYEXKYAK7IX&amp;Signature=zTPRJOirHpGdOOrJbHQnh0VdVzw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQCLOoRiLC%2BAO6DtLeUYXhFsZpyXiiJYd30BlAEPkMR79AIhAO16VbAnOYPg%2BvUm30cU%2F1ZAy5HmHZUf4H8iw6gI5HU8KvMECBQQARoMNjk5NzUzMzA5NzA1IgxbgoG82fjrsVrfI6Iq0AQzRmd7sXXIAC3sL7Dt8Ad2AtAL688t62IZvrEi2Z2PC0VYfPZQYcDbO3MJnyLyp7zf6TP2L%2B8zIehsFxllPOHXWBxynL0y%2FDkx63bI9iDBtbFysyW72Rg6QzkoIt6vFc%2B0SrG644Oqrxdw5qPwIG9%2B3fQWesiNhVl5ds13fs2Dq99ivh7i5MNuoLRSiOj%2FXAYFlTWoTb%2B6NFv6mTmFKdLs3Njt34iRWKCACwBALHEa8j2tEZlSXnv7zDNxobIvLy9KeQHCfwEIzyX%2BTq3diNFPDnFEh%2Fm1uLTYme8KKq5O7e7QZfC9zsDuCwaGm%2Bmp1ZsMTmRwu6zgdsnFPmrrandP3tIGOcr%2B1G5eZfHVD1U4cIYJ9NuGNOzjWOK89MpreaCaFcKjS2NyJ50McM9QJCGiAGocADPe7WXPUZMYPnMqFfHajeFiTxoB1ZfE3HtwyUSy0tnQtuBjd8P38xFTbnJnl3I56D20CUngwTiKor8Ivwjf%2F4xES92qMyeVTkaLi8iMsb0SnZOHgNRaT5UCRfNxIV8OXwQDG%2BHtVw2VxeUaom%2FNl2oLLs6GWO%2FNuid29lZDQPFUFZOvHWxZeF%2F8Rtt0gkFkOPre526LapeNbz%2BbxQw8BUMCAtdrvzbddsbtFfvoyByPS9tsxS4SEaJFsXz%2FvvZosXImuGkPH6daSdIKIV67SnT6Fje4uYVqgWrOIrwk8Cb%2BG6B9tnjPEiklznm4t7Y%2B2Olz1dZlBMf4%2FnKkO7dQhdvkg3UlkkRQBC19Ief4UEtjZNm1ZoQqK6c%2Fc%2FedMPzxhtAGOpcBKaARc0Yri%2FSQ9Y7RStgRV7St6jmmy1oVUPJnM8Ev6JpFYZBBaoBTKgB4jdEDNmzfB5Z8Gfw2%2FEISKxJmHiCkbBm5TF%2FelUStwJYniYIuSJ%2Ffae25eLBeU6S7AMVcyAfH5XkLB8sVHIeBAQVaaTORuUPKKUuML9hLe3W%2Bg85Y1FJqrKQv1VOnut8l8E8Ot1DTJfDzPSsSVQ%3D%3D&amp;Expires=1778501014" target="_blank" rel="noreferrer noopener"></a></p>



<p><strong>Indicators of Compromise (IoCs):-</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Type</th><th class="has-text-align-left" data-align="left">Indicator</th><th class="has-text-align-left" data-align="left">Description</th></tr></thead><tbody><tr><td>URL</td><td><code>hxxp://91[.]215[.]85[.]103/pay_or_leak/instructure_affected_schools_list[.]txt</code></td><td>ShinyHunters public listing of affected institutions (defanged; access only from sandboxed environment)</td></tr><tr><td>URL</td><td><code>hxxps://shinyp0g4jjniry5qi824btzn0p6mxhrdtxe2k6pdy4g3vdzqvr[.]onion/</code></td><td>ShinyHunters public data leak site (defanged; must use Tor or similar browser)</td></tr><tr><td>IP</td><td><code>91[.]215[.]85[.]103</code></td><td>ShinyHunters infrastructure hosting the affected schools list (defanged)</td></tr></tbody></table></figure>



<p><strong>Note:</strong> <em>IP addresses and domains are intentionally defanged (e.g., </em><code><em>[.]</em></code><em>) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM</em>.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/shinyhunters-breaches-instructure-canvas-lms/">ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/ShinyHunters-Breaches-Instructure-Canvas-LMS-Through-Free-For-Teacher-Account-Program.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149640</post-id>	</item>
		<item>
		<title>Crimenetwork Takedown Exposes 22,000 Users and Over 100 Illegal Sellers</title>
		<link>https://cybersecuritynews.com/crimenetwork-exposes-22000-users/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Mon, 11 May 2026 13:17:00 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149591</guid>

					<description><![CDATA[<p>In a massive, internationally coordinated operation, the Frankfurt am Main Public Prosecutor&#8217;s Office – Central Office for Combating Internet Crime (ZIT) and the Federal Criminal Police Office (BKA) have successfully dismantled the relaunched &#8220;Crimenetwork&#8221; platform. Law enforcement officers arrested the suspected operator, a 35-year-old German citizen, at his residence in Mallorca. A special unit of [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/crimenetwork-exposes-22000-users/">Crimenetwork Takedown Exposes 22,000 Users and Over 100 Illegal Sellers</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In a massive, internationally coordinated operation, the Frankfurt am Main Public Prosecutor&#8217;s Office – Central Office for Combating Internet Crime (ZIT) and the Federal Criminal Police Office (BKA) have successfully dismantled the relaunched &#8220;Crimenetwork&#8221; platform.</p>



<p>Law enforcement officers arrested the suspected operator, a 35-year-old German citizen, at his residence in Mallorca.</p>



<p>A special unit of the Spanish National Police executed the arrest based on a European Arrest Warrant, effectively halting one of the most prominent marketplaces in the German-speaking underground economy.</p>



<h2 class="wp-block-heading" id="h-crimenetwork-exposes"><strong>Crimenetwork Exposes</strong></h2>



<p>Authorities allege that the accused built and administered this entirely new technical infrastructure under the name &#8220;Crimenetwork&#8221; just days after police shut down the original platform in December 2024.</p>



<p>Despite the previous administrator&#8217;s arrest, the <a href="https://cybersecuritynews.com/u-s-treasury-sanctions-admin-of-nemesis/" target="_blank" rel="noreferrer noopener">rebooted darknet site</a> quickly gained traction. It offered a similar range of illegal goods and services, including stolen data, forged documents, and illicit narcotics.</p>



<p>Before its sudden takedown, the renewed platform had quickly amassed a user base of over 22,000 individuals and hosted more than 100 active vendors.</p>



<p>Users on the platform carried out illicit transactions mainly using privacy-focused <a href="https://cybersecuritynews.com/bitcoin-halving-dollar-printing-and-the-future-of-cryptocurrency/" target="_blank" rel="noreferrer noopener">cryptocurrencies such as Bitcoin</a>, Litecoin, and Monero.</p>



<p>Investigators secured extensive evidence indicating that the new platform generated revenues exceeding €3.6 million.</p>



<p>The primary operator collected commission payments on every processed sale and charged vendors monthly fees for advertising rights and sales licenses.</p>



<p>During the recent raid, <a href="https://cybersecuritynews.com/blacksuit-ransomware-servers/" target="_blank" rel="noreferrer noopener">international law enforcement successfully seized</a> approximately €194,000 in assets suspected of being linked directly to the platform.</p>



<p>Furthermore, authorities obtained comprehensive user and transaction databases, providing critical leads for tracking down the buyers and sellers who primarily reside in German-speaking regions.</p>



<p>This successful takedown relied heavily on close collaboration among the BKA, the ZIT, the Spanish Policía Nacional, Moldovan cybercrime units, and Eurojust.</p>



<p>Regional German police departments also coordinated simultaneous measures against the accused for separate commercial fraud investigations.</p>



<p>Carsten Meywirth, <a href="https://www.bka.de/DE/Presse/Listenseite_Pressemitteilungen/2026/Presse2026/260508_PM_Crimenetwork.html?utm_source=BC" target="_blank" rel="noreferrer noopener nofollow">Director at the BKA and Head of the Cybercrime Department, stated</a>: &#8220;The reboot of Crimenetwork has failed, and another administrator will have to answer before a German court.</p>



<p>We are also consistently enforcing applicable law in the Darknet together with our national and international partners. Cybercrime doesn&#8217;t pay&#8221;.</p>



<p>Adding to this warning, Dr. Benjamin Krause, Senior Public Prosecutor and Press Spokesperson for the ZIT, emphasized the legal consequences.</p>



<p>In March 2026, the alleged operator of the predecessor version of &#8216;Crimenetwork&#8217; was sentenced by the Gießen Regional Court to seven years and ten months in prison.</p>



<p>The court also ordered the confiscation of the proceeds of crime amounting to over ten million euros.</p>



<p>Even though this verdict is not yet legally binding, it clearly demonstrates that crime on the Darknet also has consequences.</p>



<p>Following the shutdown, a law enforcement assurance banner was placed on the seized online portal (bustedagaincrime.network) to notify users of the takedown.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 92%,rgb(169,184,195) 100%)"><strong>Cybercriminals now enter through your suppliers instead of your front door &#8211; <a href="https://www.manageengine.com/products/desktop-central/webinars/uk-cybersecurity-essentials-2026.html?utm_source=CSN&amp;utm_medium=TPS-mailer&amp;utm_campaign=UKCSW" target="_blank" rel="noreferrer noopener nofollow">Free Webinar</a></strong></p>
<p>The post <a href="https://cybersecuritynews.com/crimenetwork-exposes-22000-users/">Crimenetwork Takedown Exposes 22,000 Users and Over 100 Illegal Sellers</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/Crimenetwork-Takedown-Exposes-22000-Users-and-Over-100-Illegal-Sellers.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149591</post-id>	</item>
		<item>
		<title>Trending Hugging Face Repo With 200k Downloads Executes Malware on Windows Machines</title>
		<link>https://cybersecuritynews.com/trending-hugging-face-repository-with-200k-downloads/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Mon, 11 May 2026 12:35:48 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149642</guid>

					<description><![CDATA[<p>A popular artificial intelligence repository on Hugging Face was recently found hiding dangerous malware that targeted Windows users. The repository, named &#8220;Open-OSS/privacy-filter,&#8221; had racked up over 200,000 downloads before the platform&#8217;s team stepped in and removed it. The malicious package disguised itself as a legitimate privacy filtering tool. It copied its model card nearly verbatim [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/trending-hugging-face-repository-with-200k-downloads/">Trending Hugging Face Repo With 200k Downloads Executes Malware on Windows Machines</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A popular artificial intelligence repository on Hugging Face was recently found hiding dangerous malware that targeted Windows users. </p>



<p>The repository, named &#8220;Open-OSS/privacy-filter,&#8221; had racked up over 200,000 downloads before the platform&#8217;s team stepped in and removed it.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331" target="_blank" rel="noreferrer noopener"></a></p>



<p>The malicious package disguised itself as a legitimate privacy filtering tool. It copied its model card nearly verbatim from OpenAI&#8217;s own Privacy Filter project, giving it a convincing, trustworthy appearance. </p>



<p>Thousands of developers and researchers downloaded it without any suspicion, thinking they were working with a well-regarded and reliable AI utility.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://www.hiddenlayer.com/research/malware-found-in-trending-hugging-face-repository-open-oss-privacy-filter" id="https://www.hiddenlayer.com/research/malware-found-in-trending-hugging-face-repository-open-oss-privacy-filter" target="_blank" rel="noreferrer noopener nofollow">Researchers at Hidden Layer identified the malicious code</a> buried deep inside the repository. Their analysis revealed a sophisticated, multi-stage attack chain carefully designed to steal sensitive data from Windows machines and stay hidden throughout the entire process.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attack did not announce itself in any way. Instead, it quietly executed in the background, using a loader file that mimicked the look and behavior of a legitimate AI model tool. Once a user ran it on a Windows machine, the real damage began without any visible warning signs.<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></p>



<p>The reach of this campaign was not accidental. Before access to the repository was disabled, it had already climbed to the number one trending position on Hugging Face, with approximately 244 downloads and 77 likes in under one hour. Those numbers were almost certainly inflated artificially to push the repository into the spotlight and attract more victims.<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></p>



<h2 class="wp-block-heading" id="how-the-malware-worked"><strong>Trending Hugging Face Repository Executes Malware</strong></h2>



<p>The attack chain unfolded across six distinct stages. In the first stage, the model card instructed users to clone the repository and run a <code>startbat</code> file on Windows, or a Python <code>loaderpy</code> script on Linux or macOS. </p>



<p>When executed on Windows, the <code>loaderpy</code> script ran a decoy piece of code that looked like a real loader, then called a function named <code>verifychecksumintegrity</code>, which disabled SSL verification, decoded a base64-encoded URL pointing to <code>jsonkeeper.com</code>, fetched a JSON document, and extracted the <code>cmd</code> field. That command was passed directly to PowerShell, running silently with execution policy bypassed.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331" target="_blank" rel="noreferrer noopener"></a></p>



<p>The second stage involved PowerShell downloading a batch file called <code>updatebat</code> from a domain mimicking a blockchain analytics service, <code>api.eth-fastscan.org</code>. The batch file performed six core actions, including admin checks, payload downloads, and adding <a href="https://cybersecuritynews.com/defender-flags-digicert-root-certificates/" id="148972" target="_blank" rel="noreferrer noopener">Microsoft Defender exclusions for the directories where the malicious executable was dropped</a>. </p>



<p>A scheduled task named <code>MicrosoftEdgeUpdateTaskCore</code> was also created to maintain persistence, though it was designed as a one-shot launcher that deleted itself after running, leaving no obvious trace behind.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="the-infostealer-payload-and-credential-theft"><strong>The Infostealer Payload and Credential Theft</strong></h2>



<p>The final payload was a 10 MB Rust-based infostealer with an impressive range of capabilities. It specifically targeted Windows API calls to defeat static analysis and ran checks to detect debuggers, sandboxes, and virtual machines, including VirtualBox, VMware, Hyper-V, and Parallels. If it detected those environments, it simply stopped running.<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></p>



<p>Once active on a real machine, it launched eight parallel collection modules that targeted Chrome and Firefox browser cookies, login data, saved passwords, session cookies, SSH keys, VPN configurations, FTP credentials, and cryptocurrency wallet files. Screenshots were also captured and packaged for exfiltration. <a href="https://cybersecuritynews.com/detecting-malicious-javascript-using-behavior-analysis-and-network-traces/" id="100693" target="_blank" rel="noreferrer noopener">All stolen data was compressed and sent to a command-and-control server</a> at <code>recargapopular.com</code> using a POST request with a Bearer token authorization header.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331" target="_blank" rel="noreferrer noopener"></a></p>



<p>Hidden Layer&#8217;s telemetry also linked the same attacker account to six other repositories uploaded on April 24, 2025, all containing nearly identical loader functionality. The shared infrastructure between those repositories and the Open-OSS/privacy-filter campaign strongly suggested this was part of a broader, coordinated supply chain operation targeting open-source AI ecosystems.<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></p>



<p>Anyone who downloaded or cloned Open-OSS/privacy-filter, or any of the related repositories listed in the IOCs table below, should treat the affected system as fully compromised. </p>



<p><a href="https://cybersecuritynews.com/the-hidden-challenges-of-deploying-ai-soc-agents/" id="133455" target="_blank" rel="noreferrer noopener">Recommended actions include isolating the host</a> immediately, rotating every credential stored in browsers, password managers, or credential stores on that machine, and revoking any cloud provider tokens or SSH keys that may have been present. Reimaging the host is strongly advised before returning it to production use.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331" target="_blank" rel="noreferrer noopener"></a></p>



