<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Geeks for your information - Kaspersky Security Blog]]></title>
		<link>https://www.geeks.fyi/</link>
		<description><![CDATA[Geeks for your information - https://www.geeks.fyi]]></description>
		<pubDate>Tue, 28 Apr 2026 20:35:21 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[PhantomRPC: A new privilege escalation technique in Windows RPC]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21907</link>
			<pubDate>Fri, 24 Apr 2026 10:53:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21907</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Intro</span><br />
<br />
Windows Interprocess Communication (IPC) is one of the most complex technologies within the Windows operating system. At the core of this ecosystem is the Remote Procedure Call (RPC) mechanism, which can function as a standalone communication channel or as the underlying transport layer for more advanced interprocess communication technologies. Because of its complexity and widespread use, RPC has historically been a rich source of security issues. Over the years, researchers have identified numerous vulnerabilities in services that rely on RPC, ranging from local privilege escalation to full remote code execution.<br />
<br />
In this research, I present a new vulnerability in the RPC architecture that enables a novel local privilege escalation technique in all Windows versions. This technique enables processes with impersonation privileges to elevate their permissions to SYSTEM level. Although this vulnerability differs fundamentally from the “Potato” exploit family, Microsoft has not issued a patch despite proper disclosure.<br />
<br />
I will demonstrate five different exploitation paths that show how privileges can be escalated from various local or network service contexts to SYSTEM or high-privileged users. Some techniques rely on coercion, some require user interaction and some take advantage of background services. As this issue stems from an architectural weakness, the number of potential attack vectors is effectively unlimited; any new process or service that depends on RPC could introduce another possible escalation path. For this reason, I also outline a methodology for identifying such opportunities.<br />
<br />
Finally, I examine possible detection strategies, as well as defensive approaches that can help mitigate such attacks.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">MSRPC</span><br />
<br />
Microsoft RPC (Remote Procedure Call) is a Windows technology that enables communication between two processes. It enables one process to invoke functions that are implemented in another process, even though they are running in different execution contexts.<br />
<br />
<a href="https://securelist.com/phantomrpc-rpc-vulnerability/119428/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Intro</span><br />
<br />
Windows Interprocess Communication (IPC) is one of the most complex technologies within the Windows operating system. At the core of this ecosystem is the Remote Procedure Call (RPC) mechanism, which can function as a standalone communication channel or as the underlying transport layer for more advanced interprocess communication technologies. Because of its complexity and widespread use, RPC has historically been a rich source of security issues. Over the years, researchers have identified numerous vulnerabilities in services that rely on RPC, ranging from local privilege escalation to full remote code execution.<br />
<br />
In this research, I present a new vulnerability in the RPC architecture that enables a novel local privilege escalation technique in all Windows versions. This technique enables processes with impersonation privileges to elevate their permissions to SYSTEM level. Although this vulnerability differs fundamentally from the “Potato” exploit family, Microsoft has not issued a patch despite proper disclosure.<br />
<br />
I will demonstrate five different exploitation paths that show how privileges can be escalated from various local or network service contexts to SYSTEM or high-privileged users. Some techniques rely on coercion, some require user interaction and some take advantage of background services. As this issue stems from an architectural weakness, the number of potential attack vectors is effectively unlimited; any new process or service that depends on RPC could introduce another possible escalation path. For this reason, I also outline a methodology for identifying such opportunities.<br />
<br />
Finally, I examine possible detection strategies, as well as defensive approaches that can help mitigate such attacks.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">MSRPC</span><br />
<br />
Microsoft RPC (Remote Procedure Call) is a Windows technology that enables communication between two processes. It enables one process to invoke functions that are implemented in another process, even though they are running in different execution contexts.<br />
<br />
<a href="https://securelist.com/phantomrpc-rpc-vulnerability/119428/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[The iPhone — invincible no more: a look at DarkSword and Coruna]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21855</link>
			<pubDate>Sat, 18 Apr 2026 06:28:19 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21855</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">The emergence of DarkSword and Coruna — new malware targeting iOS — shows exactly how government intelligence tools are being repurposed as weapons for cybercriminals. We break down how these attacks work, why they’re so dangerous, and what you can do to not get infected.</span><br />
 <br />
DarkSword and Coruna are two new tools for invisible attacks on iOS devices. These attacks require no user interaction and are already being actively used by bad actors in the wild. Before these threats emerged, most iPhone users didn’t have to lose sleep over their data security. Protection was really only a major concern for a narrow group — politicians, activists, diplomats, high-level business execs, and others who handle extremely sensitive data — who might be targeted by foreign intelligence agencies. We’ve <a href="https://www.kaspersky.com/blog/predator-spyware-ios-recording-indicator-bypass/55463/" target="_blank" rel="noopener" class="mycode_url">covered sophisticated spyware</a> used against such a group before — noting how hard to come by those tools were.<br />
<br />
However, DarkSword and Coruna — discovered by researchers earlier this year — are total game-changers. This malware is being used for mass infections of everyday users. In this post, we dive into why this shift happened, why these tools are so dangerous, and how you can stay protected.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What we know about DarkSword, and how it can target your iPhone</span><br />
<br />
In mid-March 2026, three separate research teams coordinated the <a href="https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/" target="_blank" rel="noopener" class="mycode_url">release of their findings on a new spyware strain</a> called DarkSword. This tool is capable of silently hacking devices running iOS 18 without the user ever knowing something is wrong.<br />
<br />
