SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 91

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Infiniti Stealer: a new macOS infostealer using ClickFix and Python/Nuitka   Converging Interests: Analysis of Threat Clusters Targeting a Southeast Asian Government RoadK1ll: A WebSocket Based Pivoting Implant    axios Compromised: npm Supply Chain Attack via Dependency Injection   […]

Image or Malware? Read until the end and answer in comments :)

A malicious email delivered a .cmd malware that escalates privileges, bypasses antivirus, downloads payloads, sets persistence, and self-deletes. I received this email from a friend to make an analysis. First, let me express my thanks to Janô Falkowski Burkard for this amazing contribution. A little context, He received an email that was really strange and […]

Qilin ransomware group claims the hack of German political party Die Linke

Qilin ransomware claims it stole data from Germany’s Die Linke and threatens to leak it; the party confirmed the incident, but not a breach. The Qilin ransomware group claims it stole data from Die Linke, a German political party, and is threatening to release it. Die Linke is a left-wing political party in Germany. Its […]

U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in TrueConf Client, tracked as CVE-2026-3502 (CVSS score of 7.8), to its Known Exploited Vulnerabilities (KEV) catalog. TrueConf is a videoconferencing platform often used in secure, offline […]

European Commission breach exposed data of 30 EU entities, CERT-EU says

CERT-EU says a European Commission cloud hack exposed data from 30 EU entities and links the breach to the TeamPCP group. CERT-EU attributed a European Commission cloud breach to the TeamPCP threat group, revealing that data from at least 30 EU entities was exposed. The incident was publicly disclosed on March 27 after inquiries confirmed […]

Reintroducing TarantuLabs – free web app CTF labs!

I got into cybersecurity 4 years ago – back when I was still doing night shifts as a security guard. During my learning, I remember that the THM and HTB paywalls were fairly annoying.

4 years later, with a few years as a security researcher on my CV, I thought it’s time to give back.

TarantuLabs is a site where you can practice your web app bug bounty skills, for free. Currently there are 12 labs there, and more will be added every week!

The labs are AI generated, but each have passed a comprehensive test suite to make sure they work, and for the first batch I also solved them manually and verified they work as well.

The labs load client-side, meaning you don’t need to wait for a Docker or VM to boot up somewhere. Just wait for a few seconds in your browser for all the dependencies to be installed, and you’re good to go! This approach solves multiple problems I’ve had when I first started this project, and I’ll elaborate more below. Read if you’re interested. If not, go ahead to:

www.tarantulabs.com

For those who’ve stayed and who may remember when I first started – and then scrapped – this project, here were my challenges, and how I solved each of them:

  1. An AI bottleneck: a year ago, the models that generated the labs, have created dull, boring labs, which were either technically unsolvable, or solved via a single basic SQL query.
  2. Cloud costs: using AI to generate the labs solved the cost of work of generating these labs. But hosting them proved to be more expensive than I expected, and ended up costing me enough for me to shut this down.
  3. Security: even if I were to bear the cloud costs, I still didn’t have the time to build proper security and virtualization infra to make sure no user can access another user’s resources, and escalate from there.
  4. And, honestly, UX: even after I finished the previous iteration, I found myself stopping and looking at the site and… didn’t really want to use it.

These problems, primarily the AI bottleneck one, have forced me to wait almost a year for the models to be capable enough to produce labs worth solving. After that, here were my solutions to the problems:

  1. AI bottleneck was solved. Better, more consistent, and diverse labs, which were actually solvable and interesting.
  2. Cloud costs and security were solved with the decision to run the labs client-side. These labs are run in your browser via an iframe – so I bear no cloud costs, and there’s no real security risk of any user breaking into another user’s resource.
  3. Moving away from clumsily routing from my site, to the cloud, to spinning up the labs, which would all take a few mins – to loading everything client-side, made everything buttery smooth. Also, the UI now looks better.

The downside of moving everything to be client-side is that I had to give up on certain vulnerability classes and specific labs I had in mind, so bear that in mind.

I hope you like it and try it out, and if you know anyone wishing to break into the field, go ahead and share it with them!

submitted by /u/dvnci1452
[link] [comments]

North Korea–linked hackers drain $285M from Drift in sophisticated attack

Drift lost $285M in a sophisticated attack, likely by North Korea, who used nonce-based tricks to gain control and quickly drain funds Drift suffered a $285 million cryptocurrency heist in a highly sophisticated attack likely linked to North Korea. Threat actors used durable nonce accounts to pre-sign and delay transactions, while also compromising multisig approvals […]

CrystalX RAT: new MaaS malware combines spyware, stealer, and remote access

CrystalX RAT, a new sophisticated MaaS malware, combines spyware, data theft, and remote access, allowing attackers to monitor victims. In March 2026, Kaspersky researchers uncovered a Telegram-based campaign promoting a previously unknown malware sold as a MaaS with three subscription tiers. The Trojan offers a wide range of features, including RAT capabilities, data theft, keylogging, […]

Pro-Iran Handala group breached Israeli defence contractor PSK Wind Technologies

Iran-linked hackers claim to have breached Israeli air defence contractor PSK Wind, which develops command and control systems. Pro-Iran Handala group announced on April 2 that it breached PSK Wind Technologies, an Israeli engineering and IT firm specializing in integrated systems for defense and critical communications, including command and control solutions. Handala appears as a […]