<p><strong>Indicators of Compromise (IoCs):-</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Type</th><th class="has-text-align-left" data-align="left">Indicator</th><th class="has-text-align-left" data-align="left">Description</th></tr></thead><tbody><tr><td>Domain</td><td><code>api.eth-fastscan[.]org</code></td><td>Hosts&nbsp;<code>updatebat</code>&nbsp;second-stage downloader batch file&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>Domain</td><td><code>recargapopular[.]com</code></td><td>C2 exfiltration endpoint receiving stolen data via POST&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>Domain</td><td><code>jsonkeeper[.]com</code></td><td>Paste service used to host and rotate PowerShell payload&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>Domain</td><td><code>welovechinatown[.]info</code></td><td>C2 domain observed in a separate related sample&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>URL</td><td><code>https[://]api.eth-fastscan[.]org/update.bat</code></td><td>Direct URL delivering the second-stage batch file&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>File Hash (SHA256)</td><td><code>3e7cb11}cx||</code>&nbsp;(loaderpy)</td><td>SHA256 hash of the primary Python loader file&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>File Hash (SHA256)</td><td><code>5e8ca2a7f4</code>&nbsp;(loaderpy v2)</td><td>SHA256 hash of second loader variant with identical functionality&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>File Hash (SHA256)</td><td><code>startbat</code>&nbsp;hash</td><td>SHA256 of Windows batch launcher in the repository&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>File Hash (SHA256)</td><td><code>updatebat</code>&nbsp;hash</td><td>SHA256 of the PowerShell-executed batch payload&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>File Hash (SHA256)</td><td>Infostealer C1</td><td>SHA256 hash of the Rust-based infostealer payload&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>Hugging Face Repo</td><td><code>anthubBonsai/BonsaiLLM</code></td><td>Related malicious repository under same account&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>Hugging Face Repo</td><td><code>anthubWen/5BA/BAREPEWen/5}BA</code></td><td>Related malicious repository uploaded April 24, 2025&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>Hugging Face Repo</td><td><code>anthubWen/ClaudeOpusReasoningDistilled</code></td><td>Related malicious repository under same attacker account&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>Hugging Face Repo</td><td><code>anthubWen/ClaudeOpusReasoningDistilled</code>&nbsp;variant</td><td>Loader contained near-identical command retrieval URL&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>Scheduled Task</td><td><code>MicrosoftEdgeUpdateTaskCore</code></td><td>Persistence mechanism impersonating legitimate Edge updater&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>File Path</td><td><code>%TEMP%\update.bat</code></td><td>Location where second-stage batch file is written and executed&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr><tr><td>File Path</td><td><code>%TEMP%\runners1</code>&nbsp;/&nbsp;<code>runnerps1</code></td><td>Runner script dropping Defender exclusions and infostealer binary&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/1b905bd9-ae1e-4322-9b29-ca439f61c225/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.pdf?AWSAccessKeyId=ASIA2F3EMEYEUEYKSSZH&amp;Signature=ZLC7SKiG47zeYo%2F1HmrozrFN6VA%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEwaCXVzLWVhc3QtMSJIMEYCIQDZagRC9fiFsyvdllUSZ3%2FWzYRKPdwq7uXHSrtEQO1XXwIhAKU9%2BtbdEOiA1Qf53dXhSO%2BYU3poJC63XpjHLF%2FUjXeaKvMECBUQARoMNjk5NzUzMzA5NzA1Igxcs6hhkTtw0MIVvZUq0AQ0A5Sw5qTqndsmuUTVpVU%2FlPPb3Om207zKxpo6KBoHVFTlfYfuXCsE3XkS5vj88fSb59%2FTNlBw25nyvgNnmkFYRrw8y2yTbwsUvWeClDowZGzApmtthTmrMfLy3AwbS%2FUA%2BdH%2FBKPPmmUnX94W%2BRqGGWoAL6ElZOCztvTvzzU%2BGpwf36vImiWuQCjA6FHZeLlEZPCzu%2BA6EQY90niRH2YIaxHHfcK6GnyRpZweuDPyZPW0%2BuakeVS8tHowLEgLlF%2B4ShAgWPEy9D%2BygJKhGP7ZS6MIFvVIdhJVFnm%2FGcJU58ddW9Gvngrl8Iy4cqnamfeMXo%2B2fJ6s5HD3mZ0eCnXub%2Fdd%2BAbDJ1YrOw7KJvR2tmTrb548z6sXCKLKwrlRlY8tzwOKJRzfRB2QO%2FH%2FSnjdbGFwWquk1J%2FulmeuM93qr%2FPFQhiBhCp%2BZTJ1UFl1ZuOrM9l0re3ydjtfa1wlu%2FK975F5VjVTkKNXcqsGJAyO52Fkhvb76tfc%2Fv7gYRjrk%2Fjx8watkMallp9mTAhA09Cvy2syYBtAVDUhk8Txzh%2Bk%2BLIpZdd5JW5ayrLWT5Rurfhqqqiwr0V4yqgK%2Fdif0a7sURHbshxIINWIiYEuv%2FDYU%2B2mGRjgD%2BnUrimD1w5WHjDWVq1AZMJ8LoEjuRLoJ8uJ%2FOlEWhcTffa8pnLEv8rYNlUXzT245HKLd1h9M9%2FV4KMXR9n8oy3k31aTPbJz0YBTuitmgFj2PFJztY5T6H%2B84d9xnMglW3BRv4yhM2ULCiiISXpEGGQoTnBqSfkParCKMKOGh9AGOpcBOeTIw4KmIXSF70KL7Qef1A8u6aB9VVtfs24yYEcpbegpZFshbYwtXlP1jyF4P6C91dM4BgOEaaMU6Woi69fihaRu5kH5ZBSMR1y%2FST%2Frz6TOdFKqUTqndc9zuk1zJv%2FzuS7f1WcBV8LN7a1T9%2FqeX6NiXVvMAyRx9haDNdheBIiD9ofZ00Wh0MP8keqa%2Ft6bKvtX6WQtig%3D%3D&amp;Expires=1778502331"></a></td></tr></tbody></table></figure>



<p><strong>Note:</strong> <em>IP addresses and domains are intentionally defanged (e.g., </em><code><em>[.]</em></code><em>) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM</em>.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 92%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/trending-hugging-face-repository-with-200k-downloads/">Trending Hugging Face Repo With 200k Downloads Executes Malware on Windows Machines</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/Trending-Hugging-Face-Repository-With-200k-Downloads-Executes-Malware-on-Windows-Machines.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149642</post-id>	</item>
		<item>
		<title>GhostLock Attack Leverages Windows file-sharing to Lock Files Access Like Ransomware</title>
		<link>https://cybersecuritynews.com/ghostlock-attack/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Mon, 11 May 2026 11:38:12 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149582</guid>

					<description><![CDATA[<p>Traditional ransomware disrupts organizations by encrypting data and demanding payment for decryption keys. However, a newly disclosed technique called GhostLock demonstrates a fundamentally different availability attack that achieves the same business disruption without writing a single encrypted byte to disk. Discovered by Kim Dvash, an Offensive Security Team Leader, GhostLock exploits standard Windows file-sharing behavior [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/ghostlock-attack/">GhostLock Attack Leverages Windows file-sharing to Lock Files Access Like Ransomware</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Traditional ransomware disrupts organizations by encrypting data and demanding payment for decryption keys.</p>



<p>However, a newly disclosed technique called GhostLock demonstrates a fundamentally different availability attack that achieves the same business disruption without writing a single encrypted byte to disk.</p>



<p>Discovered by Kim Dvash, an Offensive Security Team Leader, GhostLock exploits standard Windows file-sharing behavior to cause widespread accessibility failures.</p>



<p>By systematically holding files in an exclusively locked state, a low-privileged domain user with standard read access can paralyze corporate <a href="https://cybersecuritynews.com/smbleed-vulnerability/" target="_blank" rel="noreferrer noopener">Server Message Block (SMB) file shares</a>. From the victim&#8217;s perspective, the impact is identical to a ransomware infection.</p>



<p>Critical files become inaccessible, enterprise resource planning applications crash, and shared workflow pipelines fail, requiring specialist intervention to restore operations.</p>



<p>The technique exploits a fundamental, well-documented behavior of the Windows operating system. By invoking the <code>CreateFileW</code> API with <code>dwShareMode</code> set to <code>0x00000000</code>, any authenticated domain user can acquire an exclusive deny-share handle on a file over SMB.</p>



<p>This forces a <code>STATUS_SHARING_VIOLATION (0xC0000043)</code> error for every other process or network client attempting to open that file for any purpose, including read, write, or delete until the handle is voluntarily closed or forcibly terminated by a storage administrator.</p>



<p>The attack surface is not new. <code>CreateFileW</code> with <code>dwShareMode = 0</code> is the same mode Microsoft Office uses when it opens a document for editing a behavior that has existed since Windows NT 3.1. No CVE has been filed because there is no software defect to patch.</p>



<h2 class="wp-block-heading" id="how-the-attack-works-at-scale"><strong>GhostLock Attack Exploited</strong></h2>



<p>GhostLock implements this single API call through a Python <code>ctypes</code> wrapper requiring no administrative rights and no external dependencies.</p>



<p>To scale across an enterprise NAS, it employs a 32-thread parallel work-stealing scanner that parallelizes SMB2 <code>QUERY_DIRECTORY</code> round-trips, reducing file discovery on a 500,000-file share from over 61 minutes to approximately 6 minutes and 22 seconds.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6lSHneXvsqnEQtn7UKAgMANDIqyMRiVivgr3Cv1Y6kAe6q2lW2t5G4PH95I0it82iI3qhrRSm4NGgsAA6aAP8ch0VwE4l5r3qfNBtHkUFoD3sf30UmBNlUyyftPwS-1D0gnPnEFjhXYqdrU2rzbNslXD3spC-6LaSVHhvz4MidUut-ecaDKuIisqO_Fjh/s16000/GhostLock%20Attack.webp" alt=""/></figure>
</div>


<p>Experimental testing against isolated infrastructure showed handle acquisition across 500,000 files completed in just 2 minutes and 37 seconds, achieving a 99.6% lock success rate.</p>



<p>During a 60-second hold period, victim simulations recorded a 99.8% file access block rate. A single SMB session can hold up to 64,000 exclusive handles simultaneously; with ten parallel sessions, an attacker can exceed 500,000 locked handles sufficient to paralyze a significant fraction of an entire <a href="https://cybersecuritynews.com/azure-private-endpoint-exposes-azure-resources/" target="_blank" rel="noreferrer noopener">enterprise NAS deployment</a>.</p>



<p>What makes GhostLock particularly dangerous is its complete evasion of every conventional ransomware defense layer. The paper evaluated the tool against seven enterprise security control categories:</p>



<ul class="wp-block-list">
<li><strong>Honeypot/canary files</strong> produced zero alerts — canaries trigger on write events, and GhostLock performs no writes.</li>



<li><strong>Write-rate anomaly detectors</strong> produced zero alerts — the metric they monitor (write operations) is simply absent.</li>



<li><strong>Behavioral AI ransomware engines</strong> produced zero alerts — GhostLock&#8217;s read-open profile is indistinguishable from a search indexer or backup pre-scan agent.</li>



<li><strong>Commercial EDR agents</strong> produced zero alerts — the system call profile mirrors Microsoft Word opening documents.</li>



<li><strong>NDR/deep packet inspection</strong> produced zero alerts — SMB2 traffic showed only <code>CREATE</code> and <code>CLOSE</code> requests, identical to normal document access.</li>



<li><strong>SIEM correlation rules</strong> produced zero alerts — no existing ruleset monitors per-session exclusive handle accumulation.</li>
</ul>



<p>The only reliable detection signal exists inside the NAS management layer itself: the per-session count of simultaneously held exclusive handles.</p>



<p><a href="https://ghostlock.io/#tool" target="_blank" rel="noreferrer noopener nofollow">The paper notes that a</a> legitimate single-user application rarely holds more than a few dozen exclusive handles at once, while GhostLock accumulates tens of thousands, but this metric is not ingested by any enterprise SIEM reviewed in the research.</p>



<p>Even after detection, recovery is not straightforward. Terminating the offending SMB session requires storage administration expertise, and in most large enterprises, the storage operations team and security operations team operate independently without pre-built joint runbooks.</p>



<p>The estimated mean time to recovery in tabletop exercises without a pre-built runbook was 4 to 8 hours.</p>



<p>Notably, if the attacker&#8217;s <a href="https://cybersecuritynews.com/azure-active-directory-vulnerability/" target="_blank" rel="noreferrer noopener">Active Directory credentials</a> are revoked, the existing authenticated SMB session and all its locks can persist for an additional 15 to 60 minutes before session timeout, depending on platform configuration.</p>



<p>Dvash calls on NAS vendors to expose per-session exclusive-handle counts as standard security telemetry alongside existing syslog outputs, and urges SIEM vendors to build storage platform integrations that ingest this data.</p>



<p>For immediate defensive action, the paper recommends alerting on any single SMB session accumulating more than 500 exclusive handles, implementing an NDR rule for bulk SMB <code>CREATE</code> requests with zero corresponding <code>WRITE</code> operations over a 30-minute window, and establishing a joint SecOps/StorageOps runbook specifically for NAS session termination.</p>



<p>The GhostLock tool and source code are available at <a href="https://github.com/kimd155/GhostLock" target="_blank" rel="noreferrer noopener nofollow">github.com/kimd155/ghostlock</a> and the companion research site at ghostlock.io.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 92%,rgb(169,184,195) 100%)"><strong>Cybercriminals now enter through your suppliers instead of your front door &#8211; <a href="https://www.manageengine.com/products/desktop-central/webinars/uk-cybersecurity-essentials-2026.html?utm_source=CSN&amp;utm_medium=TPS-mailer&amp;utm_campaign=UKCSW" target="_blank" rel="noreferrer noopener nofollow">Free Webinar</a></strong></p>
<p>The post <a href="https://cybersecuritynews.com/ghostlock-attack/">GhostLock Attack Leverages Windows file-sharing to Lock Files Access Like Ransomware</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/GhostLock-Attack-1.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149582</post-id>	</item>
		<item>
		<title>Hackers Use Weaponized JPEG File to Deploy Trojanized ScreenConnect Malware</title>
		<link>https://cybersecuritynews.com/hackers-use-weaponized-jpeg-file/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Mon, 11 May 2026 11:33:41 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149623</guid>

					<description><![CDATA[<p>A sophisticated new cyberattack campaign is targeting Windows systems using a fake image file to sneak dangerous malware past security defenses. The operation, named Operation SilentCanvas, tricks victims into running a malicious PowerShell script disguised as a harmless JPEG photo, ultimately handing attackers full and silent control of the infected machine. The attack begins when [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/hackers-use-weaponized-jpeg-file/">Hackers Use Weaponized JPEG File to Deploy Trojanized ScreenConnect Malware</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A sophisticated new cyberattack campaign is targeting Windows systems using a fake image file to sneak dangerous malware past security defenses. The operation, named Operation SilentCanvas, tricks victims into running a malicious PowerShell script disguised as a harmless JPEG photo, ultimately handing attackers full and silent control of the infected machine.<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071"></a></p>



<p>The attack begins when a victim receives what appears to be a routine image file called sysupdate.jpeg through a phishing email, a fake software update prompt, or a deceptive file-sharing link. </p>



<p>Despite carrying a .jpeg extension, the file contains no actual image data. Instead, it holds a PowerShell script engineered to quietly set up a staging environment and pull down additional malicious components from attacker-controlled servers.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://www.cyfirma.com/research/operation-silentcanvas-jpeg-based-multistage-powershell-intrusion/" id="https://www.cyfirma.com/research/operation-silentcanvas-jpeg-based-multistage-powershell-intrusion/" target="_blank" rel="noreferrer noopener nofollow">Researchers at Cyfirma identified and analyzed the full attack chain</a>, revealing just how deep the intrusion goes once the file is opened. The campaign does not rely on a single trick but chains together multiple advanced techniques to avoid detection and maintain a firm foothold inside targeted environments.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071" target="_blank" rel="noreferrer noopener"></a></p>



<p>Once the initial file runs, the malware downloads a trojanized version of <a href="https://cybersecuritynews.com/connectwise-screenconnect-vulnerability/" id="148713" target="_blank" rel="noreferrer noopener">ConnectWise ScreenConnect, a legitimate remote access tool</a> widely used across enterprise networks. The altered version gives attackers a persistent hidden back door while appearing to blend in with trusted software already present on the system.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071" target="_blank" rel="noreferrer noopener"></a></p>



<p>The threat also gains elevated privileges without triggering any visible security warning. It does this through a fileless technique that manipulates a Windows registry path and abuses a trusted Windows binary to silently bypass the standard User Account Control prompt.<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071"></a></p>



<h2 class="wp-block-heading" id="how-the-weaponized-jpeg-deploys-the-malware"><strong>How the Weaponized JPEG Deploys the Malware</strong></h2>



<p>The sysupdate.jpeg file lacks the standard image header that all real JPEG files carry. When a victim opens it, Windows does not flag it as a script because the extension mimics an image. </p>



<p>The embedded PowerShell code creates a hidden folder at C:\Systems and downloads a trojanized ScreenConnect package from legitserver.theworkpc[.]com over TCP port 5443.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071" target="_blank" rel="noreferrer noopener"></a></p>



<p>To avoid antivirus detection, the malware reconstructs dangerous command strings at runtime rather than writing them plainly in the file. It also downloads a secondary payload named access.jpeg and runs it directly in memory, so no suspicious executable touches the disk. </p>



<p>Microsoft&#8217;s own .NET compiler, csc.exe, then builds a custom launcher named uds.exe directly on the victim machine, giving each compiled binary a unique fingerprint that defeats signature-based scanning.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPlOZSG9SL2yjtAB6vIsQmfaIaf3xczsxPpvl8ZJJEvYktiDlIqx1Zly_qn_LDuoCNfSIepUau09jNrw4RRmykQKXSzsLvIUEc1uxNPAHGRZ3pF2WPCSRa9EnPTMZlA5nQITb-LN-n7yYng8V4iIFc6sH20YNQ5KGcNyRirvXDaR_9jI67jaHJLgpPwZw/s16000/Multi-Stage%20Infection%20Chain%20Overview%20(Source%20-%20Cyfirma).webp" alt="Multi-Stage Infection Chain Overview (Source - Cyfirma)" /><figcaption class="wp-element-caption">Multi-Stage Infection Chain Overview (Source &#8211; Cyfirma)</figcaption></figure>
</div>


<p><a href="https://cybersecuritynews.com/new-desckvb-rat-with-multi-stage-infection-chain/" id="141598" target="_blank" rel="noreferrer noopener">The multi-Stage infection chain shows the end-to-end attack workflow</a> beginning with social engineering and weaponized JPEG delivery, followed by PowerShell payload execution, AMSI bypass, and trojanized ScreenConnect deployment.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071" target="_blank" rel="noreferrer noopener"></a></p>