First, we should clear up some confusion: iOS 18 isn’t as vintage as it might sound. Even though the <a href="https://en.wikipedia.org/wiki/IOS_26" target="_blank" rel="noopener" class="mycode_url">latest version is iOS 26</a>, Apple recently overhauled its versioning system, which threw everyone for a loop. They decided to jump ahead eight versions — from 18 straight to 26 — so the OS number matches the current year. Despite the jump, Apple estimates that <a href="https://developer.apple.com/support/app-store/" target="_blank" rel="noopener" class="mycode_url">about a quarter of all active devices still run iOS 18 or older</a>.<br />
<br />
<a href="https://www.kaspersky.com/blog/ios-exploits-darksword-and-coruna-in-mass-attacks/55622/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">The emergence of DarkSword and Coruna — new malware targeting iOS — shows exactly how government intelligence tools are being repurposed as weapons for cybercriminals. We break down how these attacks work, why they’re so dangerous, and what you can do to not get infected.</span><br />
 <br />
DarkSword and Coruna are two new tools for invisible attacks on iOS devices. These attacks require no user interaction and are already being actively used by bad actors in the wild. Before these threats emerged, most iPhone users didn’t have to lose sleep over their data security. Protection was really only a major concern for a narrow group — politicians, activists, diplomats, high-level business execs, and others who handle extremely sensitive data — who might be targeted by foreign intelligence agencies. We’ve <a href="https://www.kaspersky.com/blog/predator-spyware-ios-recording-indicator-bypass/55463/" target="_blank" rel="noopener" class="mycode_url">covered sophisticated spyware</a> used against such a group before — noting how hard to come by those tools were.<br />
<br />
However, DarkSword and Coruna — discovered by researchers earlier this year — are total game-changers. This malware is being used for mass infections of everyday users. In this post, we dive into why this shift happened, why these tools are so dangerous, and how you can stay protected.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What we know about DarkSword, and how it can target your iPhone</span><br />
<br />
In mid-March 2026, three separate research teams coordinated the <a href="https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/" target="_blank" rel="noopener" class="mycode_url">release of their findings on a new spyware strain</a> called DarkSword. This tool is capable of silently hacking devices running iOS 18 without the user ever knowing something is wrong.<br />
<br />
First, we should clear up some confusion: iOS 18 isn’t as vintage as it might sound. Even though the <a href="https://en.wikipedia.org/wiki/IOS_26" target="_blank" rel="noopener" class="mycode_url">latest version is iOS 26</a>, Apple recently overhauled its versioning system, which threw everyone for a loop. They decided to jump ahead eight versions — from 18 straight to 26 — so the OS number matches the current year. Despite the jump, Apple estimates that <a href="https://developer.apple.com/support/app-store/" target="_blank" rel="noopener" class="mycode_url">about a quarter of all active devices still run iOS 18 or older</a>.<br />
<br />
<a href="https://www.kaspersky.com/blog/ios-exploits-darksword-and-coruna-in-mass-attacks/55622/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[What happens in the bedroom stays in the bedroom]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21811</link>
			<pubDate>Mon, 13 Apr 2026 11:20:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21811</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Smart sex toys and their companion apps collect and process some extremely personal data. We break down the risks involved, and ways to protect your privacy.</span><br />
 <br />
The smart-home craze has connected everything — from your lightbulbs to your tea kettle — to the internet, and the adult industry isn’t sitting this one out: manufacturers are releasing more smart models than ever. While syncing a sex toy to your smartphone unlocks some cool extra features, it also opens the door to potential security and privacy headaches. The good news? You can significantly lower most of these risks just by tweaking your settings and adjusting your usage habits.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How sex-toy apps actually work</span><br />
<br />
To be clear upfront, while researchers have successfully <a href="https://internetofdon.gs/no-youre-not-going-to-cheat-at-chess-with-a-buttplug/" target="_blank" rel="noopener" class="mycode_url">hijacked</a> sex toys in controlled experiments, the odds of a hacker remotely taking over your vibrator in the real world are pretty slim. In this post, we focus on the more realistic risks: your privacy and the safety of your data.<br />
<br />
Most modern adult toys link up with the manufacturer’s app. These apps offer a range of usage options: you can control the device yourself, or hand over the remote to a partner — anywhere in the world via the internet.<br />
<br />
Beyond just basic controls, many of these apps have social features: private messaging, group chats, calls, and even video sessions. In fact, you don’t even need a physical device to use some of them; you just create an account. Because of this, some of these services have essentially evolved into niche dating platforms.<br />
<br />
The toy and your phone talk to each other via Bluetooth — with minimal risks. To handle social features or remote control, the app connects to a cloud server. This creates a constant stream of data moving back and forth: everything from commands to private messages.<br />
<br />
Here’s the catch: even if you only use the app to control your toy locally via Bluetooth, you still get connected to that cloud server. That means you’re inheriting all the security and privacy risks.<br />
<br />
<a href="https://www.kaspersky.com/blog/sex-toy-app-privacy-security-guide/55600/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Smart sex toys and their companion apps collect and process some extremely personal data. We break down the risks involved, and ways to protect your privacy.</span><br />
 <br />
The smart-home craze has connected everything — from your lightbulbs to your tea kettle — to the internet, and the adult industry isn’t sitting this one out: manufacturers are releasing more smart models than ever. While syncing a sex toy to your smartphone unlocks some cool extra features, it also opens the door to potential security and privacy headaches. The good news? You can significantly lower most of these risks just by tweaking your settings and adjusting your usage habits.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How sex-toy apps actually work</span><br />
<br />
To be clear upfront, while researchers have successfully <a href="https://internetofdon.gs/no-youre-not-going-to-cheat-at-chess-with-a-buttplug/" target="_blank" rel="noopener" class="mycode_url">hijacked</a> sex toys in controlled experiments, the odds of a hacker remotely taking over your vibrator in the real world are pretty slim. In this post, we focus on the more realistic risks: your privacy and the safety of your data.<br />
<br />
Most modern adult toys link up with the manufacturer’s app. These apps offer a range of usage options: you can control the device yourself, or hand over the remote to a partner — anywhere in the world via the internet.<br />
<br />
