Virus Bulletin

@VirusBulletin@infosec.exchange
2.5K Followers
57 Following
2K Posts
Security information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference.

Sophistication or missed opportunity?

Join Justin Lentz (Solis Security) and Nicole Fishbein (Intezer) at VB2025 in Berlin as they unpack an unusual case of long-term zero-day exploitation.

πŸ“… Sept 26 | 11:00–11:30 | Green Room

Find out more about this talk πŸ‘‰https://tinyurl.com/mudadsjb

Morphisec's Michael Gorelik looks into a new version of the Matanbuchus loader. The updated version introduces advanced techniques such as new communication protocols, in-memory stealth, enhanced obfuscation, support for WQL queries, CMD & PowerShell reverse shells. https://www.morphisec.com/blog/ransomware-threat-matanbuchus-3-0-maas-levels-up/
The Seqrite Labs APT-Team has identified and tracked a cluster of espionage-oriented operations conducting campaigns across multiple Asian jurisdictions including China, Hong Kong & Pakistan. This threat entity usually deploys CV-themed decoy documents. https://www.seqrite.com/blog/ung0002-espionage-campaigns-south-asia/
Proofpoint Threat Research identified multiple China-aligned threat actors specifically targeting Taiwanese organizations within the semiconductor industry. In all cases, the motive was most likely espionage. https://www.proofpoint.com/us/blog/threat-insight/phish-china-aligned-espionage-actors-ramp-up-taiwan-semiconductor-targeting

We are incredibly proud to have assisted Europol πŸ‡ͺπŸ‡Ί in a global operation against the notorious pro-Russian #hacktivist group #NoName057(16) πŸ₯³

Over the years, NoName057(16) has carried out thousands of #DDoS attacks against websites of western organisations and national critical infrastructure πŸ›οΈ , aiming to spread pro-Russian ideology πŸ‡·πŸ‡Ί and stir up distrust and uncertainty in the western hemisphere 🌎 πŸ˜΅β€πŸ’«

https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network

Global operation targets NoName057(16) pro-Russian cybercrime network – The offenders targeted Ukraine and supporting countries, including many EU Member States | Europol

The offenders targeted Ukraine and supporting countries, including many EU Member States. Between 14 and 17 July, a joint international operation, known as Eastwood and coordinated by Europol, targeted the pro-Russian cybercrime network NoName057(16). The actions led to the shutdown of several hundred servers worldwide, while the group's central server infrastructure was taken offline.

Europol
AhnLab researchers present statistics, trends, and case information on infostealer malware - including distribution volume, distribution methods and disguises - based on data collected and analysed in June 2025. https://asec.ahnlab.com/en/89033/
Trelix's Charles Crofford provides a detailed technical analysis of a SquidLoader sample targeting financial services institutions in Hong Kong, highlighting its key features and indicators of compromise, including advanced anti-debugging tricks. https://www.trellix.com/blogs/research/threat-analysis-squidLoader-still-swimming-under-the-radar/
ESET researchers provide an overview and analysis of the most relevant forks of AsyncRAT, drawing connections between them & showing how they have evolved. The simplicity and open-source nature of AsyncRAT has made it a popular choice among cybercriminals. https://www.welivesecurity.com/en/eset-research/unmasking-asyncrat-navigating-labyrinth-forks/

2025-07-15 (Tuesday): Tracking #SmartApeSG

The SmartApeSG script injected into page from compromised website leads to #ClickFix style fake verification page. ClickFix-ing you way through this leads to a #NetSupportRAT infection.

Compromised site (same as yesterday):

- medthermography[.]com

URLs for ClickFix style fake verification page:

- warpdrive[.]top/jjj/include.js
- warpdrive[.]top/jjj/index.php?W11WzmLj
- warpdrive[.]top/jjj/buffer.js?409a8bdbd9

Running the script for NetSupport RAT:

- sos-atlanta[.]com/lal.ps1
- sos-atlanta[.]com/lotu.zip?l=4773

#NetSupport RAT server (same as yesterday):

- 185.163.45[.]87:443

Your research deserves a global stage. The Last-Minute CFP is now open!

We’re excited to open our Call for Last-Minute Papers for hot and emerging topics! Now’s your chance to share new insights, research, or case studies with the global security community.

πŸ“… Don’t wait, submit before 24 August

πŸ‘‰ https://tinyurl.com/2ny4jph8

Γ—
Palo Alto Networks' Rem Dudas & Noa Dekel share hunting tips & mitigation strategies for ClickFix campaigns and provide an inside view of some of the most prominent ClickFix campaigns they've seen so far in 2025. https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/