<p>After the launcher runs, the malware hijacks a registry key tied to the ms-settings protocol and redirects it toward uds.exe. It then triggers ComputerDefaults.exe, a trusted Windows binary that auto-elevates, causing the payload to run with full administrator rights and no visible prompt. The registry key enabling this bypass is deleted within two seconds, destroying evidence before any investigator can find it.<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071"></a></p>



<h2 class="wp-block-heading" id="post-compromise-capabilities-and-persistence"><strong>Post-Compromise Capabilities and Persistence</strong></h2>



<p>Once the trojanized ScreenConnect framework is active, the attacker gains remarkable control over the infected machine. The modified software supports real-time screen monitoring, video recording, microphone capture, clipboard interception, keystroke logging, and silent file transfers through an encrypted channel designed to block network inspection.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3pYQhafPRXfmf_jHZK3T_mjLccHmzEeCkSO1j4Rbu3MizcWPTcTA7Jw-FDKg159wq1wK0WlAC6lGpOxajQeCdGg_YnHNrHa_U2qGqusyn1ppHg5T6EZkkUD6_YbHNso3oFq4T39H9GsZ-f-kqdddAHWY2nT00UNEdZVpnHxm1PxG3OLxvb5eM7caDYM4/s16000/Hex-level%20static%20analysis%20of%20the%20weaponized%20sysupdate.jpeg%20payload%20(Source%20-%20Cyfirma).webp" alt="Hex-level static analysis of the weaponized sysupdate.jpeg payload (Source - Cyfirma)" /><figcaption class="wp-element-caption">Hex-level static analysis of the weaponized sysupdate.jpeg payload (Source &#8211; Cyfirma)</figcaption></figure>
</div>


<p>The hex-level static analysis of the weaponized sysupdate.jpeg payload shows the embedded PowerShell staging logic and malicious infrastructure references.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071" target="_blank" rel="noreferrer noopener"></a></p>



<p>The malware creates a hidden desktop environment operating out of the logged-in user&#8217;s view, allowing the attacker to run tools without detection. A persistent <a href="https://cybersecuritynews.com/recoverit-tool/" id="141968" target="_blank" rel="noreferrer noopener">Windows service named OneDriveServers keeps the malware alive</a> across reboots. </p>



<p>A separate component intercepts usernames and passwords at the Windows login screen before they reach the authentication system, and hidden local administrator accounts can be created for long-term access.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071" target="_blank" rel="noreferrer noopener"></a></p>



<p>Security teams are advised to block or closely monitor execution of commonly abused Windows binaries including csc.exe, cvtres.exe, and ComputerDefaults.exe. Organizations should enforce strict controls over remote access platforms, deploy detection rules for suspicious PowerShell behavior, and isolate any system showing unexpected ScreenConnect activity. Credential resets for all privileged accounts are strongly recommended following any suspected exposure.<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/282eda14-030a-4243-b058-03beab18014f/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.pdf?AWSAccessKeyId=ASIA2F3EMEYEXWJTZ46P&amp;Signature=Bi6g4V1U1AzcjHAvCpom%2FDsOqUw%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEoaCXVzLWVhc3QtMSJHMEUCIE7856zDipxv6kwUFTi%2FjOmzCYaBaXmGiEPeiIx3QSo1AiEAvhFUWNg9PnnMpHJbx4zVA%2Fqb6kW3rspBczYVMrKOAvQq8wQIExABGgw2OTk3NTMzMDk3MDUiDLJLBOXcwMeGYUwurSrQBP%2FEoOyxT3UkiEawQ2fT7fk%2BJTqP1wv7a%2F01gxyIGJ2EYjoWk6%2BrbbMoCLgz2NeOx%2FW4SSDN62vVfNqT1%2Fifqafauz8igl0v8ETzR0bTuaoC%2BsABYLbhYvj92P8FHZo0aFb3QjoOYMt6g6aUBt%2F6xYfUH7sxcsBx%2F9269Hl0O6kNWOd%2F9TZKzFoLqBoTg2ml3931d%2B8kaIQVIskcWiF7Wq9nXybf6KCoKlmAAIAW3j4jKtIrf%2Fui4qXlq6VQQt9LX7x6VYysQ2sCK3TkM3FjqqJWfAjZQa%2F4hcXJlkQV2BhQLzzRCjzGQZdk9xo0qBzUX7%2FVcNqtTrwiLCC5Bk%2FEqQKE5YYSc8eWNss2gwtJFgyNSGcbk8Ylfgr%2F1CpJ2pymCLLaHZ%2FBt8tpTqwz1dM2H2A2F95z7UKAAeJCEs9CpLKH6vWTitLYCveO3L96PAXqvcwCEQ1JTwqILRA3E%2FPj5j6PzAAaVoAokqgZquDZsSIYtNY%2FqQ2%2Fhc%2FpDJCHsv8xppUpDsBLNgB4YHrSahqNHibySRcCiI0EsU3f%2F0oMh%2FImo1t4S8l8%2Fx9q2WT5%2FEJWa5M2PPE%2FvAilz3bGzA3t%2Fzh6KBTjCww%2FxJbUa5eY6%2FKfpBryASFkYNPbMzT%2FyMyNiBNxWBA%2BTVL2rYk4Yziiit6ZUmVX7KguvwewHJFG4NvCjTqTWregMPosGwOLyM7nFS1yxX1MMF3QHINrQadD80BnnIDFUBWCJvWJne3RFz69zqjQClzzq2S3Wka%2F6Tul%2BiJkbHqftd85KkiJYslhkqcw%2BdKG0AY6mAGgQ11%2B9MfJA35WeVoNjWmnl5E6EEDMFmRRxh%2B%2F0S8NN558b2MmWLXYNPBgrIJdcJdL1kgRzVppRdvLzX7eJ%2BVoYljzqc91KppGeNimmJAu7jrJsvZ2zSBEhIVx%2FBURDw%2FPqL3f%2Fnc%2F2mTh2tpzdZDn2Kb6LGqy6A70lLs9dH5dVuxow7Ly5IRjdNJV5IXO6K4NEc7LP7btJg%3D%3D&amp;Expires=1778497071"></a></p>



<p id="indicators-of-compromise-iocs"><strong>Indicators of Compromise (IoCs):-</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Type</th><th class="has-text-align-left" data-align="left">Indicator</th><th class="has-text-align-left" data-align="left">Description</th></tr></thead><tbody><tr><td>IP Address</td><td>45[.]138[.]16[.]64</td><td>Attacker-controlled C2 backend IP address — Block</td></tr><tr><td>Domain</td><td>legitserver[.]theworkpc[.]com</td><td>Attacker-controlled C2 domain used for payload delivery and remote sessions — Block</td></tr><tr><td>SHA256</td><td>7adffc1c0b3fdcba46e8d0a81203c955976d4ef39893c98d0b2dbfbb8d6a8ec3</td><td>Malicious payload hash — Block</td></tr><tr><td>SHA256</td><td>ecd5ed16975d556d1d17bc980f248f8a5262bed11df9d9cf999efd9c273c11df</td><td>Malicious payload hash — Block</td></tr><tr><td>SHA256</td><td>cea1d85967d2c456fccecae3a70ff2adfe4c113aacf9d18c35</td><td>Malicious payload hash — Block</td></tr><tr><td>SHA256</td><td>906c2ed24ca9b46e4c9f3bb4a65c640795bfc1a56c0b56485b849ccd97027eed7ad9aa78a732a4f</td><td>Malicious payload hash — Block</td></tr><tr><td>SHA256</td><td>ee3d776cdaf82335e4293e19ee313cc35eee49cde9963b96766a8f9c89d44a79</td><td>Malicious payload hash — Block</td></tr><tr><td>SHA256</td><td>4d8ac85c5b98c69ba44146df61183e9bf613edd796aa516c3ae73611b7d77c06</td><td>Malicious payload hash — Block</td></tr><tr><td>MD5</td><td>7DD05336097E5A833F03A63D3221494F</td><td>uds.exe compiled dropper hash — Block</td></tr><tr><td>SHA256</td><td>A635F0C94C98B658AE799978994F0D0A292567CD97B8A19068A8423D1297652A</td><td>uds.exe compiled dropper hash — Block</td></tr><tr><td>File Name</td><td>sysupdate.jpeg</td><td>Weaponized PowerShell loader disguised as JPEG</td></tr><tr><td>File Name</td><td>access.jpeg</td><td>Secondary obfuscated in-memory payload</td></tr><tr><td>File Name</td><td>uds.exe</td><td>On-host compiled malicious launcher binary</td></tr><tr><td>File Path</td><td>C:\Systems</td><td>Attacker staging directory created on victim machine</td></tr><tr><td>File Path</td><td>C:\ProgramData\OneDriveServer\</td><td>Trojanized ScreenConnect deployment directory</td></tr></tbody></table></figure>



<p><strong>Note:</strong> <em>IP addresses and domains are intentionally defanged (e.g., </em><code><em>[.]</em></code><em>) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM</em>.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 93%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/hackers-use-weaponized-jpeg-file/">Hackers Use Weaponized JPEG File to Deploy Trojanized ScreenConnect Malware</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/Hackers-Use-Weaponized-JPEG-File-to-Deploy-Trojanized-ScreenConnect-Malware.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149623</post-id>	</item>
		<item>
		<title>macOS Malware Leverages Google Ads and Legitimate Claude.ai Shared Chats to Deliver Malware</title>
		<link>https://cybersecuritynews.com/macos-malware-leverages-google-ads/</link>
		
		<dc:creator><![CDATA[Abinaya]]></dc:creator>
		<pubDate>Mon, 11 May 2026 09:32:26 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149578</guid>

					<description><![CDATA[<p>Threat actors are executing a sophisticated malvertising campaign targeting macOS users via poisoned Google Ads and deceptive artificial intelligence applications. Researchers recently uncovered an operation that redirects victims to fraudulent landing pages via sponsored search results. By combining trusted hosting platforms with the notorious &#8220;Clickfix&#8221; social engineering tactic, attackers are successfully distributing MacSync payloads and [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/macos-malware-leverages-google-ads/">macOS Malware Leverages Google Ads and Legitimate Claude.ai Shared Chats to Deliver Malware</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Threat actors are executing a sophisticated malvertising campaign <a href="https://cybersecuritynews.com/poisoned-google-ads/" target="_blank" rel="noreferrer noopener">targeting macOS users via poisoned Google Ads</a> and deceptive artificial intelligence applications.</p>



<p>Researchers recently uncovered an operation that redirects victims to fraudulent landing pages via sponsored search results.</p>



<p>By combining trusted hosting platforms with the notorious &#8220;<a href="https://cybersecuritynews.com/new-clickfix-campaign-uses-macos-script-editor/" target="_blank" rel="noreferrer noopener">Clickfix</a>&#8221; social engineering tactic, attackers are successfully distributing MacSync payloads and dangerous macOS information stealers.</p>



<p>The attack chain begins when a user searches for popular software, particularly AI tools like Claude.</p>



<h2 class="wp-block-heading" id="h-macos-malware-ads"><strong>macOS Malware Ads</strong></h2>



<p>Attackers manipulate search engine results by purchasing sponsored ads that appear at the top of search results pages.</p>



<p>Because these ads often mimic legitimate vendors, end users struggle to distinguish them from authentic links.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy84AZL9kJo-0dQVFKw38TZf5CM-q8GDNI88G_-nnB_HJCjcTAlJYKmN8ygHSyIFccBrMBj5YBXDNQkImQKjsxY-UD0HqSF4telPCqkMem0CiqHdBNaTqD8K0yviaJrZyKRu8Vfa0qgEE2C9RP7VZq93F34KYBgM3okXO7ubn1YcegKxneZGzdg3G0BRA/s1600/Screenshot%202026-05-11%20105705%20%281%29.webp" alt="Search ads redirect users to malicious sites delivering MacSync ClickFix payloads(source : x)"/><figcaption class="wp-element-caption">Search ads redirect users to malicious sites delivering MacSync ClickFix payloads(source : x)</figcaption></figure>



<p>When clicked, these sponsored advertisements route victims to deceptive websites hosted on trusted infrastructure.</p>



<p>To bypass initial domain reputation checks and enterprise web filters, threat actors are leveraging services like <a href="https://cybersecuritynews.com/threat-actors-leverage-google-search-ads-for-mac-cleaner/" target="_blank" rel="noreferrer noopener">Google Sites</a>, Framer, and even legitimate claude.ai shared chats.</p>



<p>The landing pages are carefully designed to look like official Claude AI download portals.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnkKsIrUWRlXjLnkRUcRfQOaI2IvLs3ohjsBS1UdNzHkO32qzAV2M21k_29pXGfNuxugfWYvnxEpvxWKEK0X-btQmNSqp-D2q7u60mxcL28oXjDbRGyqtGH0kuWMHiHwsW1FiePmLao3RXfci843T1iu0ui1Y96d4_QzloiIuZ-ubBb8bMOo7dCtUQC9Q/s1600/Screenshot%202026-05-11%20105404%20%281%29.webp" alt="Google Ads and Claude.ai chats spread fake MacSync installers(source :x)"/><figcaption class="wp-element-caption">Google Ads and Claude.ai chats spread fake MacSync installers(source :x)</figcaption></figure>



<p>When users attempt to interact with the site or download the purported desktop application, they are hit with a Clickfix prompt.</p>



<p>This prompt uses deceptive warning dialogues to trick victims into manually executing a malicious terminal command or downloading a compromised installer under the guise of &#8220;fixing&#8221; a display error.</p>



<p><a href="https://x.com/brkalbyrk7/status/2053230027576168867?s=20" id="https://x.com/brkalbyrk7/status/2053230027576168867?s=20" target="_blank" rel="noreferrer noopener nofollow">Researchers Berk Albayrak and g0njxa published findings on X</a> tracing the infrastructure behind the targeted malware campaign.<br><br><br>The threat actors frequently rotate their domains and hosting platforms <a href="https://cybersecuritynews.com/new-malware-uses-obfuscation-and-staged-payload/" target="_blank" rel="noreferrer noopener">to evade detection</a> while maximizing their search engine optimization.</p>



<p>The campaign relies heavily on Google Sites to host the initial deceptive pages, with researchers identifying malicious URLs <code>such as&nbsp;sites[.]google[.]com/view/cloud-version-08,&nbsp;sites[.]google[.]com/view/brewshka-page</code>, and&nbsp;<code>sites[.]google[.]com/view/claud-version-0505</code>.</p>



<p>In addition to Google Sites, the attackers have utilized the Framer platform, hosting fake applications at&nbsp;c<code>laude-desktop-app[.]framer[.]ai</code>.</p>



<h2 class="wp-block-heading" id="h-payload-delivery-and-execution"><strong>Payload Delivery and Execution</strong></h2>



<p>Once the victim interacts with the <a href="https://cybersecuritynews.com/claude-desktop-reportedly-adds-browser-access/" target="_blank" rel="noreferrer noopener">fake Claude AI portal</a>, the site redirects them to the final payload delivery servers.</p>



<p>The initial landing pages have been observed redirecting traffic to external IP addresses, such as&nbsp;<code>2[.]26[.]75[.]112/Hokojol</code>, and to domains such as<code>&nbsp;pieoneer[.]org&nbsp;and&nbsp;greenactiv[.]com</code>.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiR5kpgH5DMMoIM0BP2041Dq2lNpRjxkHrWObYNx2G2qyMKyTBL_89_EblJ3NJc20Ut4WLwlOH264du_xd0toZA-Gdbhyphenhyphen_XoMz4anGgxh0XN2_C8OHpZp8XZSYhl4WQB6LuyJK5UL-gSxnOgX4wn2a9WKzmqOGKBHp1pMCesSErbC0c7xnZKwFc0lfuYOc/s1600/Screenshot%202026-05-11%20105517%20%281%29.webp" alt="MacSync clickfix payload(source : x)"/><figcaption class="wp-element-caption">MacSync clickfix payload(source : x)</figcaption></figure>



<p>These destination servers drop the MacSync clickfix payload directly onto the victim&#8217;s machine. Upon execution, the malware operates as a comprehensive macOS stealer.</p>



<p>It is specifically designed to harvest sensitive information from the infected Apple system, including saved browser credentials, <a href="https://cybersecuritynews.com/new-nova-stealer-attacking-macos-users/" target="_blank" rel="noreferrer noopener">cryptocurrency wallet data</a>, and active session tokens.</p>



<p>The stolen data is subsequently exfiltrated back to the attackers&#8217; command-and-control infrastructure.</p>



<p>To defend against these deceptive malvertising campaigns, organizations and individual users must exercise extreme caution when interacting with sponsored search results.</p>



<p>Security teams should block the known indicators of compromise at the network level and <span style="box-sizing: border-box; margin: 0px; padding: 0px;">monitor<a href="https://cybersecuritynews.com/hackers-weaponized-2500-security-tools/" target="_blank"> macOS</a></span><a href="https://cybersecuritynews.com/hackers-weaponized-2500-security-tools/" target="_blank" rel="noreferrer noopener"> endpoint telemetry</a> for unusual script execution originating from web browsers.</p>