Beyond just basic controls, many of these apps have social features: private messaging, group chats, calls, and even video sessions. In fact, you don’t even need a physical device to use some of them; you just create an account. Because of this, some of these services have essentially evolved into niche dating platforms.<br />
<br />
The toy and your phone talk to each other via Bluetooth — with minimal risks. To handle social features or remote control, the app connects to a cloud server. This creates a constant stream of data moving back and forth: everything from commands to private messages.<br />
<br />
Here’s the catch: even if you only use the app to control your toy locally via Bluetooth, you still get connected to that cloud server. That means you’re inheriting all the security and privacy risks.<br />
<br />
<a href="https://www.kaspersky.com/blog/sex-toy-app-privacy-security-guide/55600/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[A laughing RAT: CrystalX combines spyware, stealer, and prankware features]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21704</link>
			<pubDate>Wed, 01 Apr 2026 07:19:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21704</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Introduction</span><br />
<br />
In March 2026, we discovered an active campaign promoting previously unknown malware in private Telegram chats. The Trojan was offered as a MaaS (malware‑as‑a‑service) with three subscription tiers. It caught our attention because of its extensive arsenal of capabilities. On the panel provided to third‑party actors, in addition to the standard features of RAT‑like malware, a stealer, keylogger, clipper, and spyware are also available. Most surprisingly, it also includes prankware capabilities: a large set of features designed to trick, annoy, and troll the user. Such a combination of capabilities makes it a rather unique Trojan in its category.<br />
<br />
Kaspersky’s products detect this threat as Backdoor.Win64.CrystalX.*, Trojan.Win64.Agent.*, Trojan.Win32.Agentb.gen.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Technical details</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Background</span><br />
<br />
The new malware was first mentioned in January 2026 in a private Telegram chat for developers of RAT malware. The author actively promoted their creation, called Webcrystal RAT, by attaching screenshots of the web panel. Many users observed that the panel layout was identical to that of the previously known <a href="https://securelist.com/webrat-distributed-via-github/118555/" target="_blank" rel="noopener" class="mycode_url">WebRAT</a> (also called Salat Stealer), leading them to label this malware as a copy. Additional similarities included the fact that the RAT was written in Go, and the messages from the bot selling access keys to the control panel closely matched those of the WebRAT bots.<br />
<br />
<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2026/03/31100755/crystalx-rat1.png" target="_blank" rel="noopener" class="mycode_url"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2026/03/31100755/crystalx-rat1.png" loading="lazy"  alt="[Image: crystalx-rat1.png]" class="mycode_img" /></a><br />
<br />
After some time, this malware was rebranded and received a new name, CrystalX RAT. Its promotion moved to a corresponding new channel, which is quite busy and features marketing tricks, such as access key draws and polls. Moreover, it expanded beyond Telegram: a special YouTube channel was created, aimed at marketing promotion and already containing a video review of the capabilities of this malware.<br />
<br />
<a href="https://securelist.com/crystalx-rat-with-prankware-features/119283/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Introduction</span><br />
<br />
In March 2026, we discovered an active campaign promoting previously unknown malware in private Telegram chats. The Trojan was offered as a MaaS (malware‑as‑a‑service) with three subscription tiers. It caught our attention because of its extensive arsenal of capabilities. On the panel provided to third‑party actors, in addition to the standard features of RAT‑like malware, a stealer, keylogger, clipper, and spyware are also available. Most surprisingly, it also includes prankware capabilities: a large set of features designed to trick, annoy, and troll the user. Such a combination of capabilities makes it a rather unique Trojan in its category.<br />
<br />
Kaspersky’s products detect this threat as Backdoor.Win64.CrystalX.*, Trojan.Win64.Agent.*, Trojan.Win32.Agentb.gen.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Technical details</span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Background</span><br />
<br />
The new malware was first mentioned in January 2026 in a private Telegram chat for developers of RAT malware. The author actively promoted their creation, called Webcrystal RAT, by attaching screenshots of the web panel. Many users observed that the panel layout was identical to that of the previously known <a href="https://securelist.com/webrat-distributed-via-github/118555/" target="_blank" rel="noopener" class="mycode_url">WebRAT</a> (also called Salat Stealer), leading them to label this malware as a copy. Additional similarities included the fact that the RAT was written in Go, and the messages from the bot selling access keys to the control panel closely matched those of the WebRAT bots.<br />
<br />
<a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2026/03/31100755/crystalx-rat1.png" target="_blank" rel="noopener" class="mycode_url"><img src="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2026/03/31100755/crystalx-rat1.png" loading="lazy"  alt="[Image: crystalx-rat1.png]" class="mycode_img" /></a><br />
<br />
After some time, this malware was rebranded and received a new name, CrystalX RAT. Its promotion moved to a corresponding new channel, which is quite busy and features marketing tricks, such as access key draws and polls. Moreover, it expanded beyond Telegram: a special YouTube channel was created, aimed at marketing promotion and already containing a video review of the capabilities of this malware.<br />
<br />
<a href="https://securelist.com/crystalx-rat-with-prankware-features/119283/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Ransomware now taking aim at personal backups]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21703</link>
			<pubDate>Wed, 01 Apr 2026 07:18:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21703</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Personal backups and home NAS are now in cybercriminals’ crosshairs. We break down exactly how hackers encrypt your data — and how you can stop them.</span><br />
 <br />
Today — March 31 — is World Backup Day. And every year, most people tell themselves, “I’ll get around to that tomorrow”. But even if you’re one of the responsible ones who regularly backs up their docs, photo archives, and the entire operating system — you’re still at risk. Why? Because ransomware has learned how to specifically target everyday users’ backups.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Why home users are in the crosshairs</span><br />
<br />
In the not-so-distant past, ransomware was mostly a big business problem. Attackers focused on corporate servers and enterprise backups because freezing a major company’s production process or stealing all their information and customer databases usually meant a massive payout. We’ve seen plenty of those cases over the last few years. However, the “small-fry” market has become just as tempting for cybercriminals — and here’s why.<br />
