Comprehensive Malware Newsletter: Round 54
TL;DR
This newsletter roundup features critical insights into the latest malware threats and cybersecurity research. Key highlights include the emergence of new malware variants, advanced threat analysis, and innovative detection techniques.
Main Content
Security Affairs Malware Newsletter: Round 54
The Security Affairs Malware Newsletter: Round 54 provides a comprehensive overview of the latest developments and research in the global malware landscape. This edition includes a curated selection of top articles and research findings to keep you informed about the ever-evolving cybersecurity threats.
Key Articles and Research Findings
- KongTuke FileFix Leads to New Interlock RAT Variant
- Code Highlighting with Cursor AI for $500,000
- Contagious Interview Campaign Escalates
- Threat Analysis: SquidLoader – Still Swimming Under the Radar
- Konfety Returns: Classic Mobile Threat with New Evasion Techniques
- The Linuxsys Cryptominer
- From a Teams Call to a Ransomware Threat: Matanbuchus 3.0 MaaS Levels Up
- MaaS Operation Using Emmenhtal and Amadey Linked to Threats Against Ukrainian Entities
- Unmasking AsyncRAT: Navigating the Labyrinth of Forks
- Behind the Clouds: Novel Covert C2 Communication Targeting Southeast Asian Governments
- Ongoing SonicWall SMA Exploitation Campaign Using the OVERSTEP Backdoor
- UAC-0001 Cyberattacks on Security and Defense Sector Using LAMEHUG Software Tool
- New Phobos and 8base Ransomware Decryptor Recovers Files for Free
- IoT Malware Network Traffic Detection Using Deep Learning and GraphSAGE Models
- LLMalMorph: Generating Variant Malware Using Large-Language-Models
- ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection
- A Delayed Malware Propagation Model Under a Distributed Patching Mechanism: Stability Analysis
- Systematic Review: Malware Detection and Classification in Cybersecurity
Follow Security Affairs for More Updates
Stay connected with Security Affairs for the latest in cybersecurity news and analysis:
About the Author
For the full article, visit: Security Affairs Malware Newsletter: Round 54
Conclusion
The Security Affairs Malware Newsletter: Round 54 provides a comprehensive overview of the latest malware threats and cybersecurity research. Stay informed and vigilant to protect against evolving cyber threats.
References
-
The DFIR Report (2025, July 14). “KongTuke FileFix Leads to New Interlock RAT Variant”. The DFIR Report. Retrieved 2025-07-20. ↩︎
-
SecureList (2025). “Code highlighting with Cursor AI for $500,000”. SecureList. Retrieved 2025-07-20. ↩︎
-
Socket (2025). “Contagious Interview Campaign Escalates With 67 Malicious npm Packages”. Socket. Retrieved 2025-07-20. ↩︎
-
Trellix (2025). “Threat Analysis: SquidLoader – Still Swimming Under the Radar”. Trellix. Retrieved 2025-07-20. ↩︎
-
Zimperium (2025). “Konfety Returns: Classic Mobile Threat with New Evasion Techniques”. Zimperium. Retrieved 2025-07-20. ↩︎
-
VulnCheck (2025). “The Linuxsys Cryptominer”. VulnCheck. Retrieved 2025-07-20. ↩︎
-
Morphisec (2025). “From a Teams Call to a Ransomware Threat: Matanbuchus 3.0 MaaS Levels Up”. Morphisec. Retrieved 2025-07-20. ↩︎
-
Talos Intelligence (2025). “MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities”. Talos Intelligence. Retrieved 2025-07-20. ↩︎
-
ESET (2025). “Unmasking AsyncRAT: Navigating the labyrinth of forks”. ESET. Retrieved 2025-07-20. ↩︎
-
Palo Alto Networks (2025). “Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication”. Palo Alto Networks. Retrieved 2025-07-20. ↩︎
-
Google Cloud (2025). “Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor”. Google Cloud. Retrieved 2025-07-20. ↩︎
-
CERT-UA (2025). “UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software tool”. CERT-UA. Retrieved 2025-07-20. ↩︎
-
BleepingComputer (2025). “New Phobos and 8base ransomware decryptor recover files for free”. BleepingComputer. Retrieved 2025-07-20. ↩︎
-
arXiv (2025). “IoT Malware Network Traffic Detection using Deep Learning and GraphSAGE Models”. arXiv. Retrieved 2025-07-20. ↩︎
-
arXiv (2025). “LLMalMorph: On The Feasibility of Generating Variant Malware using Large-Language-Models”. arXiv. Retrieved 2025-07-20. ↩︎
-
arXiv (2025). “ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection”. arXiv. Retrieved 2025-07-20. ↩︎
-
MDPI (2025). “A Delayed Malware Propagation Model Under a Distributed Patching Mechanism: Stability Analysis”. MDPI. Retrieved 2025-07-20. ↩︎
-
MDPI (2025). “Systematic Review: Malware Detection and Classification in Cybersecurity”. MDPI. Retrieved 2025-07-20. ↩︎