<p>Please educate users to avoid clicking on sponsored software download ads. They should always navigate directly to official vendor websites.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 92%,rgb(169,184,195) 100%)"><strong>Cybercriminals now enter through your suppliers instead of your front door &#8211; <a href="https://www.manageengine.com/products/desktop-central/webinars/uk-cybersecurity-essentials-2026.html?utm_source=CSN&amp;utm_medium=TPS-mailer&amp;utm_campaign=UKCSW" target="_blank" rel="noreferrer noopener nofollow">Free Webinar</a></strong></p>
<p>The post <a href="https://cybersecuritynews.com/macos-malware-leverages-google-ads/">macOS Malware Leverages Google Ads and Legitimate Claude.ai Shared Chats to Deliver Malware</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/macOS-malware-Leverages-Google-Ads-and-legitimate-claude.ai-shared-chats-to-Deliver-Malware.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149578</post-id>	</item>
		<item>
		<title>Vidar Malware Targets Browser Credentials, Cookies, Crypto Wallets, and System Data</title>
		<link>https://cybersecuritynews.com/vidar-malware-targets-browser-credentials-cookies/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Mon, 11 May 2026 08:49:45 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149598</guid>

					<description><![CDATA[<p>A long-active information stealer is making headlines again, and this time it is targeting more than just passwords. Vidar malware, a credential-harvesting tool in circulation since late 2018, has been observed running through a sophisticated multi-stage attack chain designed to slip past modern security defenses with ease. The threat is active and capable of walking [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/vidar-malware-targets-browser-credentials-cookies/">Vidar Malware Targets Browser Credentials, Cookies, Crypto Wallets, and System Data</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A long-active information stealer is making headlines again, and this time it is targeting more than just passwords. Vidar malware, a credential-harvesting tool in circulation since late 2018, has been observed running through a sophisticated multi-stage attack chain designed to slip past modern security defenses with ease. </p>



<p>The threat is active and capable of walking away with browser data, session cookies, cryptocurrency wallet files, and sensitive system information.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/ad3f5836-8835-45e5-8c5f-804962342cb6/Vidar-Malware-Targets-Browser-Credentials-Cookies-Crypto-Wallets-and-System-Data.pdf?AWSAccessKeyId=ASIA2F3EMEYER2YVXKCI&amp;Signature=hvGLYhTn13Ctj%2BqwVsLj1LPy%2BTM%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEgaCXVzLWVhc3QtMSJIMEYCIQDs0rY2qfPTtxF720zP7eQGF4U3DeE5tDP6Sx7GsyEqbAIhAPXYqtokC8d26D0pVf04AFCktqjEHZRIVstKGZsUVMOfKvMECBEQARoMNjk5NzUzMzA5NzA1IgzMwSmdlZ64sQWzyIYq0AQtTqHvIk7ggL%2FJT7yrf%2BZeVezIVVQzAMHQqva8%2B7vkqewaD6Ao4Ogk%2BAkGWri9y1NeQISE4tsb1AGBJtPFpuhBOKQFkoMsFemKK8AHX9xbS7C8kHrxJKJqpJ87R54NNk79TL%2FtqhzrVkS5gNQs7vRuiJ6FzJDYXORgWwe8Zc7Ft3CUX0zpJeneAWCal0ZpZxEei03YfmmYNOLDSaARMctfm6ocJFK%2BcjCNc5SL5ElN0LFIc1At5e3DyOlpzBp5sbHFL3ZBr40k3m4cOsWSCseSVO5JU6a8rX6hEukHAknfxgjkFO71R6UkHq7f5nQbSlxshX0IQ28dimiRqoh3PiCvzfIjiT5IZI8pYbAQ6pub14O2lmmQpOt6YClsUSQ4HyXv4qxpd4Z9BW8KwOWyim9dfPytzzrmQiPsfIbkCu3SWa%2Flu8LqSKs19eyTKeLe27UXV0KjfBM3RUYj9lIm7N%2FXVO2O2wiM8OD8gj8hwiTu%2FrCKo761bQN%2FfLBfA2DRHgjW%2FHyMb5jgf5rwS7OpR4DlwLYscKWXSiZKyDG%2BjU%2FtEBQPpY0olpxLMWUkBjDyD%2BAuf%2Bo2f%2BvuJyREiAhkly4NwW%2B6tjrRS50ekdabsXvcPlj%2BkVEgjHZ3nazeLNaPi8piIYaLSKDjEvy1hSdkKI5xf5LVksfDprEfSKtWVrNVVnzmoKo2S36ttv6fxdioX7MuF2iyM9kttjp4dQOxayjj39v0Py%2BIoP9wduZZsVRfHC5w8ZgJwOgxiyXfTTar1o3%2F2FetQCIs4yCUUZbT9R8JMKiHhtAGOpcB82oSyTKVFiZUJtmb8Z4v8AWN6QCTbZ%2FgxZ2G8eLMX5O0P0X3pzjQaUu2BZgYmQjcZjt%2FN%2Bw1FqtCeeghM85B%2BJBhYE3Yu0TR6nSePZrrdXgBUpROCitP9p096oAnCbPZsSpNTUIJc2LnR%2FCSa10P4wyNd08xnazTobX9B8XcVjjzmo3viUBId6eiFcy7TZ2Of6%2B1FXthbA%3D%3D&amp;Expires=1778486910" target="_blank" rel="noreferrer noopener"></a></p>



<p>Vidar was not built from scratch. It was developed using the source code of an older stealer called Arkei and has grown into one of the more resilient commodity malware families tracked today. </p>



<p>What makes recent activity particularly alarming is not just what Vidar steals, but how carefully attackers prepare before deploying it. Each step in the <a href="https://cybersecuritynews.com/how-to-humanize-chatgpt-text-for-free-and-avoid-ai-detection/" id="127862" target="_blank" rel="noreferrer noopener">infection chain is designed to avoid detection</a> before the actual payload runs.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8QbywfRWHXbsXqJ5mReltUQnRlcjCRWNHmfC_Vizk5HhRbrJt5ho4-o_VjxMbLaaIADXZlXpVemkOrzmYIUHMIl4Qe4xL6iEXK3GLicctdxCtdpHw6lDGOHLlRl0SCGjIc87Q7-CwnAtboD92-icHCC_nFxDA6x1W1yFRWLKFlp6zYBEUPQJETlZXpPc/s16000/Vidar%20infection%20chain%20(Source%20-%20LevelBlue).webp" alt="Vidar infection chain (Source - LevelBlue)" /><figcaption class="wp-element-caption">Vidar infection chain (Source &#8211; LevelBlue)</figcaption></figure>
</div>


<p><a href="https://www.levelblue.com/blogs/spiderlabs-blog/unmasking-a-multi-stage-loader-autoit-abuse-leading-to-vidar-stealer-command-and-control-communication" id="https://www.levelblue.com/blogs/spiderlabs-blog/unmasking-a-multi-stage-loader-autoit-abuse-leading-to-vidar-stealer-command-and-control-communication" target="_blank" rel="noreferrer noopener nofollow">Researchers at LevelBlue, through proactive threat hunting in a client environment, uncovered this multi-stage loader campaign</a>. Their endpoint telemetry and dynamic analysis revealed a chain of processes showing script masquerading, staged payload extraction, and command-and-control communication. </p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjF6LukpKsxlKNRYK_KVhlMq02zPKHgIY0h9e8zCD_-W2KROtIYuikHciglH5D0VekxLExSdFPPAQA2N8yIgzODsCvTxXq4CvF3YXWyKLw6xn917Xbb7WPhHdeCOjpcLlYsY6uSUhRpNe8OwGI1Q3hFu9oYcmAijEYrKDgCoYOnSWDmN8q5AGlmnRDnEtA/s16000/Attack%20tree%20observed%20in%20LevelBlue's%20EDR%20(Source%20-%20LevelBlue).webp" alt="Attack tree observed in LevelBlue's EDR (Source - LevelBlue)" /><figcaption class="wp-element-caption">Attack tree observed in LevelBlue&#8217;s EDR (Source &#8211; LevelBlue)</figcaption></figure>
</div>


<p>The discovery highlights how well-known malware families are being wrapped in increasingly clever delivery mechanisms to extend their reach. <a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/ad3f5836-8835-45e5-8c5f-804962342cb6/Vidar-Malware-Targets-Browser-Credentials-Cookies-Crypto-Wallets-and-System-Data.pdf?AWSAccessKeyId=ASIA2F3EMEYER2YVXKCI&amp;Signature=hvGLYhTn13Ctj%2BqwVsLj1LPy%2BTM%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEgaCXVzLWVhc3QtMSJIMEYCIQDs0rY2qfPTtxF720zP7eQGF4U3DeE5tDP6Sx7GsyEqbAIhAPXYqtokC8d26D0pVf04AFCktqjEHZRIVstKGZsUVMOfKvMECBEQARoMNjk5NzUzMzA5NzA1IgzMwSmdlZ64sQWzyIYq0AQtTqHvIk7ggL%2FJT7yrf%2BZeVezIVVQzAMHQqva8%2B7vkqewaD6Ao4Ogk%2BAkGWri9y1NeQISE4tsb1AGBJtPFpuhBOKQFkoMsFemKK8AHX9xbS7C8kHrxJKJqpJ87R54NNk79TL%2FtqhzrVkS5gNQs7vRuiJ6FzJDYXORgWwe8Zc7Ft3CUX0zpJeneAWCal0ZpZxEei03YfmmYNOLDSaARMctfm6ocJFK%2BcjCNc5SL5ElN0LFIc1At5e3DyOlpzBp5sbHFL3ZBr40k3m4cOsWSCseSVO5JU6a8rX6hEukHAknfxgjkFO71R6UkHq7f5nQbSlxshX0IQ28dimiRqoh3PiCvzfIjiT5IZI8pYbAQ6pub14O2lmmQpOt6YClsUSQ4HyXv4qxpd4Z9BW8KwOWyim9dfPytzzrmQiPsfIbkCu3SWa%2Flu8LqSKs19eyTKeLe27UXV0KjfBM3RUYj9lIm7N%2FXVO2O2wiM8OD8gj8hwiTu%2FrCKo761bQN%2FfLBfA2DRHgjW%2FHyMb5jgf5rwS7OpR4DlwLYscKWXSiZKyDG%2BjU%2FtEBQPpY0olpxLMWUkBjDyD%2BAuf%2Bo2f%2BvuJyREiAhkly4NwW%2B6tjrRS50ekdabsXvcPlj%2BkVEgjHZ3nazeLNaPi8piIYaLSKDjEvy1hSdkKI5xf5LVksfDprEfSKtWVrNVVnzmoKo2S36ttv6fxdioX7MuF2iyM9kttjp4dQOxayjj39v0Py%2BIoP9wduZZsVRfHC5w8ZgJwOgxiyXfTTar1o3%2F2FetQCIs4yCUUZbT9R8JMKiHhtAGOpcB82oSyTKVFiZUJtmb8Z4v8AWN6QCTbZ%2FgxZ2G8eLMX5O0P0X3pzjQaUu2BZgYmQjcZjt%2FN%2Bw1FqtCeeghM85B%2BJBhYE3Yu0TR6nSePZrrdXgBUpROCitP9p096oAnCbPZsSpNTUIJc2LnR%2FCSa10P4wyNd08xnazTobX9B8XcVjjzmo3viUBId6eiFcy7TZ2Of6%2B1FXthbA%3D%3D&amp;Expires=1778486910" target="_blank" rel="noreferrer noopener"></a>The attack begins with what looks, to an unsuspecting user, like a <a href="https://cybersecuritynews.com/hackers-visual-studio-code-remote-access/" id="80123" target="_blank" rel="noreferrer noopener">legitimate software activation tool</a>. </p>



<h2 class="wp-block-heading" id="how-vidar-steals-sensitive-data"><strong>How Vidar Steals Sensitive Data</strong></h2>



<p>A commonly abused hack tool called MicrosoftToolkit.exe serves as the entry point, tricking users into running it under the belief they are activating real software. This user-driven approach reduces the need for phishing emails or software exploits, making the initial entry harder for traditional security filters to catch.</p>



<p>Once the tool runs, a disguised file named Swingers.dot gets renamed as a batch script and executed, kicking off a chain of commands. The system checks for active security processes, extracts additional payload components, and eventually runs an AutoIt-compiled loader called Replies.scr. Outbound connections to Vidar-associated infrastructure then confirm the final payload has been deployed and is actively harvesting data.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/ad3f5836-8835-45e5-8c5f-804962342cb6/Vidar-Malware-Targets-Browser-Credentials-Cookies-Crypto-Wallets-and-System-Data.pdf?AWSAccessKeyId=ASIA2F3EMEYER2YVXKCI&amp;Signature=hvGLYhTn13Ctj%2BqwVsLj1LPy%2BTM%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEgaCXVzLWVhc3QtMSJIMEYCIQDs0rY2qfPTtxF720zP7eQGF4U3DeE5tDP6Sx7GsyEqbAIhAPXYqtokC8d26D0pVf04AFCktqjEHZRIVstKGZsUVMOfKvMECBEQARoMNjk5NzUzMzA5NzA1IgzMwSmdlZ64sQWzyIYq0AQtTqHvIk7ggL%2FJT7yrf%2BZeVezIVVQzAMHQqva8%2B7vkqewaD6Ao4Ogk%2BAkGWri9y1NeQISE4tsb1AGBJtPFpuhBOKQFkoMsFemKK8AHX9xbS7C8kHrxJKJqpJ87R54NNk79TL%2FtqhzrVkS5gNQs7vRuiJ6FzJDYXORgWwe8Zc7Ft3CUX0zpJeneAWCal0ZpZxEei03YfmmYNOLDSaARMctfm6ocJFK%2BcjCNc5SL5ElN0LFIc1At5e3DyOlpzBp5sbHFL3ZBr40k3m4cOsWSCseSVO5JU6a8rX6hEukHAknfxgjkFO71R6UkHq7f5nQbSlxshX0IQ28dimiRqoh3PiCvzfIjiT5IZI8pYbAQ6pub14O2lmmQpOt6YClsUSQ4HyXv4qxpd4Z9BW8KwOWyim9dfPytzzrmQiPsfIbkCu3SWa%2Flu8LqSKs19eyTKeLe27UXV0KjfBM3RUYj9lIm7N%2FXVO2O2wiM8OD8gj8hwiTu%2FrCKo761bQN%2FfLBfA2DRHgjW%2FHyMb5jgf5rwS7OpR4DlwLYscKWXSiZKyDG%2BjU%2FtEBQPpY0olpxLMWUkBjDyD%2BAuf%2Bo2f%2BvuJyREiAhkly4NwW%2B6tjrRS50ekdabsXvcPlj%2BkVEgjHZ3nazeLNaPi8piIYaLSKDjEvy1hSdkKI5xf5LVksfDprEfSKtWVrNVVnzmoKo2S36ttv6fxdioX7MuF2iyM9kttjp4dQOxayjj39v0Py%2BIoP9wduZZsVRfHC5w8ZgJwOgxiyXfTTar1o3%2F2FetQCIs4yCUUZbT9R8JMKiHhtAGOpcB82oSyTKVFiZUJtmb8Z4v8AWN6QCTbZ%2FgxZ2G8eLMX5O0P0X3pzjQaUu2BZgYmQjcZjt%2FN%2Bw1FqtCeeghM85B%2BJBhYE3Yu0TR6nSePZrrdXgBUpROCitP9p096oAnCbPZsSpNTUIJc2LnR%2FCSa10P4wyNd08xnazTobX9B8XcVjjzmo3viUBId6eiFcy7TZ2Of6%2B1FXthbA%3D%3D&amp;Expires=1778486910" target="_blank" rel="noreferrer noopener"></a></p>



<p>Vidar focuses on pulling information that can be converted into financial gain or used to access other systems. Once the loader completes its work and the payload runs, the malware targets browser-stored credentials, saved session cookies, cryptocurrency wallet files, and general system data. Even a single infected machine can hand attackers a significant amount of usable information.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjifXpyBBgzJ8Fm2XIOFfXEEg-hPYbQcAiVyGfIBT64BVuAPci4BRVKYWxqt7ltpAQbTSQaH8IQfW0BaWQz31nEQAAtS4hKQZaIrz08LHRUJPPGbpFtiM-EJo5b5mqiDj-l8qIsapf3P_7zwi2au8DNsHs_N6X0AQKZkq_vCf4xkPUz0-G3owHiSd1Xn0w/s16000/Call%20to%20InternetConnectA%20(Source%20-%20LevelBlue).webp" alt="Call to InternetConnectA (Source - LevelBlue)" /><figcaption class="wp-element-caption">Call to InternetConnectA (Source &#8211; LevelBlue)</figcaption></figure>
</div>


<p>The malware uses public platforms like Steam and Telegram as part of its command-and-control setup, disguising its traffic as ordinary web activity. It constructs HTTP GET requests to pull configuration data from these platforms before moving forward with exfiltration.</p>



<p></p>



<p>Calls HttpOpenRequestA to construct an HTTP request (Source &#8211; LevelBlue)</p>