<br />
For starters, attacks are automated. Modern ransomware doesn’t need a human operating it manually. These programs scan the internet for vulnerable devices and, upon finding one, encrypt everything indiscriminately without the hacker getting involved. This means a single attacker can <a href="https://www.bleepingcomputer.com/news/security/qlocker-ransomware-shuts-down-after-extorting-hundreds-of-qnap-users/" target="_blank" rel="noopener" class="mycode_url">effortlessly hit</a> thousands of home devices.<br />
<br />
Second, because of this broad reach, the ransom demands have become more “affordable”. Regular users aren’t asked for millions, but “only” a few hundred or thousand dollars. Many people are willing to pay that amount without involving the police — especially when family archives, photos, medical records, banking documents, and other personal files are on the line, with no other copies in existence. And when you multiply those smaller payouts by thousands of victims, the hackers walk away with very tidy sums.<br />
<br />
And finally, home devices are usually sitting ducks. While corporate networks are guarded really well, the average home router most likely runs on factory settings with “admin” as the password. Many people leave their network attached storage (NAS) wide open to the internet with <a href="https://technijian.com/cyber-security/cyberattacks/millions-of-synology-nas-at-risk-patch-for-cve-2024-10443/" target="_blank" rel="noopener" class="mycode_url">zero protection</a>. It’s low-hanging fruit.<br />
<br />
<a href="https://www.kaspersky.com/blog/preventing-ransomware-attacks-on-backups-of-home-users/55532/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Personal backups and home NAS are now in cybercriminals’ crosshairs. We break down exactly how hackers encrypt your data — and how you can stop them.</span><br />
 <br />
Today — March 31 — is World Backup Day. And every year, most people tell themselves, “I’ll get around to that tomorrow”. But even if you’re one of the responsible ones who regularly backs up their docs, photo archives, and the entire operating system — you’re still at risk. Why? Because ransomware has learned how to specifically target everyday users’ backups.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Why home users are in the crosshairs</span><br />
<br />
In the not-so-distant past, ransomware was mostly a big business problem. Attackers focused on corporate servers and enterprise backups because freezing a major company’s production process or stealing all their information and customer databases usually meant a massive payout. We’ve seen plenty of those cases over the last few years. However, the “small-fry” market has become just as tempting for cybercriminals — and here’s why.<br />
<br />
For starters, attacks are automated. Modern ransomware doesn’t need a human operating it manually. These programs scan the internet for vulnerable devices and, upon finding one, encrypt everything indiscriminately without the hacker getting involved. This means a single attacker can <a href="https://www.bleepingcomputer.com/news/security/qlocker-ransomware-shuts-down-after-extorting-hundreds-of-qnap-users/" target="_blank" rel="noopener" class="mycode_url">effortlessly hit</a> thousands of home devices.<br />
<br />
Second, because of this broad reach, the ransom demands have become more “affordable”. Regular users aren’t asked for millions, but “only” a few hundred or thousand dollars. Many people are willing to pay that amount without involving the police — especially when family archives, photos, medical records, banking documents, and other personal files are on the line, with no other copies in existence. And when you multiply those smaller payouts by thousands of victims, the hackers walk away with very tidy sums.<br />
<br />
And finally, home devices are usually sitting ducks. While corporate networks are guarded really well, the average home router most likely runs on factory settings with “admin” as the password. Many people leave their network attached storage (NAS) wide open to the internet with <a href="https://technijian.com/cyber-security/cyberattacks/millions-of-synology-nas-at-risk-patch-for-cve-2024-10443/" target="_blank" rel="noopener" class="mycode_url">zero protection</a>. It’s low-hanging fruit.<br />
<br />
<a href="https://www.kaspersky.com/blog/preventing-ransomware-attacks-on-backups-of-home-users/55532/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Android trojan posing as government services and Starlink apps]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21654</link>
			<pubDate>Thu, 12 Mar 2026 10:18:52 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21654</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone. </span><br />
 <br />
To achieve their malign aims, Android malware developers have to address several challenges in a row: trick users to get inside their smartphones, dodge security software, talk victims into granting various system permissions, keep away from built-in battery optimizers that kill resource hogs, and, after all that, make sure their malware actually turns a profit. The creators of the BeatBanker — an Android‑based malware campaign recently discovered by our experts — have come up with something new for each one of these steps. The attack is (for now) aimed at Brazilian users, but the developers’ ambitions will almost certainly push them toward international expansion, so it’s worth staying on guard and studying the threat actor’s tricks. You can find a full technical analysis of the malware on <a href="https://securelist.com/beatbanker-miner-and-banker/119121/" target="_blank" rel="noopener" class="mycode_url">Securelist</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How BeatBanker infiltrates a smartphone</span><br />
<br />
The malware is distributed through specially crafted phishing pages that mimic the Google Play Store. A page that’s easily mistaken for the official app marketplace invites users to download a seemingly useful app. In one campaign, the trojan disguised itself as the Brazilian government services app, INSS Reembolso; in another, it posed as the Starlink app.<br />
<br />
<a href="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/03/11071936/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-01.png" target="_blank" rel="noopener" class="mycode_url"><img src="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/03/11071936/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-01.png" loading="lazy"  alt="[Image: beatbanker-btmob-android-malware-disguis...lso-01.png]" class="mycode_img" /></a><br />
<br />
The malicious site cupomgratisfood{.}shop does an excellent job imitating an app store. It’s just unclear why the fake INSS Reembolso appears all of three times. To be extra sure, perhaps?!<br />
<br />
The installation takes place in several stages to avoid requesting too many permissions at once and to further lull the victim’s vigilance. After the first app is downloaded and launched, it displays an interface that also resembles Google Play and simulates an update for the decoy app — requesting the user’s permission to install apps, which doesn’t look out-of-the-ordinary in context. If you grant this permission, the malware downloads additional malicious modules to your smartphone.<br />
<br />
