Post

Security Affairs Malware Newsletter Round 42: Critical Updates on Global Cyber Threats

Security Affairs Malware Newsletter Round 42: Critical Updates on Global Cyber Threats

TL;DR

The Security Affairs Malware Newsletter Round 42 provides a comprehensive overview of the latest malware threats and cybersecurity research. Key highlights include malicious NPM packages targeting PayPal users, the emergence of new malware variants like ResolverRAT, and advanced threat techniques such as BPFDoor’s hidden controller. The newsletter also covers phishing campaigns, AI-assisted malware analysis, and ransomware detection methods.

Introduction

The Security Affairs Malware Newsletter Round 42 offers a curated selection of the most impactful articles and research on malware from around the world. This edition includes critical updates on various cyber threats, from malicious NPM packages to advanced persistent threats (APTs).

Latest Malware Threats

Malicious NPM Packages Targeting PayPal Users

A recent report by Fortinet highlights the discovery of malicious NPM packages designed to target PayPal users. These packages are distributed through the NPM registry and aim to steal sensitive information from unsuspecting victims. Read more

New Malware Variant: ResolverRAT

Morphisec has identified a new malware variant called ResolverRAT. This sophisticated malware is designed to evade detection and complicate analysis, making it a significant threat to cybersecurity. Read more

Cryptocurrency Theft via WhatsApp

Dr.Web reports on a new scheme involving cheap Android smartphones and WhatsApp, leading to cryptocurrency theft. This highlights the growing trend of cybercriminals targeting mobile devices for financial gain. Read more

BPFDoor’s Hidden Controller

Trend Micro discusses the use of BPFDoor’s hidden controller against targets in Asia and the Middle East. This advanced malware uses sophisticated techniques to remain undetected. Read more

Gorilla: Newly Discovered Android Malware

Catalyst has discovered a new Android malware named Gorilla. This malware is designed to steal sensitive information from infected devices. Read more

Advanced Threat Techniques

Cascading Shadows: Complex Attack Chains

Palo Alto Networks details a complex attack chain used by cybercriminals to avoid detection and complicate analysis. This technique involves multiple stages of infection and data exfiltration. Read more

IronHusky Updates MysterySnail RAT

Kaspersky reports on the IronHusky group updating the MysterySnail RAT to target Russia and Mongolia. This updated malware includes new features designed to evade detection. Read more

XorDDoS: New Controller and Infrastructure

Cisco Talos unmasks the new XorDDoS controller and infrastructure, revealing how this malware is used to launch distributed denial-of-service (DDoS) attacks. Read more

Phishing and Social Engineering

Fake PDF Converters Stealing Documents

CloudSEK reports on the use of fake PDF converters to steal more than just documents. These malicious tools are designed to trick users into downloading malware. Read more

Renewed APT29 Phishing Campaign

Check Point Research highlights a renewed phishing campaign by APT29 targeting European diplomats. This campaign uses sophisticated social engineering techniques to trick victims into revealing sensitive information. Read more

Emerging Threats and Techniques

Multi-Platform APT Attacks

Seqrite discusses the shift from HTA to MSI in multi-platform APT attacks. This change in tactics, techniques, and procedures (TTPs) allows attackers to target multiple operating systems. Read more

Slow Pisces: Targeting Developers

Palo Alto Networks reports on Slow Pisces, a new malware that targets developers with coding challenges and introduces new customized Python malware. Read more

Misuse of Node.js for Malware Delivery

Microsoft Security Blog discusses how threat actors are misusing Node.js to deliver malware and other malicious payloads, highlighting the need for vigilance in software supply chains. Read more

State-Sponsored Cyber Attacks

Mustang Panda’s Arsenal

Zscaler provides an in-depth analysis of Mustang Panda’s arsenal, including tools like ToneShell, StarProxy, PAKLOG, CorKLOG, and SplatCloak. These tools are used in state-sponsored cyber attacks. Read more Read more

State-Sponsored Actors and ClickFix

Proofpoint discusses how state-sponsored actors are using ClickFix to target victims around the world, highlighting the global reach of these threats. Read more

AI and Machine Learning in Cybersecurity

Large Language Model (LLM) for Software Security

A recent arXiv paper explores the use of large language models (LLMs) for software security, including code analysis, malware analysis, and reverse engineering. Read more

AI-Assisted Malware Analysis

Another arXiv paper discusses the use of AI in malware analysis, specifically with the tool R2AI. This highlights the growing role of AI in cybersecurity. Read more

Ransomware Detection Using Machine Learning

MDPI publishes a study on a machine learning-based ransomware detection method that uses format-preserving encryption to neutralize attackers’ techniques. Read more

AOAFS: Malware Detection System

MDPI also reports on AOAFS, a malware detection system using an improved arithmetic optimization algorithm. This system aims to enhance the accuracy and efficiency of malware detection. Read more

Conclusion

The Security Affairs Malware Newsletter Round 42 provides a comprehensive overview of the latest malware threats and cybersecurity research. As cyber threats continue to evolve, it is crucial for organizations and individuals to stay informed and proactive in their defense strategies.

Follow Us

Stay updated with the latest cybersecurity news and insights by following Security Affairs on Twitter, Facebook, and Mastodon. For more information, visit SecurityAffairs and connect with Pierluigi Paganini.

References

[^14]: Zscaler (2025). “[Latest Mustang Panda Arsenal: ToneShell and StarProxy P1](https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-toneshell-and-starproxy-p1)”. Zscaler Blog. Retrieved 2025-04-20.
[^15]: Zscaler (2025). “[Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak P2](https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-paklog-corklog-and-splatcloak-p2)”. Zscaler Blog. Retrieved 2025-04-20.
This post is licensed under CC BY 4.0 by the author.