<p>DNS lookups were also observed pointing to gz.technicalprorj.xyz, resolved through a public DNS server, suggesting the attackers rely on dynamic infrastructure to stay ahead of blocklists.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/ad3f5836-8835-45e5-8c5f-804962342cb6/Vidar-Malware-Targets-Browser-Credentials-Cookies-Crypto-Wallets-and-System-Data.pdf?AWSAccessKeyId=ASIA2F3EMEYER2YVXKCI&amp;Signature=hvGLYhTn13Ctj%2BqwVsLj1LPy%2BTM%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEgaCXVzLWVhc3QtMSJIMEYCIQDs0rY2qfPTtxF720zP7eQGF4U3DeE5tDP6Sx7GsyEqbAIhAPXYqtokC8d26D0pVf04AFCktqjEHZRIVstKGZsUVMOfKvMECBEQARoMNjk5NzUzMzA5NzA1IgzMwSmdlZ64sQWzyIYq0AQtTqHvIk7ggL%2FJT7yrf%2BZeVezIVVQzAMHQqva8%2B7vkqewaD6Ao4Ogk%2BAkGWri9y1NeQISE4tsb1AGBJtPFpuhBOKQFkoMsFemKK8AHX9xbS7C8kHrxJKJqpJ87R54NNk79TL%2FtqhzrVkS5gNQs7vRuiJ6FzJDYXORgWwe8Zc7Ft3CUX0zpJeneAWCal0ZpZxEei03YfmmYNOLDSaARMctfm6ocJFK%2BcjCNc5SL5ElN0LFIc1At5e3DyOlpzBp5sbHFL3ZBr40k3m4cOsWSCseSVO5JU6a8rX6hEukHAknfxgjkFO71R6UkHq7f5nQbSlxshX0IQ28dimiRqoh3PiCvzfIjiT5IZI8pYbAQ6pub14O2lmmQpOt6YClsUSQ4HyXv4qxpd4Z9BW8KwOWyim9dfPytzzrmQiPsfIbkCu3SWa%2Flu8LqSKs19eyTKeLe27UXV0KjfBM3RUYj9lIm7N%2FXVO2O2wiM8OD8gj8hwiTu%2FrCKo761bQN%2FfLBfA2DRHgjW%2FHyMb5jgf5rwS7OpR4DlwLYscKWXSiZKyDG%2BjU%2FtEBQPpY0olpxLMWUkBjDyD%2BAuf%2Bo2f%2BvuJyREiAhkly4NwW%2B6tjrRS50ekdabsXvcPlj%2BkVEgjHZ3nazeLNaPi8piIYaLSKDjEvy1hSdkKI5xf5LVksfDprEfSKtWVrNVVnzmoKo2S36ttv6fxdioX7MuF2iyM9kttjp4dQOxayjj39v0Py%2BIoP9wduZZsVRfHC5w8ZgJwOgxiyXfTTar1o3%2F2FetQCIs4yCUUZbT9R8JMKiHhtAGOpcB82oSyTKVFiZUJtmb8Z4v8AWN6QCTbZ%2FgxZ2G8eLMX5O0P0X3pzjQaUu2BZgYmQjcZjt%2FN%2Bw1FqtCeeghM85B%2BJBhYE3Yu0TR6nSePZrrdXgBUpROCitP9p096oAnCbPZsSpNTUIJc2LnR%2FCSa10P4wyNd08xnazTobX9B8XcVjjzmo3viUBId6eiFcy7TZ2Of6%2B1FXthbA%3D%3D&amp;Expires=1778486910" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="defense-evasion-and-post-attack-cleanup"><strong>Defense Evasion and Post-Attack Cleanup</strong></h2>



<p>One of the most notable features of this campaign is how thoroughly the malware covers its tracks after running. Once payload extraction is complete and data has been sent, MicrosoftToolkit.exe deletes every file it dropped during execution, resets file attributes, frees associated memory, and terminates its own process. This leaves very little behind for investigators, making traditional incident response far more difficult.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhldGYOVEuPFn6xVctwUjnkYWpcJyX1yYWxd1D7hfu1ZCAYODZQWV81WJqLHg8tHH56z3g1GibFi_Mix4XIAhh3Wg7Of2IFj-9SfHqt22LO1yLMbRztKvkpalKXQyDj7PTx-HZmoj0RkgUnNdnaeHysOPYyGlwSE_mBlxImTsjY8qb0e05MOvA6Ju6zlk/s16000/Deletion%20routine%20for%20the%20files%20written%20on%20disk%20(Source%20-%20LevelBlue).webp" alt="Deletion routine for the files written on disk (Source - LevelBlue)" /><figcaption class="wp-element-caption">Deletion routine for the files written on disk (Source &#8211; LevelBlue)</figcaption></figure>
</div>


<p>The <a href="https://cybersecuritynews.com/enterprise-security-monitoring-tools/" id="106096" target="_blank" rel="noreferrer noopener">malware also checks for debuggers and security monitoring tools</a> before proceeding, using low-level Windows functions to detect analysis environments. If it senses observation, it can alter its behavior accordingly. </p>



<p>This anti-analysis capability, combined with the cleanup routine and use of legitimate Windows tools throughout the chain, gives this campaign a moderate-to-high level of sophistication despite relying on a commodity stealer at its core.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIHR5U6X78BhQC9OfTH7g95TdxMVvvozebqiAhZgdV06YBMI4AAhrZd3uMo3NsbxpMO78k-h9rOTRq5GJZaoevwpbWlz_dQlvjXDCGr7XKZ5sidfhTaXbY-6pfgdWL7jlYsA0w6zxBSM8vefVSDzTlBfgX7-fXMZHD8VZgF5UZbIWxX7ory_4uxgcOmlQ/s16000/Termination%20of%20the%20current%20process%20(Source%20-%20LevelBlue).webp" alt="Termination of the current process (Source - LevelBlue)" /><figcaption class="wp-element-caption">Termination of the current process (Source &#8211; LevelBlue)</figcaption></figure>
</div>


<p>LevelBlue recommends that any affected systems be isolated immediately from the network to stop further data loss. Full system reimaging is strongly advised given the malware&#8217;s ability to download additional payloads. </p>



<p>All exposed credentials, including browser passwords, email accounts, VPN logins, and admin accounts, should be reset and active sessions closed. <a href="https://cybersecuritynews.com/cpanel-authentication-flaw/" id="148657" target="_blank" rel="noreferrer noopener">Enforcing multi-factor authentication across critical services</a> is equally important. Organizations should also monitor outbound traffic and DNS queries for unusual connections, and restrict execution of unauthorized tools to prevent similar intrusions.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/ad3f5836-8835-45e5-8c5f-804962342cb6/Vidar-Malware-Targets-Browser-Credentials-Cookies-Crypto-Wallets-and-System-Data.pdf?AWSAccessKeyId=ASIA2F3EMEYER2YVXKCI&amp;Signature=hvGLYhTn13Ctj%2BqwVsLj1LPy%2BTM%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEgaCXVzLWVhc3QtMSJIMEYCIQDs0rY2qfPTtxF720zP7eQGF4U3DeE5tDP6Sx7GsyEqbAIhAPXYqtokC8d26D0pVf04AFCktqjEHZRIVstKGZsUVMOfKvMECBEQARoMNjk5NzUzMzA5NzA1IgzMwSmdlZ64sQWzyIYq0AQtTqHvIk7ggL%2FJT7yrf%2BZeVezIVVQzAMHQqva8%2B7vkqewaD6Ao4Ogk%2BAkGWri9y1NeQISE4tsb1AGBJtPFpuhBOKQFkoMsFemKK8AHX9xbS7C8kHrxJKJqpJ87R54NNk79TL%2FtqhzrVkS5gNQs7vRuiJ6FzJDYXORgWwe8Zc7Ft3CUX0zpJeneAWCal0ZpZxEei03YfmmYNOLDSaARMctfm6ocJFK%2BcjCNc5SL5ElN0LFIc1At5e3DyOlpzBp5sbHFL3ZBr40k3m4cOsWSCseSVO5JU6a8rX6hEukHAknfxgjkFO71R6UkHq7f5nQbSlxshX0IQ28dimiRqoh3PiCvzfIjiT5IZI8pYbAQ6pub14O2lmmQpOt6YClsUSQ4HyXv4qxpd4Z9BW8KwOWyim9dfPytzzrmQiPsfIbkCu3SWa%2Flu8LqSKs19eyTKeLe27UXV0KjfBM3RUYj9lIm7N%2FXVO2O2wiM8OD8gj8hwiTu%2FrCKo761bQN%2FfLBfA2DRHgjW%2FHyMb5jgf5rwS7OpR4DlwLYscKWXSiZKyDG%2BjU%2FtEBQPpY0olpxLMWUkBjDyD%2BAuf%2Bo2f%2BvuJyREiAhkly4NwW%2B6tjrRS50ekdabsXvcPlj%2BkVEgjHZ3nazeLNaPi8piIYaLSKDjEvy1hSdkKI5xf5LVksfDprEfSKtWVrNVVnzmoKo2S36ttv6fxdioX7MuF2iyM9kttjp4dQOxayjj39v0Py%2BIoP9wduZZsVRfHC5w8ZgJwOgxiyXfTTar1o3%2F2FetQCIs4yCUUZbT9R8JMKiHhtAGOpcB82oSyTKVFiZUJtmb8Z4v8AWN6QCTbZ%2FgxZ2G8eLMX5O0P0X3pzjQaUu2BZgYmQjcZjt%2FN%2Bw1FqtCeeghM85B%2BJBhYE3Yu0TR6nSePZrrdXgBUpROCitP9p096oAnCbPZsSpNTUIJc2LnR%2FCSa10P4wyNd08xnazTobX9B8XcVjjzmo3viUBId6eiFcy7TZ2Of6%2B1FXthbA%3D%3D&amp;Expires=1778486910" target="_blank" rel="noreferrer noopener"></a></p>



<p id="indicators-of-compromise-iocs"><strong>Indicators of Compromise (IoCs):-</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Type</th><th class="has-text-align-left" data-align="left">Indicator</th><th class="has-text-align-left" data-align="left">Description</th></tr></thead><tbody><tr><td>SHA256</td><td>fc27479ff929d846e7c5c5d147479c81e483a2ec911bd1501a53aa646a29620d</td><td>MicrosoftToolkit.exe</td></tr><tr><td>SHA256</td><td>d4fe9f48178cdf375a3be30d17f1dc016b5861dff8683f0bb35a0ba8d44f892f</td><td>swingers.dot.bat</td></tr><tr><td>SHA256</td><td>978ad86c90d85b74947bb627ec24f8bcd26812b500e82f5af202160506ac29c6</td><td>Beds.dot</td></tr><tr><td>SHA256</td><td>881619a47b62b52305d92640cc4d4845a279c23a5a749413785fc8fcb0fdf7fb</td><td>replies.scr</td></tr><tr><td>SHA256</td><td>968ecf51c442ec0ff91f91689ac524e7e8e9eab0c1a2a65cf13e54cf95194efe</td><td>D (payload file)</td></tr><tr><td>IP Address</td><td>149.154.167.99</td><td>Vidar-associated C2 IP</td></tr><tr><td>Domain</td><td>telegram[.]me</td><td>C2 domain</td></tr><tr><td>Domain</td><td>gz[.]technicalprorj[.]xyz</td><td>Vidar-associated C2 domain</td></tr></tbody></table></figure>



<p><strong>Note:</strong> <em>IP addresses and domains are intentionally defanged (e.g., </em><code><em>[.]</em></code><em>) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM</em>.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 91%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/vidar-malware-targets-browser-credentials-cookies/">Vidar Malware Targets Browser Credentials, Cookies, Crypto Wallets, and System Data</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/Vidar-Malware-Targets-Browser-Credentials-Cookies-Crypto-Wallets-and-System-Data.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149598</post-id>	</item>
		<item>
		<title>Google reCAPTCHA Update Blocks Privacy-Focused Android Users From Sites</title>
		<link>https://cybersecuritynews.com/google-recaptcha-update/</link>
		
		<dc:creator><![CDATA[Guru Baran]]></dc:creator>
		<pubDate>Mon, 11 May 2026 08:45:52 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149608</guid>

					<description><![CDATA[<p>Google has rolled out a significant update to its reCAPTCHA verification system that fundamentally alters how websites verify human traffic. Announced on April 22 at the Google Cloud Next 2026 conference, the new mechanism operates through Google&#8217;s Cloud Fraud Defense tool and introduces a mandatory QR code challenge for suspicious traffic. While designed to combat [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/google-recaptcha-update/">Google reCAPTCHA Update Blocks Privacy-Focused Android Users From Sites</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google has rolled out a significant update to its reCAPTCHA verification system that fundamentally alters how websites verify human traffic.</p>



<p>Announced on<a href="https://cloud.google.com/security/products/recaptcha" target="_blank" rel="noreferrer noopener nofollow"> April 22 at the Google Cloud Next 2026 conference</a>, the new mechanism operates through Google&#8217;s Cloud Fraud Defense tool and introduces a mandatory QR code challenge for suspicious traffic.</p>



<p>While designed to combat sophisticated AI bots, this update effectively blocks users operating privacy-focused, de-Googled Android operating systems from accessing large portions of the web.</p>



<p>First reported by Android Authority on May 7, the architectural shift came to light after a Reddit user discovered an updated Google support page.</p>



<h2 class="wp-block-heading" id="h-google-recaptcha-update"><strong>Google reCAPTCHA Update</strong></h2>



<p>Under the new policy, Android devices must run Google Play Services version 25.41.30 or higher to successfully complete the reCAPTCHA mobile verification flow. When the Cloud Fraud Defense system detects suspicious web traffic, it now bypasses the traditional image-based puzzles that internet users have grown accustomed to solving.</p>



<p>Instead, the system presents a <a href="https://cybersecuritynews.com/qr-codes-used-to-spread-phishing-attacks/" target="_blank" rel="noreferrer noopener">QR code that users must scan</a> with their smartphone camera to prove human interaction.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr2Xz7r9RkvV3LUOzQ2VKsf8U3ko6NkInlbw8i7TZj5a6nH0Cm2oxaYYmTeBI41hHthj7SuhgpQn_BzuFvEd5i3k2HFDQdLGCJ7y3oblFq0_qY_wEcsAde74O5K8SJbdM4RGflnXQdbAND-7DkmfacXorV_WB011rd_z2nesZ7MohyTgkWzseafAmxVs0j/w640-h640/Google%20reCAPTCHA%20Update%20(1).webp" alt=""/></figure>



<p>For the vast majority of Android users utilizing factory-installed software, this verification process happens seamlessly since Google Play Services is pre-installed and auto-updating.</p>



<p>The reliance on this specific application suite means the verification process heavily utilizes hardware attestation, tying basic web accessibility directly to Google&#8217;s proprietary mobile ecosystem rather than simple behavioral analysis.</p>



<p>This mandatory integration with Google Play Services acts as a digital brick wall for the growing community of privacy advocates.</p>



<p>Users who intentionally flash their devices with custom, de-Googled operating systems like GrapheneOS, CalyxOS, and /e/OS are explicitly excluded from this new verification flow.</p>



<p>These operating systems are specifically engineered to prioritize user security and severely limit corporate data tracking by stripping out Google&#8217;s background services entirely.</p>



<p>According to developers at GrapheneOS, this reCAPTCHA update aggressively pushes hardware attestation, sidelining open-source alternatives. By tethering basic web navigation to a specific version of Play Services, privacy-focused users are effectively punished for securing their data.</p>



<p>They are rendered unable to pass standard security checks on countless websites that rely on Google&#8217;s widespread verification infrastructure, severely limiting their ability to browse the internet normally.</p>



<p>Google defends the architectural shift as a necessary evolution to stop <a href="https://cybersecuritynews.com/new-malware-campaigns-turn-network-devices/" target="_blank" rel="noreferrer noopener">advanced AI bots</a> and widespread online fraud.</p>



<p>As automated threats become highly proficient at solving traditional image puzzles, the company argues that hardware-level verification is the most reliable method to confirm authentic human identity.</p>



<p>However, cybersecurity critics and open-source advocates argue this move exerts monopolistic control over the internet by forcing adoption of Google&#8217;s proprietary tracking software.</p>



<p>The security community is increasingly urging website administrators to migrate away from Google&#8217;s ecosystem and adopt alternative, less restrictive verification services like hCaptcha to ensure open web access.</p>



<p>For the time being, users locked out by the QR code challenge can rely on a temporary workaround by selecting the audio challenge option when presented with a reCAPTCHA prompt.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 92%,rgb(169,184,195) 100%)"><strong>Cybercriminals now enter through your suppliers instead of your front door &#8211; <a href="https://www.manageengine.com/products/desktop-central/webinars/uk-cybersecurity-essentials-2026.html?utm_source=CSN&amp;utm_medium=TPS-mailer&amp;utm_campaign=UKCSW" target="_blank" rel="noreferrer noopener nofollow">Free Webinar</a></strong></p>
<p>The post <a href="https://cybersecuritynews.com/google-recaptcha-update/">Google reCAPTCHA Update Blocks Privacy-Focused Android Users From Sites</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/Google-reCAPTCHA-Update.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149608</post-id>	</item>
		<item>
		<title>JDownloader Downloader Hacked to Infect Users With New Python RAT</title>
		<link>https://cybersecuritynews.com/jdownloader-downloader-hacked/</link>
		
		<dc:creator><![CDATA[Tushar Subhra Dutta]]></dc:creator>
		<pubDate>Mon, 11 May 2026 06:48:03 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security news]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=149575</guid>

					<description><![CDATA[<p>JDownloader, the popular open-source download manager trusted by millions of users worldwide, was at the center of a serious supply chain attack in early May 2026. Attackers quietly compromised the official jdownloader.org website and replaced legitimate installer download links with malicious files carrying a fully functional Python-based remote access trojan. Anyone who downloaded what they [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/jdownloader-downloader-hacked/">JDownloader Downloader Hacked to Infect Users With New Python RAT</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>JDownloader, the popular open-source download manager trusted by millions of users worldwide, was at the center of a serious supply chain attack in early May 2026. Attackers quietly compromised the official jdownloader.org website and replaced legitimate installer download links with malicious files carrying a fully functional Python-based remote access trojan. </p>