<a href="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/03/11072036/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-02.png" target="_blank" rel="noopener" class="mycode_url"><img src="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/03/11072036/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-02.png" loading="lazy"  alt="[Image: beatbanker-btmob-android-malware-disguis...lso-02.png]" class="mycode_img" /></a><br />
<br />
After installation, the trojan simulates a decoy app update via Google Play by requesting permission to install applications while downloading additional malicious modules in the process<br />
<br />
All components of the trojan are encrypted. Before decrypting and proceeding to the next stages of infection, it checks to ensure it’s on a real smartphone and in the target country. BeatBanker immediately terminates its own process if it finds any discrepancies or detects that it’s running in emulated or analysis environments. This complicates dynamic analysis of the malware. Incidentally, the fake update downloader injects modules directly into RAM to avoid creating files on the smartphone that would be visible to security software.<br />
<br />
<a href="https://www.kaspersky.com/blog/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso/55401/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">We break down the BeatBanker trojan attack, which combines espionage, crypto theft, and mining with inventive ways to dig its heels into a smartphone. </span><br />
 <br />
To achieve their malign aims, Android malware developers have to address several challenges in a row: trick users to get inside their smartphones, dodge security software, talk victims into granting various system permissions, keep away from built-in battery optimizers that kill resource hogs, and, after all that, make sure their malware actually turns a profit. The creators of the BeatBanker — an Android‑based malware campaign recently discovered by our experts — have come up with something new for each one of these steps. The attack is (for now) aimed at Brazilian users, but the developers’ ambitions will almost certainly push them toward international expansion, so it’s worth staying on guard and studying the threat actor’s tricks. You can find a full technical analysis of the malware on <a href="https://securelist.com/beatbanker-miner-and-banker/119121/" target="_blank" rel="noopener" class="mycode_url">Securelist</a>.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How BeatBanker infiltrates a smartphone</span><br />
<br />
The malware is distributed through specially crafted phishing pages that mimic the Google Play Store. A page that’s easily mistaken for the official app marketplace invites users to download a seemingly useful app. In one campaign, the trojan disguised itself as the Brazilian government services app, INSS Reembolso; in another, it posed as the Starlink app.<br />
<br />
<a href="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/03/11071936/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-01.png" target="_blank" rel="noopener" class="mycode_url"><img src="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/03/11071936/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-01.png" loading="lazy"  alt="[Image: beatbanker-btmob-android-malware-disguis...lso-01.png]" class="mycode_img" /></a><br />
<br />
The malicious site cupomgratisfood{.}shop does an excellent job imitating an app store. It’s just unclear why the fake INSS Reembolso appears all of three times. To be extra sure, perhaps?!<br />
<br />
The installation takes place in several stages to avoid requesting too many permissions at once and to further lull the victim’s vigilance. After the first app is downloaded and launched, it displays an interface that also resembles Google Play and simulates an update for the decoy app — requesting the user’s permission to install apps, which doesn’t look out-of-the-ordinary in context. If you grant this permission, the malware downloads additional malicious modules to your smartphone.<br />
<br />
<a href="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/03/11072036/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-02.png" target="_blank" rel="noopener" class="mycode_url"><img src="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/03/11072036/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso-02.png" loading="lazy"  alt="[Image: beatbanker-btmob-android-malware-disguis...lso-02.png]" class="mycode_img" /></a><br />
<br />
After installation, the trojan simulates a decoy app update via Google Play by requesting permission to install applications while downloading additional malicious modules in the process<br />
<br />
All components of the trojan are encrypted. Before decrypting and proceeding to the next stages of infection, it checks to ensure it’s on a real smartphone and in the target country. BeatBanker immediately terminates its own process if it finds any discrepancies or detects that it’s running in emulated or analysis environments. This complicates dynamic analysis of the malware. Incidentally, the fake update downloader injects modules directly into RAM to avoid creating files on the smartphone that would be visible to security software.<br />
<br />
<a href="https://www.kaspersky.com/blog/beatbanker-btmob-android-malware-disguised-starlink-inss-reembolso/55401/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Browser-in-the-browser attacks: from theory to reality]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21630</link>
			<pubDate>Wed, 04 Mar 2026 16:49:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21630</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">A browser-in-the-browser attack, theoretically described in 2022, has been adopted in real-world phishing. We break down how it works, and how to spot a fake authentication window.</span><br />
<br />
 <br />
In 2022, we dived deep into an attack method called <a href="https://www.kaspersky.com/blog/browser-in-the-browser-attack/44163/" target="_blank" rel="noopener" class="mycode_url">browser-in-the-browser</a> — originally developed by the cybersecurity researcher known as <span style="font-style: italic;" class="mycode_i">mr.d0x</span>. Back then, no actual examples existed of this model being used in the wild. Fast-forward four years, and browser-in-the-browser attacks have graduated from the theoretical to the real: attackers are now using them in the field. In this post, we revisit what exactly a browser-in-the-browser attack is, show how hackers are deploying it, and, most importantly, explain how to keep yourself from becoming its next victim.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What is a browser-in-the-browser (BitB) attack?</span><br />
<br />
For starters, let’s refresh our memories on what <a href="https://mrd0x.com/browser-in-the-browser-phishing-attack/" target="_blank" rel="noopener" class="mycode_url"><span style="font-style: italic;" class="mycode_i">mr.d0x</span> actually cooked up</a>. The core of the attack stems from his observation of just how advanced modern web development tools — HTML, CSS, JavaScript, and the like — have become. It’s this realization that inspired the researcher to come up with a particularly elaborate phishing model.<br />
<br />
A browser-in-the-browser attack is a sophisticated form of phishing that uses web design to craft fraudulent websites imitating login windows for well-known services like Microsoft, Google, Facebook, or Apple that look just like the real thing. The researcher’s concept involves an attacker building a legitimate-looking site to lure in victims. Once there, users can’t leave comments or make purchases unless they “sign in” first.<br />
