Post

Comprehensive Malware Newsletter: Round 54

Comprehensive Malware Newsletter: Round 54

TL;DR

This newsletter roundup features critical insights into the latest malware threats and cybersecurity research. Key highlights include the emergence of new malware variants, advanced threat analysis, and innovative detection techniques.

Main Content

Security Affairs Malware Newsletter: Round 54

The Security Affairs Malware Newsletter: Round 54 provides a comprehensive overview of the latest developments and research in the global malware landscape. This edition includes a curated selection of top articles and research findings to keep you informed about the ever-evolving cybersecurity threats.

Key Articles and Research Findings

  1. KongTuke FileFix Leads to New Interlock RAT Variant
    • Explore the latest findings on how KongTuke FileFix has led to the emergence of a new Interlock RAT variant. Read more1
  2. Code Highlighting with Cursor AI for $500,000
    • Discover the intricacies of a crypto heist involving Cursor AI’s open-source package. Read more2
  3. Contagious Interview Campaign Escalates
    • Learn about the escalation of the Contagious Interview Campaign with 67 malicious npm packages and a new malware loader. Read more3
  4. Threat Analysis: SquidLoader – Still Swimming Under the Radar
    • Dive into the threat analysis of SquidLoader, which continues to operate undetected. Read more4
  5. Konfety Returns: Classic Mobile Threat with New Evasion Techniques
    • Understand the resurgence of Konfety with advanced evasion techniques. Read more5
  6. The Linuxsys Cryptominer
    • Get insights into the Linuxsys Cryptominer and its impact. Read more6
  7. From a Teams Call to a Ransomware Threat: Matanbuchus 3.0 MaaS Levels Up
    • Explore how a Teams call can lead to a ransomware threat with Matanbuchus 3.0 MaaS. Read more7
  8. MaaS Operation Using Emmenhtal and Amadey Linked to Threats Against Ukrainian Entities
    • Learn about the MaaS operation targeting Ukrainian entities with Emmenhtal and Amadey. Read more8
  9. Unmasking AsyncRAT: Navigating the Labyrinth of Forks
    • Unmask the complexities of AsyncRAT and its various forks. Read more9
  10. Behind the Clouds: Novel Covert C2 Communication Targeting Southeast Asian Governments
    • Discover the novel covert C2 communication techniques used to target governments in Southeast Asia. Read more10
  11. Ongoing SonicWall SMA Exploitation Campaign Using the OVERSTEP Backdoor
    • Stay updated on the ongoing SonicWall SMA exploitation campaign utilizing the OVERSTEP backdoor. Read more11
  12. UAC-0001 Cyberattacks on Security and Defense Sector Using LAMEHUG Software Tool
    • Explore the UAC-0001 cyberattacks targeting the security and defense sector with the LAMEHUG software tool. Read more12
  13. New Phobos and 8base Ransomware Decryptor Recovers Files for Free
    • Learn about the new Phobos and 8base ransomware decryptor that allows victims to recover files for free. Read more13
  14. IoT Malware Network Traffic Detection Using Deep Learning and GraphSAGE Models
    • Discover innovative methods for detecting IoT malware network traffic using deep learning and GraphSAGE models. Read more14
  15. LLMalMorph: Generating Variant Malware Using Large-Language-Models
    • Explore the feasibility of generating variant malware using large language models. Read more15
  16. ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection
    • Learn about ADAPT, a pseudo-labeling approach to combat concept drift in malware detection. Read more16
  17. A Delayed Malware Propagation Model Under a Distributed Patching Mechanism: Stability Analysis
    • Understand the stability analysis of a delayed malware propagation model under a distributed patching mechanism. Read more17
  18. Systematic Review: Malware Detection and Classification in Cybersecurity
    • Get a systematic review of malware detection and classification techniques in cybersecurity. Read more18

Follow Security Affairs for More Updates

Stay connected with Security Affairs for the latest in cybersecurity news and analysis:

About the Author

For the full article, visit: Security Affairs Malware Newsletter: Round 54

Conclusion

The Security Affairs Malware Newsletter: Round 54 provides a comprehensive overview of the latest malware threats and cybersecurity research. Stay informed and vigilant to protect against evolving cyber threats.

References

  1. The DFIR Report (2025, July 14). “KongTuke FileFix Leads to New Interlock RAT Variant”. The DFIR Report. Retrieved 2025-07-20. ↩︎

  2. SecureList (2025). “Code highlighting with Cursor AI for $500,000”. SecureList. Retrieved 2025-07-20. ↩︎

  3. Socket (2025). “Contagious Interview Campaign Escalates With 67 Malicious npm Packages”. Socket. Retrieved 2025-07-20. ↩︎

  4. Trellix (2025). “Threat Analysis: SquidLoader – Still Swimming Under the Radar”. Trellix. Retrieved 2025-07-20. ↩︎

  5. Zimperium (2025). “Konfety Returns: Classic Mobile Threat with New Evasion Techniques”. Zimperium. Retrieved 2025-07-20. ↩︎

  6. VulnCheck (2025). “The Linuxsys Cryptominer”. VulnCheck. Retrieved 2025-07-20. ↩︎

  7. Morphisec (2025). “From a Teams Call to a Ransomware Threat: Matanbuchus 3.0 MaaS Levels Up”. Morphisec. Retrieved 2025-07-20. ↩︎

  8. Talos Intelligence (2025). “MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities”. Talos Intelligence. Retrieved 2025-07-20. ↩︎

  9. ESET (2025). “Unmasking AsyncRAT: Navigating the labyrinth of forks”. ESET. Retrieved 2025-07-20. ↩︎

  10. Palo Alto Networks (2025). “Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication”. Palo Alto Networks. Retrieved 2025-07-20. ↩︎

  11. Google Cloud (2025). “Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor”. Google Cloud. Retrieved 2025-07-20. ↩︎

  12. CERT-UA (2025). “UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software tool”. CERT-UA. Retrieved 2025-07-20. ↩︎

  13. BleepingComputer (2025). “New Phobos and 8base ransomware decryptor recover files for free”. BleepingComputer. Retrieved 2025-07-20. ↩︎

  14. arXiv (2025). “IoT Malware Network Traffic Detection using Deep Learning and GraphSAGE Models”. arXiv. Retrieved 2025-07-20. ↩︎

  15. arXiv (2025). “LLMalMorph: On The Feasibility of Generating Variant Malware using Large-Language-Models”. arXiv. Retrieved 2025-07-20. ↩︎

  16. arXiv (2025). “ADAPT: A Pseudo-labeling Approach to Combat Concept Drift in Malware Detection”. arXiv. Retrieved 2025-07-20. ↩︎

  17. MDPI (2025). “A Delayed Malware Propagation Model Under a Distributed Patching Mechanism: Stability Analysis”. MDPI. Retrieved 2025-07-20. ↩︎

  18. MDPI (2025). “Systematic Review: Malware Detection and Classification in Cybersecurity”. MDPI. Retrieved 2025-07-20. ↩︎

This post is licensed under CC BY 4.0 by the author.