<p>Anyone who downloaded what they believed to be a standard installer during a narrow two-day window may have unknowingly installed a dangerous and persistent backdoor directly onto their machine.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670" target="_blank" rel="noreferrer noopener"></a></p>



<p>The attack did not tamper with JDownloader&#8217;s actual software or its in-app update system. Instead, it targeted the website&#8217;s download links, specifically the &#8220;Download Alternative Installer&#8221; options for Windows and the Linux shell installer link. </p>



<p>Users who clicked those links between May 6th and 7th, 2026 received files that looked like the real thing but were in fact unsigned wrappers concealing a layered malicious payload. The deception was convincing enough that many users bypassed Windows SmartScreen warnings, believing the alerts to be nothing more than false positives.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670" target="_blank" rel="noreferrer noopener"></a></p>



<p><a href="https://jdownloader.org/incident_8.5.2026.html?v=20260508277000" id="https://jdownloader.org/incident_8.5.2026.html?v=20260508277000" target="_blank" rel="noreferrer noopener nofollow">Researchers and developers at jdownloader.org confirmed the compromise</a> after a Reddit user named PrinceOfNightSky flagged suspicious behavior on May 7th, 2026, noting that the downloaded executables were being attributed to publishers called &#8220;Zipline LLC&#8221; and &#8220;The Water Team&#8221; rather than the legitimate developer AppWork GmbH. </p>



<p>The team took the website offline within hours, at 17:24 UTC, and began a full investigation. By the night of May 8th into May 9th, the site was restored with verified clean links after all malicious content was removed and server configurations were hardened against future abuse.</p>



<h2 class="wp-block-heading" id="h-jdownloader-downloader-hacked"><strong>JDownloader Downloader Hacked</strong><a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670" target="_blank" rel="noreferrer noopener"></a></h2>



<p>The attack was traced to an unpatched vulnerability in the website&#8217;s content management system, which allowed attackers to change access control lists without authentication and modify specific pages. </p>



<p>Logs revealed that the attackers even ran a dry run on a low-traffic test page on May 5th before swapping the live installer links the following day. The entire operation showed careful planning and patience, which is a hallmark of sophisticated threat actors operating with a clear intent to infect as many users as possible.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670" target="_blank" rel="noreferrer noopener"></a></p>



<p>Community researcher Takia_Gecko performed deep technical analysis of the malicious installer samples and revealed a chilling level of sophistication. The <a href="https://cybersecuritynews.com/hackers-abuse-signed-logitech-installer-tclbanker/" id="149498" target="_blank" rel="noreferrer noopener">fake installer was an unsigned wrapper that bundled the real, legitimate JDownloader installer</a> alongside a second, XOR-encrypted malicious executable. </p>



<p>That hidden executable was decoded using the XOR key &#8220;ectb&#8221; to reveal a Windows x64 loader, which then decrypted further resources using the key &#8220;fywo&#8221; to unpack a PyArmor 8-protected Python 3.14 payload.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670" target="_blank" rel="noreferrer noopener"></a></p>



<p>The final payload was a full remote access trojan framework written in Python. It used RSA-OAEP and <a href="https://cybersecuritynews.com/securing-open-banking-apis-mitigating-risks-in-third-party-integrations/" id="140883" target="_blank" rel="noreferrer noopener">AES-GCM encryption to communicate with its command-and-control servers</a>, supported dead drop resolvers through platforms including Telegraph, Rentry, Codeberg, and onion addresses, and used RC4 encryption with the key &#8220;Chahgh4a&#8221; to decode live C2 URLs. The trojan hosted itself under pythonw.exe and gave attackers the ability to push and execute arbitrary Python code on any infected machine at will.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670" target="_blank" rel="noreferrer noopener"></a></p>



<h2 class="wp-block-heading" id="what-affected-users-should-do-now"><strong>What Affected Users Should Do Now</strong></h2>



<p>The most critical piece of advice from jdownloader.org is clear: if you downloaded and ran one of the affected installers, perform a full clean reinstall of your operating system. Antivirus scans may catch some threats, but they cannot guarantee removal of every persistence mechanism the malware may have established. </p>



<p>Several users who ran full scans with tools including Malwarebytes and <a href="https://cybersecuritynews.com/windows-defender-enhancements/" id="106763" target="_blank" rel="noreferrer noopener">Windows Defender Offline found no detections</a>, which suggests the malware is capable of hiding its presence effectively on compromised systems.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670" target="_blank" rel="noreferrer noopener"></a></p>



<p>If you still have the downloaded file and have not run it, do not execute it. Instead, verify the digital signature by right-clicking the file, going to Properties, and checking the Digital Signatures tab. </p>



<p>Genuine JDownloader installers are signed by AppWork GmbH. Any unknown publisher or a missing signature is a strong red flag. Until you are confident your system is clean, avoid logging into sensitive accounts from the affected machine and change all important passwords from a separate, trusted device.<a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670" target="_blank" rel="noreferrer noopener"></a></p>



<p><strong>Indicators of Compromise (IoCs):-</strong></p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Type</th><th class="has-text-align-left" data-align="left">Indicator</th><th class="has-text-align-left" data-align="left">Description</th></tr></thead><tbody><tr><td>SHA256</td><td><code>6d975c05ef7a164707fa359284a31bfe0b1681fe0319819cb9e2c4eec2a1a8af</code></td><td>Malicious Linux shell installer (JDownloader2Setup_unix_nojre.sh, 7,934,496 bytes)&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>SHA256</td><td><code>fb1e3fe4d18927ff82cffb3f82a0b4ffb7280c85db5a8a8b6f6a1ac30a7e7ed9</code></td><td>Malicious Windows AMD64 installer v11.0.30 (104,910,336 bytes)&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>SHA256</td><td><code>04cb9f0bca6e0e4ed30bc92726590724bf60938440b3825252657d1b3af45495</code></td><td>Malicious Windows AMD64 installer v17.0.18 (101,420,032 bytes)&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>SHA256</td><td><code>5a6636ce490789d7f26aaa86e50bd65c7330f8e6a7c32418740c1d009fb12ef3</code></td><td>Malicious Windows AMD64 installer v1.8.0.482 (61,749,248 bytes)&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>SHA256</td><td><code>32891c0080442bf0a0c5658ada2c3845435b4e09b114599a516248723aad7805</code></td><td>Malicious Windows AMD64 installer v21.0.10 (107,124,736 bytes)&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>SHA256</td><td><code>de8b2bdfc61d63585329b8cfca2a012476b46387435410b995aeae5b502bd95e</code></td><td>Malicious Windows x86 installer v11.0.29 (87,157,760 bytes)&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>SHA256</td><td><code>e4a20f746b7dd19b8d9601b884e67c8166ea9676b917adea6833b695ba13de16</code></td><td>Malicious Windows x86 installer v17.0.17 (86,576,128 bytes)&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>SHA256</td><td><code>4ff7eec9e69b6008b77de1b6e5c0d18aa717f625458d80da610cb170c784e97c</code></td><td>Malicious Windows x86 installer v1.8.0.472 (62,498,304 bytes)&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/e7506c77-1e16-4783-82e1-035267230249/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_1.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=8nOw77zdEZMfh8v6zEJcSvx6OrE%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>URL</td><td><code>https://parkspringshotel[.]com/m/Lu6aeloo.php</code></td><td>Live C2 server URL decoded via RC4 key &#8220;Chahgh4a&#8221;&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>URL</td><td><code>https://auraguest.lk/m/douV2quu[.]php</code></td><td>Live C2 server URL decoded via RC4 key &#8220;Chahgh4a&#8221;&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>Registry Key</td><td><code>HKCU\SOFTWARE\Python</code></td><td>Persistence config staging location used by the loader&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>Process</td><td><code>pythonw.exe</code></td><td>Host process for the resident Python RAT payload&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>XOR Key</td><td><code>ectb</code></td><td>Key used to decrypt malicious PE from wrapper resource&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>XOR Key</td><td><code>fywo</code></td><td>Key used to decrypt obfuscated PyArmor resources in loader&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>RC4 Key</td><td><code>Chahgh4a</code></td><td>Key used to decrypt dead drop C2 resolver content&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>Publisher (Fake)</td><td>Zipline LLC</td><td>Fraudulent code-signing publisher observed on malicious installer&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/b6c65062-17ee-41d0-8119-39ad6bd325ff/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT_2.pdf?AWSAccessKeyId=ASIA2F3EMEYE2SZUL7V6&amp;Signature=k6YFdAFV5fv8Q3JaWMf%2FQXt6aPI%3D&amp;x-amz-security-token=IQoJb3JpZ2luX2VjEEUaCXVzLWVhc3QtMSJGMEQCIEFcNIPx%2FNTInTkXWLOdUlk7n0b45F%2FqoOItBdX5oF8zAiA48ESr8GVMxMconzvHXB6ebhLV5DXj2nDXf%2Fg0vAzExSrzBAgNEAEaDDY5OTc1MzMwOTcwNSIM%2BlEx8EOJhGzLZGetKtAEL0OhJ1s4weCKlTpj6fyipCdIBEqH8Kh5%2FaHQGcyxYLDARdeVqHwG%2FDYXmV9QXP98bCsVBEYfoAHGU7m2V6cAnTVOWxeQyQIaKMxDOW0%2F25Xhfh4f4nzkofjZI9EGMGqi06V928iZWqX0hWoKUQNpUQXUovago%2FzMn3lxRFiJiLfVsRb5QD0iiILXXZMisW5WRpk%2FHPcoEFTVCc0Av7zYonBSkvEuKFmYMshmF3V0DXKo8WyIigId6BvThgwqtf1FT7VJj08GE1AuP6pobRQfeI1IPI3OQVe1ifjo%2BuWqze3T1GkCAp%2BsQWpZnSixXCwXZvmLM7eafcerHIKU9cInqxUvrc%2FBLrkItpJrldZUQMWIMAZxDZKZiqaj1UPLanBUlXrzhDRzqsvKhrJexpbEDEglRXmsj5rTWTy5TgNBksHzwuxeNhL2hmpSE58%2ByNWQRNZegUddMwj0WTj1UK8qdTOIdnEmtcJ0RoUfAMoJ3Y1Zg9%2BSmQflBx6XfsuY7loRqd31vXtrsbk0b7C7AGRoJ0epNnn1nKq9YHufJNEGi%2FDLWIMkAD6%2BbmOvvDCS%2FTA92%2BpRulM2yLoA6BrAd%2BUp0kkMjgpZozratuysz0sXUYPBa3KMgdQfHEbKVAxSJ5gKJafSHX9YLNW5JMQx%2BOZfu6Dz%2FgN5ioi5KUJzYNTrLDZPBk4J17RTBMadiE0GGBu7EHw4UIlcAGWqGEMZMdNYcovfc1ZS%2FhDJdudxT30n3xXPC2XEqjawD3wEv1xsz5p4ieNfv5jltxUTqoRtPKcd%2FDDvroXQBjqZAZt%2FHT1jta1As%2BMKXawaDD6dG9QKA6Xrr5x%2B93qebfMF7tzm5yK81DYvRX2qMsxJFNFKBf58OowJR1L8VWHARTqvDa8B1ldx9VVyrMu%2BwVuSA3Av%2BDc3pcRePFgFl4L2xYZOppW8zVOxHie6hj%2BTlmXB3o%2FJ76cHg8uBlirbAY0LJwOMG4uf5kJWrEvVRvypc1MCeqsIVAtQJA%3D%3D&amp;Expires=1778475670"></a></td></tr><tr><td>Publisher (Fake)</td><td>The Water Team</td><td>Second fraudulent publisher name seen on malicious installer&nbsp;</td></tr></tbody></table></figure>



<p><strong>Note:</strong> <em>IP addresses and domains are intentionally defanged (e.g., </em><code><em>[.]</em></code><em>) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM</em>.</p>



<p class="has-text-align-center has-background" style="background:linear-gradient(180deg,rgb(238,238,238) 92%,rgb(169,184,195) 100%)"><strong>Follow us on <a href="https://news.google.com/publications/CAAqMggKIixDQklTR3dnTWFoY0tGV041WW1WeWMyVmpkWEpwZEhsdVpYZHpMbU52YlNnQVAB?hl=en-IN&amp;gl=IN&amp;ceid=IN:en" target="_blank" rel="noreferrer noopener">Google News</a>, <a href="https://www.linkedin.com/company/cybersecurity-news/" target="_blank" rel="noreferrer noopener">LinkedIn</a>, and <a href="https://x.com/cyber_press_org" target="_blank" rel="noreferrer noopener">X</a> to Get More Instant Updates</strong>, <strong>Set CSN as a Preferred Source in <a href="https://www.google.com/preferences/source?q=cybersecuritynews.com" target="_blank" rel="noreferrer noopener">Google</a>.</strong></p>
<p>The post <a href="https://cybersecuritynews.com/jdownloader-downloader-hacked/">JDownloader Downloader Hacked to Infect Users With New Python RAT</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://cybersecuritynews.com/wp-content/uploads/2026/05/JDownloader-Downloader-Hacked-to-Infect-Users-With-New-Python-RAT.webp" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">149575</post-id>	</item>
		<item>
		<title>10 Best Full Disk Encryption Tools in 2026</title>
		<link>https://cybersecuritynews.com/best-full-disk-encryption-tools/</link>
		
		<dc:creator><![CDATA[CISO Advisory]]></dc:creator>
		<pubDate>Mon, 11 May 2026 04:36:04 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security News]]></category>
		<category><![CDATA[Top 10]]></category>
		<category><![CDATA[cyber security news]]></category>
		<category><![CDATA[top 10]]></category>
		<guid isPermaLink="false">https://cybersecuritynews.com/?p=12739</guid>

					<description><![CDATA[<p>Full Disk Encryption (FDE) is a security feature that encrypts the entire contents of a disk drive, ensuring that all data stored on the drive is protected from unauthorized access, even if the device is physically stolen. FDE uses robust encryption algorithms to encrypt data on the fly, providing seamless protection without impacting system performance. [&#8230;]</p>
<p>The post <a href="https://cybersecuritynews.com/best-full-disk-encryption-tools/">10 Best Full Disk Encryption Tools in 2026</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Full Disk Encryption (FDE) is a security feature that encrypts the entire contents of a disk drive, ensuring that all data stored on the drive is protected from unauthorized access, even if the device is physically stolen.</p>



<p>FDE uses robust encryption algorithms to encrypt data on the fly, providing seamless protection without impacting system performance. </p>



<p>This encryption covers operating system files, applications, and user data, offering comprehensive security for sensitive information.</p>



<p>Disc encryption is a technology that shields information from unauthorized access by encoding data into unreadable code. Furthermore, an attacker or unauthorized person cannot easily decipher this code.</p>



<p>Every piece of data that is stored on a disk or disk volume is encrypted using disk encryption hardware or software. Three broad categories can be used to classify disk encryption software:</p>



<ul class="wp-block-list">
<li>File or folder-level encryption&nbsp;</li>



<li>Full disk encryption</li>



<li>Database encryption</li>
</ul>



<h2 class="wp-block-heading" id="which"><strong>Which Tool Is Used For Encryption?</strong></h2>



<p>There are many free encryption programs, but not all live up to our standards. Many of them are weak points that threat actors can exploit to access your sensitive data.</p>



<p>Data is encrypted using VPN software, which masks the user&#8217;s location and modifies its IP address. Tor Browser is open-source, free software designed to help you communicate privately and anonymously.</p>



<p>Cryptomator is easy to use and suitable for <a href="https://cybersecuritynews.com/android-rafel-rat/" target="_blank" rel="noreferrer noopener">Android</a>, <a href="https://cybersecuritynews.com/windows-hello-for-business-flaw/" target="_blank" rel="noreferrer noopener">Windows</a>, macOS, iOS, and Linux.</p>



<p>VeraCrypt: This program offers free full disk encryption in addition to adding military-grade encryption to your data. Files saved on Google Drive and Dropbox are automatically encrypted with AxCrypt.</p>



<p>AES Crypt is a dependable and secure software that encrypts sensitive files with robust AES-256-bit technology.</p>



<h2 class="wp-block-heading" id="what"><strong>What Are The Benefits Of Disk Encryption?</strong></h2>



<p>Full (or whole) disk encryption (FDE) is the term for encrypting a computer&#8217;s hard drive(s) so that it is difficult for an unauthorized user to read it. Some hardware encryption systems can even encrypt the boot area.</p>



<p>The advantage of FDE in these times of increased cybercrime is that all data on the disk, whether sensitive or not, will be inaccessible to unauthorized personnel.&nbsp;</p>



<p>Users don&#8217;t have to worry about exposing company information if they lose a laptop or phone. The data is frequently unrecoverable, even if the disk is removed from the computer. The disk automatically encrypts any user-created files or folders, removing any chance for user error.</p>



<h2 class="wp-block-heading" id="why"><strong>Why Do We Need Disk Encryption?</strong></h2>



<p>Companies rarely invest the necessary time, money, and infrastructure changes to properly secure their systems and networks to maintain a strong security posture regarding cybersecurity practices.</p>



<p>The fear of becoming the subsequent major breach that will make headlines and cause financial and brand reputational damage is a driving force behind companies adopting good cyber security practices, as are laws requiring compliance.</p>



<p>Security professionals must introduce new technologies, methodologies, policies, and procedures to help the business improve its security posture.</p>