<br />
Signing in seems easy enough: just click the <span style="font-style: italic;" class="mycode_i">Sign in with </span><span style="font-style: italic;" class="mycode_i">{popular service name}</span> button. And this is where things get interesting: instead of a genuine authentication page provided by the legitimate service, the user gets a fake form rendered inside the malicious site, looking exactly like… a browser pop-up. Furthermore, the address bar in the pop-up, also rendered by the attackers, displays a <span style="font-style: italic;" class="mycode_i">perfectly legitimate</span> URL. Even a close inspection won’t reveal the trick.<br />
<br />
From there, the unsuspecting user enters their credentials for Microsoft, Google, Facebook, or Apple into this rendered window, and those details go straight to the cybercriminals. For a while this scheme remained a theoretical experiment by the security researcher. Now — real-world attackers have added it to their arsenals.<br />
<br />
<a href="https://www.kaspersky.com/blog/browser-in-the-browser-phishing-facebook/55374/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">A browser-in-the-browser attack, theoretically described in 2022, has been adopted in real-world phishing. We break down how it works, and how to spot a fake authentication window.</span><br />
<br />
 <br />
In 2022, we dived deep into an attack method called <a href="https://www.kaspersky.com/blog/browser-in-the-browser-attack/44163/" target="_blank" rel="noopener" class="mycode_url">browser-in-the-browser</a> — originally developed by the cybersecurity researcher known as <span style="font-style: italic;" class="mycode_i">mr.d0x</span>. Back then, no actual examples existed of this model being used in the wild. Fast-forward four years, and browser-in-the-browser attacks have graduated from the theoretical to the real: attackers are now using them in the field. In this post, we revisit what exactly a browser-in-the-browser attack is, show how hackers are deploying it, and, most importantly, explain how to keep yourself from becoming its next victim.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">What is a browser-in-the-browser (BitB) attack?</span><br />
<br />
For starters, let’s refresh our memories on what <a href="https://mrd0x.com/browser-in-the-browser-phishing-attack/" target="_blank" rel="noopener" class="mycode_url"><span style="font-style: italic;" class="mycode_i">mr.d0x</span> actually cooked up</a>. The core of the attack stems from his observation of just how advanced modern web development tools — HTML, CSS, JavaScript, and the like — have become. It’s this realization that inspired the researcher to come up with a particularly elaborate phishing model.<br />
<br />
A browser-in-the-browser attack is a sophisticated form of phishing that uses web design to craft fraudulent websites imitating login windows for well-known services like Microsoft, Google, Facebook, or Apple that look just like the real thing. The researcher’s concept involves an attacker building a legitimate-looking site to lure in victims. Once there, users can’t leave comments or make purchases unless they “sign in” first.<br />
<br />
Signing in seems easy enough: just click the <span style="font-style: italic;" class="mycode_i">Sign in with </span><span style="font-style: italic;" class="mycode_i">{popular service name}</span> button. And this is where things get interesting: instead of a genuine authentication page provided by the legitimate service, the user gets a fake form rendered inside the malicious site, looking exactly like… a browser pop-up. Furthermore, the address bar in the pop-up, also rendered by the attackers, displays a <span style="font-style: italic;" class="mycode_i">perfectly legitimate</span> URL. Even a close inspection won’t reveal the trick.<br />
<br />
From there, the unsuspecting user enters their credentials for Microsoft, Google, Facebook, or Apple into this rendered window, and those details go straight to the cybercriminals. For a while this scheme remained a theoretical experiment by the security researcher. Now — real-world attackers have added it to their arsenals.<br />
<br />
<a href="https://www.kaspersky.com/blog/browser-in-the-browser-phishing-facebook/55374/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Another look inside the container]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21628</link>
			<pubDate>Wed, 04 Mar 2026 08:08:37 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21628</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">The latest update to Kaspersky Cloud Workload Security adds support for an AI assistant for image analysis.</span><br />
 <br />
Modern software development relies on containers and the use of third-party software modules. On the one hand, this greatly facilitates the creation of new software, but on the other, it gives attackers additional opportunities to compromise the development environment. News about attacks on the supply chain through the <a href="https://securelist.ru/shai-hulud-worm-infects-500-npm-packages-in-a-supply-chain-attack/113533/" target="_blank" rel="noopener" class="mycode_url">distribution of malware via various repositories</a> appears with alarming regularity. Therefore, tools that allow the scanning of images have long been an essential part of secure software development.<br />
<br />
Our portfolio has long included a solution for protecting container environments. It allows the scanning of images at different stages of development for malware, known vulnerabilities, configuration errors, the presence of confidential data in the code, and so on. However, in order to make an informed decision about the state of security of a particular image, the operator of the cybersecurity solution may need some more context. Of course, it’s possible to gather this context independently, but if a thorough investigation is conducted manually each time, development may be delayed for an unpredictable period of time. Therefore, our experts decided to add the ability to look at the image from a fresh perspective; of course, not with a human eye — AI is indispensable nowadays.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">OpenAI API</span><br />
<br />
Our Kaspersky Container Security solution (a key component of Kaspersky Cloud Workload Security) now supports an application programming interface for connecting external large language models. So, if a company has deployed a local LLM (or has a subscription to connect a third-party model) that supports the OpenAI API, it’s possible to connect the LLM to our solution. This gives a cybersecurity expert the opportunity to get both additional context about uploaded images and an independent risk assessment by means of a full-fledged AI assistant capable of quickly gathering the necessary information.<br />
<br />
The AI provides a description that clearly explains what the image is for, what application it contains, what it does specifically, and so on. Additionally, the assistant conducts its own independent analysis of the risks of using this image and highlights measures to minimize these risks (if any are found). We’re confident that this will speed up decision-making and incident investigations and, overall, increase the security of the development process.<br />
<br />
<a href="https://www.kaspersky.com/blog/cws-update-2026/55368/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">The latest update to Kaspersky Cloud Workload Security adds support for an AI assistant for image analysis.</span><br />
 <br />
Modern software development relies on containers and the use of third-party software modules. On the one hand, this greatly facilitates the creation of new software, but on the other, it gives attackers additional opportunities to compromise the development environment. News about attacks on the supply chain through the <a href="https://securelist.ru/shai-hulud-worm-infects-500-npm-packages-in-a-supply-chain-attack/113533/" target="_blank" rel="noopener" class="mycode_url">distribution of malware via various repositories</a> appears with alarming regularity. Therefore, tools that allow the scanning of images have long been an essential part of secure software development.<br />
<br />
Our portfolio has long included a solution for protecting container environments. It allows the scanning of images at different stages of development for malware, known vulnerabilities, configuration errors, the presence of confidential data in the code, and so on. However, in order to make an informed decision about the state of security of a particular image, the operator of the cybersecurity solution may need some more context. Of course, it’s possible to gather this context independently, but if a thorough investigation is conducted manually each time, development may be delayed for an unpredictable period of time. Therefore, our experts decided to add the ability to look at the image from a fresh perspective; of course, not with a human eye — AI is indispensable nowadays.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">OpenAI API</span><br />
<br />
Our Kaspersky Container Security solution (a key component of Kaspersky Cloud Workload Security) now supports an application programming interface for connecting external large language models. So, if a company has deployed a local LLM (or has a subscription to connect a third-party model) that supports the OpenAI API, it’s possible to connect the LLM to our solution. This gives a cybersecurity expert the opportunity to get both additional context about uploaded images and an independent risk assessment by means of a full-fledged AI assistant capable of quickly gathering the necessary information.<br />
<br />
The AI provides a description that clearly explains what the image is for, what application it contains, what it does specifically, and so on. Additionally, the assistant conducts its own independent analysis of the risks of using this image and highlights measures to minimize these risks (if any are found). We’re confident that this will speed up decision-making and incident investigations and, overall, increase the security of the development process.<br />
<br />
<a href="https://www.kaspersky.com/blog/cws-update-2026/55368/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Variations of the ClickFix]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21616</link>
			<pubDate>Thu, 26 Feb 2026 07:34:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21616</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Various cases of the ClickFix technique used in real world attacks.</span><br />
 <br />
About a year ago, we published a <a href="https://www.kaspersky.ru/blog/what-is-clickfix/39442/" target="_blank" rel="noopener" class="mycode_url">post</a> about the ClickFix technique, which was gaining popularity among attackers. The essence of attacks using ClickFix boils down to convincing the victim, under various pretexts, to run a malicious command on their computer. That is, from the cybersecurity solutions point of view, it’s run on behalf of the active user and with their privileges.<br />
<br />
In early uses of this technique, cybercriminals tried to convince victims that they need to execute a command to fix some problem or to <a href="https://www.kaspersky.ru/blog/interlock-ransomware-clickfix-attack/39521/" target="_blank" rel="noopener" class="mycode_url">pass a captcha</a>, and in the vast majority of cases, the malicious command was a PowerShell script. However, since then, attackers have come up with a number of new tricks that users should be warned about, as well as a number of new variants of malicious payload delivery, which are also worth keeping an eye on.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Use of <span style="font-style: italic;" class="mycode_i">mshta.exe</span></span><br />
<br />
Last year, Microsoft experts published a <a href="https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/" target="_blank" rel="noopener" class="mycode_url">report</a> on cyberattacks targeting hotel owners working with Booking.com. The attackers sent out fake notifications from the service, or emails pretending to be from guests drawing attention to a review. In both cases, the email contained a link to a website imitating Booking.com, which asked the victim to prove that they were not a robot by running a code via the Run menu.<br />
<br />
There are two key differences between this attack and ClickFix. First, the user isn’t asked to copy the string (after all, a string with code sometimes arouses suspicion). It’s copied to the exchange buffer by the malicious site – probably when the user clicks on a checkbox that mimics the reCAPTCHA mechanism. Second, the malicious string calls the legitimate <span style="font-style: italic;" class="mycode_i">mshta.exe</span> utility, which serves to run applications written in HTML. It contacts the attackers’ server and executes the malicious payload.<br />
 <br />
<span style="font-weight: bold;" class="mycode_b">Video on TikTok and PowerShell with administrator privileges</span><br />
<br />
BleepingComputer published an <a href="https://www.bleepingcomputer.com/news/security/tiktok-videos-continue-to-push-infostealers-in-clickfix-attacks/" target="_blank" rel="noopener" class="mycode_url">article</a> in October 2025 about a campaign spreading malware through instructions in TikTok videos. The videos themselves imitate video tutorials on how to activate proprietary software for free. The advice they give boils down to a need to run PowerShell with administrator rights and then execute the command <span style="font-style: italic;" class="mycode_i">iex (irm {address})</span>. Here, the irm command downloads a malicious script from a server controlled by attackers, and the <span style="font-style: italic;" class="mycode_i">iex</span> (Invoke-Expression) command runs it. The script, in turn, downloads an infostealer malware to the victim’s computer.<br />
<br />
<a href="https://www.kaspersky.com/blog/clickfix-attack-variations/55340/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Various cases of the ClickFix technique used in real world attacks.</span><br />
 <br />
About a year ago, we published a <a href="https://www.kaspersky.ru/blog/what-is-clickfix/39442/" target="_blank" rel="noopener" class="mycode_url">post</a> about the ClickFix technique, which was gaining popularity among attackers. The essence of attacks using ClickFix boils down to convincing the victim, under various pretexts, to run a malicious command on their computer. That is, from the cybersecurity solutions point of view, it’s run on behalf of the active user and with their privileges.<br />
<br />