<p>Full disk encryption is a cryptographic technique that encrypts every file and folder on the hard drive, as well as the operating system and software.&nbsp;</p>



<h2 class="wp-block-heading" id="full"><strong>The 10 <strong>Best</strong></strong> <strong>Full Disk Encryption Tools And Their Feature</strong></h2>



<ul class="wp-block-list">
<li><strong>BitLocker</strong>: Provides full disk encryption for Windows systems, integrating seamlessly with the OS and offering TPM support for secure key storage.</li>



<li><strong>VeraCrypt</strong>: An open-source encryption tool offering strong encryption algorithms and the ability to create hidden volumes for additional security.</li>



<li><strong>FileVault</strong>: A macOS feature providing full disk encryption, using XTS-AES-128 encryption to protect data, with seamless integration into the Apple ecosystem.</li>



<li><strong>DiskCryptor</strong>: Open-source encryption for Windows, supporting entire disk and partition encryption, focusing on speed and simplicity.</li>



<li><strong>Boxcryptor</strong>: Encrypts files for cloud storage, supporting a wide range of services like Google Drive, Dropbox, and OneDrive, ensuring data remains secure in the cloud.</li>



<li><strong>AxCrypt</strong>: Simple file encryption tool for individual files and folders, offering strong encryption and easy integration with Windows Explorer.</li>



<li><strong>Linux Unified Key Setup (LUKS)</strong>: Standardized encryption setup for Linux systems, providing disk encryption with support for multiple keys and passphrases.</li>



<li><strong>Dm-crypt</strong>: A transparent disk encryption subsystem in Linux, providing encryption for disk partitions using the kernel&#8217;s cryptographic API.</li>



<li><strong>NordLocker</strong>: Provides file encryption for personal and business use, supporting end-to-end encryption and cloud storage integration for secure data storage.</li>



<li><strong>CipherShed</strong>: An open-source disk encryption tool derived from TrueCrypt, offering full disk and partition encryption with strong security features.</li>
</ul>



<h2 class="wp-block-heading" id="features"><strong>10 Full Disk Encryption Tools Features</strong></h2>



<figure class="wp-block-table aligncenter is-style-stripes"><table><thead><tr><th><strong>Full Disk Encryption tools</strong></th><th><strong>Features</strong></th><th>Stand Alone Feature</th><th>Pricing </th><th>Free Trial / Demo</th></tr></thead><tbody><tr><td><strong>1.<a href="https://www.microsoft.com/en-in/download/details.aspx?id=27555" target="_blank" rel="noreferrer noopener nofollow"> BitLocker</a></strong></td><td><strong>1</strong>. BitLocker To Go<br><strong>2</strong>. Strong encryption algorithms<br><strong>3</strong>. Multiple authentication methods<br><strong>4</strong>. Pre-boot authentication<br><strong>5</strong>. Hardware-based encryption<br><strong>6</strong>. Integration with the Windows operating system</td><td>Built-in encryption for Windows, seamless integration with OS.</td><td>Included with Windows Pro/Enterprise</td><td>No</td></tr><tr><td><strong>2. <a href="https://veracrypt.eu/en/Downloads.html" target="_blank" rel="noreferrer noopener nofollow">VeraCrypt</a></strong></td><td><strong>1</strong>. Full disk encryption<br><strong>2</strong>. BitLocker Network Unlock<br><strong>3</strong>. Multiple authentication methods<br><strong>4</strong>. Pre-boot authentication<br><strong>5</strong>.BitLocker Drive Encryption with TPM</td><td>Open-source, cross-platform encryption with hidden volumes.</td><td>Free, open-source</td><td>No</td></tr><tr><td><strong>3. <a href="https://www.microsoft.com/en-us/p/file-password-vault/9wzdncrcv61c?activetab=pivot:overviewtab" target="_blank" rel="noreferrer noopener nofollow">FileVault</a></strong></td><td><strong>1</strong>. Time Machine Integration<br><strong>2</strong>. User-Based Encryption<br><strong>3</strong>. Secure Boot<br><strong>4</strong>. Multi-User Support<br><strong>5</strong>. Rapid Encryption<br><strong>6</strong>. Automatic Login</td><td>Native macOS encryption with transparent operation.</td><td>Included with macOS</td><td>No</td></tr><tr><td><strong>4. <a href="https://diskcryptor.org/downloads/" target="_blank" rel="noreferrer noopener nofollow">DiskCryptor</a></strong></td><td><strong>1</strong>. Support for SSD Trim Command<br><strong>2</strong>. Support for Multiple Encryption Algorithms<br><strong>3</strong>. Pre-Boot Authentication<br><strong>4</strong>. Hidden Operating System <br><strong>5</strong>. Support for Dynamic Volumes <br><strong>6</strong>. Encrypted System Partition</td><td>Free, lightweight encryption for Windows with full disk and partition support.</td><td>Free, open-source</td><td>No</td></tr><tr><td><strong>5. <a href="https://www.boxcryptor.com/en/download/" target="_blank" rel="noreferrer noopener nofollow">Boxcryptor</a></strong></td><td><strong>1</strong>. User-friendly interface<br><strong>2</strong>. Mobile device management<br><strong>3</strong>. Password-based authentication<br><strong>4</strong>. Key management<br><strong>5</strong>. Multiple key slots</td><td>Encryption for cloud storage, supports multiple cloud providers.</td><td>Free, premium plans available</td><td>Yes</td></tr><tr><td><strong>6. <a href="https://www.axcrypt.net/Download/" target="_blank" rel="noreferrer noopener nofollow">AxCrypt</a></strong></td><td><strong>1</strong>. File Encryption<br><strong>2</strong>. Folder Encryption<br><strong>3</strong>. Secure Sharing<br><strong>4</strong>. File Wiping<br><strong>5</strong>. Password ProtectionFull Disk Encryption<br><strong>6</strong>. Key Sharing</td><td>User-friendly file encryption with password protection.</td><td>Free, premium version available</td><td>Yes</td></tr><tr><td><strong>7. <a href="https://www.redhat.com/sysadmin/disk-encryption-luks" target="_blank" rel="noreferrer noopener nofollow">Linux Unified Key Setup</a></strong></td><td><br><strong>1</strong>.  Integration with Linux system tools<br><strong>2</strong>. Plausible deniability<br><strong>3</strong>. Password-based authentication<br><strong>4</strong>. Key management<br><strong>5</strong>. Multiple key slots<br><strong>6</strong>. Header backup</td><td>Standardized disk encryption for Linux with key management.</td><td>Free, open-source</td><td>No</td></tr><tr><td><strong>8. <a href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-crypt.html" target="_blank" rel="noreferrer noopener nofollow">Dm-crypt</a></strong></td><td><strong>1</strong>. Configurable encryption options<br><strong>2</strong>. Support for system hibernation<br><strong>3</strong>. Password-based authentication<br><strong>4</strong>. Fast and efficient encryption<br><strong>5</strong>. Multiple key slots<br><strong>6</strong>. Header backup</td><td>Kernel-level encryption for Linux, flexible with LUKS integration.</td><td>Free, open-source</td><td>No</td></tr><tr><td><strong>9. <a href="https://nordlocker.com/download/windows/" target="_blank" rel="noreferrer noopener nofollow">NordLocker</a></strong></td><td><strong>1</strong>. Syncing encrypted files across devices<br><strong>2</strong>. Encrypted vault creation for sensitive files<br><strong>3</strong>. Secure deletion of files<br><strong>4.</strong> Two-factor authentication support<br><strong>5</strong>. Multiple key slots<br><strong>6</strong>. Header backup</td><td>Secure file encryption with cloud storage integration.</td><td>Starts at $3.99/month</td><td>Yes</td></tr><tr><td><strong>10. <a href="https://www.ciphershed.org/download/" target="_blank" rel="noreferrer noopener nofollow">CipherShed</a></strong></td><td><strong>1</strong>. Multilingual user interface support<br><strong>2</strong>. Audit logs and activity tracking<br><strong>3</strong>. Customizable encryption options<br><strong>5</strong>. Partition and volume resizing<br><strong>6</strong>. Encrypted virtual disk creation</td><td>Open-source, cross-platform disk encryption tool.</td><td>Free, open-source</td><td>No</td></tr></tbody></table></figure>



<h2 class="wp-block-heading" id="bit"><strong>1. BitLocker</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8SbXJafn0t-0_H_yxO_l-LeReTS83e8vqRd7KeXR6J4gQt21zByXzB5Yt79Ro9chUmlSmbzrXaNlJiPw0qa4izmeHlQg2IpdGc6Cw_hBmRwiJcZoFiyCR4ylrVRntq2AYsG7nx8OwlBGdchZHrCovFeh1igNr0xxQToxOkfTdHUTRj89MD1fI9smCqbnd/s16000/Capture%20(49).webp" alt=" Full Disk Encryption Tools"/><figcaption class="wp-element-caption"><strong>BitLocker</strong></figcaption></figure>
</div>


<p><a href="https://cybersecuritynews.com/two-step-phishing-attacks/" target="_blank" rel="noreferrer noopener">Microsoft&#8217;s </a>free, proprietary BitLocker encryption program for Windows can encrypt your entire drive and help guard against unauthorized system changes, such as malware, at the firmware level.</p>



<p>Anyone with a computer running Windows Vista or 7 Ultimate, Windows Vista or 7 Enterprise, Windows 8.1 Pro, Windows 8.1 Enterprise, or Windows 10 Pro is eligible to use BitLocker.</p>



<p>If you&#8217;re using the Enterprise edition, your computer is likely part of a large corporation, so you should talk to the IT department about turning on BitLocker encryption.</p>



<p>Most of us purchase computers with the base edition of Windows, excluding BitLocker encryption. However, if you upgraded to Windows 8 during the initial release of Microsoft&#8217;s dual-interface operating system, you most likely have Windows 8 or 8.1 Pro.</p>



<p>The command-line tools manage-bde<span style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong>,</strong>&nbsp;repair-bde,</span> and the BitLocker cmdlets for Windows PowerShell are all part of the BitLocker Drive Encryption Tools.</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>Flash devices and other external drives can be encrypted with Veracrypt on all platforms.</li>



<li>Creates a mountable file-based virtual encrypted drive.</li>



<li>Hardware-accelerated encryption is possible on current processors.</li>



<li>Automatic, real-time, transparent encryption.</li>



<li>Encrypts a hard drive or USB flash drive partition.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What is Good?</strong></th><th><strong>What Could Be Better?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>. Supports Windows 11 and Windows 10.</td><td><strong>1</strong>. Sometimes, after being paused, encryption is not resumed.</td></tr><tr><td><strong>2</strong>. Provides a recovery user experience that can be customized for IT.</td><td><strong>2</strong>. A disk can sometimes take a very long time to encrypt.</td></tr><tr><td><strong>3</strong>. Integrates management tools like Microsoft Configuration Manager</td><td>&nbsp;</td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://www.microsoft.com/en-in/download/details.aspx?id=27555" target="_blank" rel="nofollow noreferrer noopener"><strong>BitLocker</strong> &#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="vera"><strong>2. VeraCrypt</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8RZxG4VgAKZjUy0d35orq1Nyb9amj6Mx_4HBtj4oKEQqjav4fNoTmY9R94vhDRdVO1yl05fAV2jNAD5eW5hFrnIWiz0uAJeaBUFq0PfXwdlewRGbeUjCMY49A4OPVwKResB1TSmlCRYGC6TcO5iA2yyKuhwCQDhknI7BwwOFZDlVFz1S_Noo0tn33YVnQ/s16000/Capture%20(50).webp" alt=""/><figcaption class="wp-element-caption"><strong>VeraCrypt</strong></figcaption></figure>
</div>


<p>On-the-fly encryption (OTFE) can be performed using the free and open-source utility VeraCrypt. The software can create a virtual encrypted disk that works like a regular disk within a file.</p>



<p>Pre-boot authentication can also encrypt a partition or, in the case of Windows, the entire storage device. <span style="box-sizing: border-box; margin: 0px; padding: 0px;">VeraCrypt, a fork of the abandoned&nbsp;TrueCrypt project</span>, was made available on June 22, 2013.</p>



<p>Numerous security upgrades have been made, and issues raised by TrueCrypt Code audits have been resolved. VeraCrypt includes improvements to the original cryptographic ciphers and hash functions that improve performance on contemporary CPUs.</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>It supports Windows, Mac OS, iOS, and Android without limits.</li>



<li>Using SSO, SCIM, or Active Directory simplifies user administration.</li>



<li>Boxcryptor protects data, and the cloud provides backup and accessibility.</li>



<li>Software reliability and security are verified.</li>



<li>The device encrypts files immediately with Boxcryptor.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What is Good ?</strong></th><th><strong>What Could Be Better?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>. High level of security, with various available encryption techniques.</td><td><strong>1</strong>. Dedicated customer service is lacking</td></tr><tr><td><strong>2</strong>. Completely free to use&nbsp;</td><td><strong>2</strong>. There is no integration with cloud storage.</td></tr><tr><td><strong>3</strong>. Users have more transparency because it was built with open-source software.</td><td></td></tr><tr><td><strong>4</strong>. Different encryption algorithms are available.</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://veracrypt.eu/en/Downloads.html" target="_blank" rel="nofollow noreferrer noopener"><strong><strong>VeraCrypt</strong></strong>&#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="file"><strong>3. FileVault</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3MmgLZczE5-slVbvopHxZdICmnhBmVmVJFtEnwweYQDwR10Sa4vwD0P350d1HmleBpuoYnwfT16OhSeKZ0K7lOQuhXh0Sv18z2aJ6A4iBSGCnYYrKlPNqpKcCMYmq4acXJkvABIZJ26_LDqYVZd_T7iAW9M-vjRRqhv4NxMzZZ24iaGfWa96UtCtWOKyO/s16000/Capture%20(51).webp" alt=" Full Disk Encryption Tools"/><figcaption class="wp-element-caption"><strong>FileVault</strong></figcaption></figure>
</div>


<p>In 2003, Mac OS X Panther (10.3) introduced FileVault, an Apple product that encrypts <a href="https://cybersecuritynews.com/fake-microsoft-teams-macos-malware/" target="_blank" rel="noreferrer noopener"><span style="box-sizing: border-box; margin: 0px; padding: 0px;">mac</span>OS</a>&nbsp;and Mac hardware data.</p>



<p>Once enabled, it will automatically encrypt your data while running in the background and encrypt all the data on your startup disk.</p>



<p>All users must enter their passwords again when logging in after going to sleep or using a screensaver, and any accounts that are not administrator accounts must be logged in by an administrator the first time to enable encryption.&nbsp;</p>



<p>When the file vault is enabled, the system prompts the user to set up a master password for the computer. If the user&#8217;s password is forgotten, the files can still be decrypted using the master password or recovery key.&nbsp;</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>The operating system delivers encrypted sparse disk images for home directory volume.</li>



<li>Apple offers iCloud ID for file vault authentication.</li>



<li>Finding My Mac to wipe a device or set of drives remotely is another fascinating FileVault feature.</li>



<li>FileVault settings are part of macOS endpoint security.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What Could Be Better?</strong></th><th><strong>What Could Be Better ?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>. The entire disk is encrypted once the file vault is enabled.</td><td><strong>1</strong>. A big drive can take a long time to encrypt.</td></tr><tr><td><strong>2</strong>. FileVault protects your data.</td><td><strong>2</strong>. Initial encryption can&#8217;t be paused and may take a long time.</td></tr><tr><td><strong>3</strong>. FileVault requires password protection on all devices.</td><td></td></tr><tr><td>4. Easy to install and use, especially for Apple users</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://www.microsoft.com/en-us/p/file-password-vault/9wzdncrcv61c?activetab=pivot:overviewtab" target="_blank" rel="nofollow noreferrer noopener"><strong><strong>FileVault</strong></strong>&#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="disk"><strong>4. DiskCryptor</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSNFjJbVn-iooZ7EKNb2CsEvJKU4NOcI19l5dZp7HSdiLtFFdiKtlR7qJpWW6XsBf4kuFffPzpBDsjyKRJvUvAgYGRStHcU_bO64-unJChTPSmOYtTKyYB4in6sAyjHJE25wpxuJO0XMMsq7vqKoRW051OEBtR8IZEPP79xTNIKTB7DdpD2XpiOjkkfXqP/s16000/Capture%20(52).webp" alt=""/><figcaption class="wp-element-caption"><strong>DiskCryptor</strong></figcaption></figure>
</div>


<p>All disk partitions, including the system partition, can be encrypted using the open encryption solution DiskCryptor.</p>



<p>Its openness contrasts sharply with the current situation, in which most software with comparable functionality is wholly proprietary, making it unsuitable for protecting sensitive data.</p>



<p>The updated versions of DiskCryptor are intended to replace Microsoft&#8217;s BitLocker since BitLocker is not considered secure.</p>



<p>For your computer to boot, you must enter the encryption password each time you turn on your computer after applying the encryption with DiskCryptor. There are broad configuration options for booting an encrypted OS and support for a range of multi-boot options.&nbsp;</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>External storage devices are fully supported.</li>



<li>Support for optional hotkeys and command-line interfaces (CLI).</li>



<li> High efficiency, comparable to the efficiency of an unencrypted system.</li>



<li> System partition encryption with pre-boot authentication.</li>



<li>There are options for making encrypted CDs and <span style="box-sizing: border-box; margin: 0px; padding: 0px;">DVDs</span>.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>2</strong>. There aren&#8217;t many help documents or files.</th><th><strong>What is Good?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>. At the sector level, encrypt entire drives.</td><td><strong>1</strong>. when not mounted, does not hide encrypted drives.</td></tr><tr><td><strong>2</strong>. Both internal and external devices should be encrypted.</td><td><strong>2</strong>.There aren&#8217;t many help documents or files.</td></tr><tr><td><strong>3</strong>. Pauses encryption during reboots or drive transfers.</td><td></td></tr><tr><td><strong>4</strong>. volumes may be automatically unmounted upon logoff.</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://diskcryptor.org/downloads/" target="_blank" rel="nofollow noreferrer noopener"><strong><strong>DiskCryptor</strong></strong>&#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="box"><strong>5. Boxcryptor</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjd9S0f9__jTKaQpIsK5Kdbvkwvhn9iCAV36FkaXPfuobPbGeg8lYYBw0WMVedUl-IiDvy-hG6gNyJbE6SDnV2li-dwpheg6IWO06_MzeIARyYvdyTUUQXLdMq44M_JHN00pe_MVNgUexYEUXpFNJEomHwCKBOIR3BjPPVWjOThe82Q4LssUtx5Lt3yRXic/s16000/Capture%20(53).webp" alt=" Full Disk Encryption Tools"/><figcaption class="wp-element-caption"><strong>Boxcryptor</strong></figcaption></figure>
</div>


<p>Boxcryptor encrypts your sensitive files and folders in Dropbox, Google Drive, <a href="https://cybersecuritynews.com/apt-hackers-abusing-google-onedrive/" target="_blank" rel="noreferrer noopener">OneDrive</a>, and many other cloud storage services. Boxcryptor is free to use with one cloud storage provider on two devices.</p>



<p>As a single user, we can upgrade our range of features. It combines the benefits of the most user-friendly cloud storage services with the highest security standards worldwide. Boxcryptor adds security to over 30 cloud providers.</p>



<p><span style="box-sizing: border-box; margin: 0px; padding: 0px;">Boxcryptor also protects our NAS, file servers, and local data. It encrypts our data right on our device before syncing it to the cloud providers of our choice. Kudelski Security&#8217;s independent code audit confirmed Boxcryptor&#8217;s</span> Security.</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>Due to its focus on transparent encryption of abstract block devices, Dm-crypt is flexible.</li>



<li>Finds and addresses Cryptoloop&#8217;s dependability issues</li>



<li>Dm-crypt supports most Linux crypto API block ciphers and hash algorithms.</li>



<li>DM-crypt can also encrypt RAID and LVM volumes.</li>



<li>Physical block devices are mapped to virtual ones by dm-crypt.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What Could Be Better?</strong></th><th><strong>What Could Be Better ?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>. Over 30 cloud service providers get extra security from Boxcryptor.</td><td><strong>1</strong>. Limited support with the free version.</td></tr><tr><td><strong>2</strong>. Local data, NAS, file servers, and other storage devices are protected.</td><td><strong>2</strong>. It&#8217;s designed for cloud servers, so it won&#8217;t affect other websites.</td></tr><tr><td><strong>3</strong> The user interface is excellent.&nbsp;</td><td></td></tr><tr><td><strong>4</strong>. ability to share files.</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://www.boxcryptor.com/en/download/" target="_blank" rel="nofollow noreferrer noopener"><strong><strong>Boxcryptor</strong></strong>&#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="ax"><strong>6. AxCrypt</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSsZws4rch30iifWgKd6AkFr4JSrPGOLAewRn2T1SSNNY1E1Io7vhiIS5gFZW4_zVNT9ENN6EHiKmpmlPImkTQpNdY3DqHbK1Hv6x7N7pGyIF85V609r343AD9QBXdCUmiAjjABsltAOhYjOO8Mmu4KfpQ3xwKCwIA8LZaC5hIGA3TTzN-MQB3t_vcDED6/s16000/Axcrypt.webp" alt=""/><figcaption class="wp-element-caption"><strong>AxCrypt</strong></figcaption></figure>
</div>


<p>AxCrypt is a powerful, open-source encryption program with user-friendly, effective security tools. It is ideal for users who prioritize protecting files, documents, and data in their private and public domains.</p>



<p>The tools and features offered by AxCrypt will be highly advantageous to businesses with strict confidentiality protocols and policies. </p>



<p>The best use of their tools for securing the sharing of public keys will be made by businesses and agencies that collaborate with numerous stakeholders across all endpoints.</p>



<p>AxCrypt provides essential security tools for encryption, editing encrypted files, secure file deletion, password generation, and password storage. Its streamlined interface lets users encrypt and decrypt data quickly using a drag-and-drop method.</p>



<p>The straightforward yet effective tools AxCrypt provides make encryption hassle-free and easy. Additionally, AxCrypt has features that let users access encrypted data on their mobile devices.</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>All temporary and plaintext files that have been encrypted are destroyed.</li>



<li> The secured file is automatically updated after being opened and saved.</li>



<li> Files that have been encrypted cannot be changed without detection.</li>



<li>The password management tool lets you safely save passwords and codes online.</li>



<li>AxCrypt folders are created after automatically detecting cloud storage programs on your PC.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What Could Be Better?</strong></th><th><strong>What Could Be Better ?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>. Open source, under the GNU General Public License.&nbsp;</td><td><span style="box-sizing: border-box; margin: 0px; padding: 0px;"><strong>1</strong>. If t</span>he PC&#8217;s local security is compromised, the software is very hazardous.</td></tr><tr><td><strong>2</strong>. The UI is easy to use and learn.</td><td><strong>2</strong>. Enterprise businesses might prefer an advanced solution.</td></tr><tr><td><strong>3</strong>. Possesses a feature for managing passwords.</td><td></td></tr><tr><td><strong>4</strong>. Secures data with simple yet effective encryption.</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://www.axcrypt.net/Download/" target="_blank" rel="nofollow noreferrer noopener"><strong><strong>AxCrypt</strong></strong>&#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="linux"><strong>7. Linux Unified Key Setup</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRdkw-PLtZYgmf22bv1iOkWGomLoSqQ9jigno7TUWvnD9tnqC5qOrYpMgwgs0Z5cKADI4l65Nd8C2P1cXyIbC3dgVVxfpH4jlENF6eiGUaLDxC-zIjSHS5mwsxVZ_dDeqLWZlG9_Iq-hHJ-ZybNCsn8FfAYeXi0LMShkeE49oaY7h71r3pCx-JJYWz_t5Y/s16000/Capture%20(54).webp" alt=" Full Disk Encryption Tools"/><figcaption class="wp-element-caption"><strong>Linux Unified Key Setup</strong></figcaption></figure>
</div>


<p><strong>Year:</strong> 2004</p>



<p>Clemens Fruhwirth developed the Linux Unified Key Setup (<span style="box-sizing: border-box; margin: 0px; padding: 0px;">LUKS), a disk encryption specification </span>initially created for GNU/Linux.</p>



<p>LUKS specifies a platform-independent standard on-disk format for use in various security tools. It aims to provide a standardized and compatible format for disk encryption software.</p>



<p>This not only makes it easier for different software to work together and interact with one another, but it also ensures that every piece of software uses password management in a safe and well-documented way.</p>



<p>LUKS is frequently used to provide full disk encryption, which encrypts the root partition of an operating system installation and guards against unauthorized access to the operating system files.</p>



<p>Since the encrypted device&#8217;s contents are arbitrary, any file system, including swap partitions, can be encrypted.</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>Device Mapper Crypt (dm-crypt) is LUKS&#8217; kernel module for block device encryption.</li>



<li>It strengthens passphrases against dictionary assaults.</li>



<li>Backup keys can be added to LUKS services&#8217; multiple vital slots.</li>



<li>Data on encrypted block devices can be anything.</li>



<li>Encrypt partitions on your Linux machine.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What Could Be Better?</strong></th><th><strong>What Could Be Better ?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>.LUKS protects data with strong disk encryption.</td><td><strong>1</strong>. Remembering your LUKS password or key might make data recovery difficult.</td></tr><tr><td><strong>2</strong>. Open-source standards are public and security-audited.</td><td><strong>2</strong>. LUKS encryption of large drives takes time.</td></tr><tr><td><strong>3</strong>. LUKS is highly supported in Linux, making it easy to install and use.</td><td></td></tr><tr><td><strong>4</strong>. LUKS hides volumes for added security.</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter td_btn_small"><a class="wp-block-button__link wp-element-button" href="https://www.redhat.com/sysadmin/disk-encryption-luks" target="_blank" rel="nofollow noreferrer noopener"><strong><strong>Linux Unified Key Setup</strong></strong> &#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="dm"><strong>8. Dm-crypt</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRc3bdFhiEm2h3vvwury__l6_xnosDcCQTndQscQwuqhUgCN-1gs_tcXhtKM5U1nlGatb0HvLmIWdYgqLMB0vBpJsYK9d2k22QvbFHdCbuozxF94giuFkkLZPyDzc-nh2A3gdYdw_eeh7ZHbPUfkIBRlP34q0ioixvBwSIzutA8HI3lqE0rkDhWfiR2qOW/s16000/Capture%20(55).webp" alt=""/><figcaption class="wp-element-caption"><strong>Dm-crypt</strong></figcaption></figure>
</div>


<p>Block devices are transparently encrypted using the kernel Crypto API by Device-Mapper&#8217;s &#8220;crypt&#8221; target. Some Linux distributions permit the use of dm-crypt on the root file system.</p>



<p>These operating system distributions usually use initrd to ask the user to enter a passphrase at the console or insert an intelligent card before starting the system.</p>



<p>In Linux kernel versions 2.6 and later, as well as DragonFly BSD, dm-crypt is a transparent block device encryption subsystem. </p>



<p>It is a component of the device mapper infrastructure and uses the kernel&#8217;s Crypto API&#8217;s cryptographic routines.</p>



<p>Device mapper targets can be stacked on top of one another, and dm-crypt is implemented as one of them. </p>



<p>Consequently, it can encrypt entire disks (including removable media), partitions, software RAID volumes, logical volumes, and files.</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>Since Ciphershed is open-source, anyone can access its source code.</li>



<li>The cipher shed interface lets you unmount the virtual disk after use.</li>



<li>Virtual volumes cannot be accessed without a password.</li>



<li>For brute force protection, volumes are encrypted with strong ciphers.</li>



<li>You can also develop a covert operating system that is accessible when needed and invisible.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What is Good?</strong></th><th>What Could Be Better?</th></tr></thead><tbody><tr><td><strong>1</strong>. Enables full disk encryption.&nbsp;</td><td><strong>1</strong>. All encryption parameters must be handled with extreme care.</td></tr><tr><td><strong>2</strong>.dm-crypt secures disks from illegal access.</td><td><strong>2</strong>. There is only one encryption key and no way to change it.</td></tr><tr><td><strong>3</strong>. Encrypts partitions smoothly, minimizing OS disturbances.</td><td></td></tr><tr><td><strong>4</strong>. Open-source solutions are transparent and security-audited</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-crypt.html" target="_blank" rel="nofolllow noreferrer noopener nofollow"><strong><strong>Dm-crypt</strong></strong>&#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="nord"><strong>9. NordLocker</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaK008aqQCdpI1J0jhmfKr5qUIlBIl2-GlHnQKN8z35nDXSITjm1sHEnDqa6K0sZyXn55USF6lpGmDW7g7vZYqlPm1OTgV4tTwE2gGs2-KeGGXU37FzLklDJgwUCk4ei5yt5JTzRaGpEk6jDq3Gex-ITA4oO4Am4DOl9B4WBgOYDNsxhtc-p4Mi2ZuSW0y/s16000/Capture%20(56).webp" alt="Full Disk Encryption Tools"/><figcaption class="wp-element-caption"><strong>NordLocker</strong></figcaption></figure>
</div>


<p>NordLocker is an easy-to-use tool for file encryption. It enables secure data storage and sharing. NordLocker uses strong encryption to secure our files <span style="box-sizing: border-box; margin: 0px; padding: 0px;">by dragging and dropping them </span>to a Locker folder.</p>



<p>A locker is an encrypted folder in NordLockers. Along with the configuration information, it includes your files. </p>



<p>The files you store in a locker are only accessible by you unless you grant access to others using the &#8220;Add user access&#8221; function in the NordLocker application.</p>



<p>NordLocker was designed specifically to encrypt files. It can and excels at encrypting any file format. Public-key cryptography makes it safe to share files with strangers because your password is never revealed.</p>



<p><span style="box-sizing: border-box; margin: 0px; padding: 0px;">NordLocker encrypts and decrypts your files using Argon2, AES256, ECC (with XChaCha20, EdDSA, and Poly1305 ciphers), and other advanced cryptography ciphers</span>. </p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>Easily sync and safeguard files</li>



<li>Available via Android, iOS, Windows, Mac OS, and Linux browser apps.</li>



<li>Create lockers and folders for your files, then store them locally or online.</li>



<li>Any size file can be encrypted.</li>



<li>Your Nord Locker cloud files are always encrypted.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What is Good?</strong></th><th><strong>What Could Be Better ?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>. an elegant drag-and-drop layout</td><td><strong>1</strong>. Neither Linux nor mobile clients</td></tr><tr><td><strong>2</strong>. Storage of encrypted files on desktops and the cloud</td><td><strong>2</strong>. A two-factor authentication option is not available.</td></tr><tr><td><strong>3</strong>. Directly access lockers to open, modify, and save files.</td><td></td></tr><tr><td><strong>4</strong>. It is safe for users to share encrypted files.</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://nordlocker.com/download/windows/" target="_blank" rel="nofollow noreferrer noopener"><strong><strong>NordLocker</strong></strong>&#8211;<strong><strong> </strong></strong>Download</a></div>
</div>



<h2 class="wp-block-heading" id="cip"><strong>10. Ciphershed</strong></h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU6IvT1wICjUtBXW87qRjFLQdXFpDiP1RN_HtFP9runC4QlgFGKlCU_o3JZz8OYCtit5xxtDQbmw0WmAY6nPQE2qo2tddgCSeT645TUdoW8aEXPRX1A_A1v2zSkCTGrsK4uXgktwuYNAZwn74I6l2VAWXnYnLTeilyXcaXj-Eq7VGfy2rDQyZxPqXUa2PO/s16000/Capture%20(57).webp" alt=""/><figcaption class="wp-element-caption"><strong>Ciphershed</strong></figcaption></figure>
</div>


<p>Ciphershed is a free encryption tool for protecting the privacy and security of our data. It was originally a fork of the TrueCrypt project. Cross-platform Ciphershed is offered for Windows, Mac OS X, and GNU/Linux.</p>



<p>Because there are no packages for CipherShed on OS X or Linux, users of those operating systems must compile it. Your files and data can be encrypted using encrypted containers that you make with CipherShed.</p>



<p>Solid and secure, this encryption can be used for various files, including financial records, priceless information, sensitive information, and other things you want to keep private.</p>



<p>CipherShed is a safe and sophisticated encryption tool that will help you securely store sensitive data and encrypt it so that no one else can access it without your permission.</p>



<p><strong>Features</strong></p>



<ul class="wp-block-list">
<li>Since Ciphershed is open-source, anyone can access its source code.</li>



<li>The cipher shed interface lets you unmount the virtual disk after use.</li>



<li>Virtual volumes cannot be accessed without a password.</li>



<li>Volumes are encrypted with solid ciphers to prevent brute-force attacks.</li>



<li>You can also develop a covert operating system that is accessible when needed and invisible.</li>
</ul>



<figure class="wp-block-table is-style-stripes"><table><thead><tr><th><strong>What is Good?</strong></th><th><strong>What Could Be Better?</strong></th></tr></thead><tbody><tr><td><strong>1</strong>. It is an open-source program that is completely free.</td><td><strong>1</strong>. It is difficult to improve key derivation.&nbsp;</td></tr><tr><td><strong>2</strong>. It is compatible with Windows, OS X, and Linux.</td><td><strong>2</strong>.Inexperienced users face 151-page steps.</td></tr><tr><td><strong>3</strong>. Ciphershed&#8217;s portable installer just extracts files.</td><td></td></tr><tr><td><strong>4</strong>. For best results, advanced users should use Ciphershed.</td><td></td></tr></tbody></table></figure>



<div class="wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex">
<div class="wp-block-button aligncenter"><a class="wp-block-button__link wp-element-button" href="https://www.ciphershed.org/download/" target="_blank" rel="nofollow noreferrer noopener"><strong><strong>Ciphershed</strong></strong>&#8211;<strong><strong> </strong></strong>Download</a></div>
</div>
<p>The post <a href="https://cybersecuritynews.com/best-full-disk-encryption-tools/">10 Best Full Disk Encryption Tools in 2026</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
]]></content:encoded>
					
		
		
		<media:content url="https://i1.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidhFu8EjgBu5Fu-N2l_8niLIzLIhLTQerly1syDm-Pub7th4hMcjsS3WGXdCmhnruWlIIzgwi5Q95bLNFAzgWTaYZOkcNIR5JRybct7unBUj1uHa1oUvFxAQjA1V_A5egV6urbsCGnV-23vweLFf9qBaRANUrODslLaIjp7dcxzZRF1D4l79Gsb5aWI4ma/s16000/Best%20Full%20Disk%20Encryption%20Tools.webp?ssl=1" medium="image"></media:content>
            <post-id xmlns="com-wordpress:feed-additions:1">12739</post-id>	</item>
	</channel>
</rss>