In early uses of this technique, cybercriminals tried to convince victims that they need to execute a command to fix some problem or to <a href="https://www.kaspersky.ru/blog/interlock-ransomware-clickfix-attack/39521/" target="_blank" rel="noopener" class="mycode_url">pass a captcha</a>, and in the vast majority of cases, the malicious command was a PowerShell script. However, since then, attackers have come up with a number of new tricks that users should be warned about, as well as a number of new variants of malicious payload delivery, which are also worth keeping an eye on.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Use of <span style="font-style: italic;" class="mycode_i">mshta.exe</span></span><br />
<br />
Last year, Microsoft experts published a <a href="https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/" target="_blank" rel="noopener" class="mycode_url">report</a> on cyberattacks targeting hotel owners working with Booking.com. The attackers sent out fake notifications from the service, or emails pretending to be from guests drawing attention to a review. In both cases, the email contained a link to a website imitating Booking.com, which asked the victim to prove that they were not a robot by running a code via the Run menu.<br />
<br />
There are two key differences between this attack and ClickFix. First, the user isn’t asked to copy the string (after all, a string with code sometimes arouses suspicion). It’s copied to the exchange buffer by the malicious site – probably when the user clicks on a checkbox that mimics the reCAPTCHA mechanism. Second, the malicious string calls the legitimate <span style="font-style: italic;" class="mycode_i">mshta.exe</span> utility, which serves to run applications written in HTML. It contacts the attackers’ server and executes the malicious payload.<br />
 <br />
<span style="font-weight: bold;" class="mycode_b">Video on TikTok and PowerShell with administrator privileges</span><br />
<br />
BleepingComputer published an <a href="https://www.bleepingcomputer.com/news/security/tiktok-videos-continue-to-push-infostealers-in-clickfix-attacks/" target="_blank" rel="noopener" class="mycode_url">article</a> in October 2025 about a campaign spreading malware through instructions in TikTok videos. The videos themselves imitate video tutorials on how to activate proprietary software for free. The advice they give boils down to a need to run PowerShell with administrator rights and then execute the command <span style="font-style: italic;" class="mycode_i">iex (irm {address})</span>. Here, the irm command downloads a malicious script from a server controlled by attackers, and the <span style="font-style: italic;" class="mycode_i">iex</span> (Invoke-Expression) command runs it. The script, in turn, downloads an infostealer malware to the victim’s computer.<br />
<br />
<a href="https://www.kaspersky.com/blog/clickfix-attack-variations/55340/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Phishing via Google Tasks]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21601</link>
			<pubDate>Thu, 19 Feb 2026 11:08:46 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21601</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Attackers are delivering phishing links via Google Tasks notifications.</span><br />
 <br />
We’ve written time and again about phishing schemes where attackers exploit various legitimate servers to deliver emails. If they manage to hijack someone’s SharePoint server, they’ll <a href="https://www.kaspersky.com/blog/sharepoint-notification-scam/47593/" target="_blank" rel="noopener" class="mycode_url">use that</a>; if not, they’ll settle for sending notifications through a free service <a href="https://www.kaspersky.com/blog/getshared-scam-emails/53288/" target="_blank" rel="noopener" class="mycode_url">like GetShared</a>. However, Google’s vast ecosystem of services holds a special place in the hearts of scammers, and this time Google Tasks is the star of the show. As per usual, the main goal of this trick is to bypass email filters by piggybacking the rock-solid reputation of the middleman being exploited.<br />
<br />
What phishing via Google Tasks looks likeThe recipient gets a legitimate notification from an <span style="font-style: italic;" class="mycode_i">@google.com</span> address with the message: “You have a new task”. Essentially, the attackers are trying to give the victim the impression that the company has started using Google’s task tracker, and as a result they need to immediately follow a link to fill out an employee verification form.<br />
<br />
<a href="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/02/19033200/google-tasks-phishing-notification.png" target="_blank" rel="noopener" class="mycode_url"><img src="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/02/19033200/google-tasks-phishing-notification.png" loading="lazy"  alt="[Image: google-tasks-phishing-notification.png]" class="mycode_img" /></a><br />
<br />
To deprive the recipient of any time to actually think about whether this is necessary, the task usually includes a tight deadline and is marked with high priority. Upon clicking the link within the task, the victim is presented with an URL leading to a form where they must enter their corporate credentials to “confirm their employee status”. These credentials, of course, are the ultimate goal of the phishing attack.<br />
<br />
<a href="https://www.kaspersky.com/blog/google-tasks-phishing/55326/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Attackers are delivering phishing links via Google Tasks notifications.</span><br />
 <br />
We’ve written time and again about phishing schemes where attackers exploit various legitimate servers to deliver emails. If they manage to hijack someone’s SharePoint server, they’ll <a href="https://www.kaspersky.com/blog/sharepoint-notification-scam/47593/" target="_blank" rel="noopener" class="mycode_url">use that</a>; if not, they’ll settle for sending notifications through a free service <a href="https://www.kaspersky.com/blog/getshared-scam-emails/53288/" target="_blank" rel="noopener" class="mycode_url">like GetShared</a>. However, Google’s vast ecosystem of services holds a special place in the hearts of scammers, and this time Google Tasks is the star of the show. As per usual, the main goal of this trick is to bypass email filters by piggybacking the rock-solid reputation of the middleman being exploited.<br />
<br />
What phishing via Google Tasks looks likeThe recipient gets a legitimate notification from an <span style="font-style: italic;" class="mycode_i">@google.com</span> address with the message: “You have a new task”. Essentially, the attackers are trying to give the victim the impression that the company has started using Google’s task tracker, and as a result they need to immediately follow a link to fill out an employee verification form.<br />
<br />
<a href="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/02/19033200/google-tasks-phishing-notification.png" target="_blank" rel="noopener" class="mycode_url"><img src="https://media.kasperskydaily.com/wp-content/uploads/sites/92/2026/02/19033200/google-tasks-phishing-notification.png" loading="lazy"  alt="[Image: google-tasks-phishing-notification.png]" class="mycode_img" /></a><br />
<br />
To deprive the recipient of any time to actually think about whether this is necessary, the task usually includes a tight deadline and is marked with high priority. Upon clicking the link within the task, the victim is presented with an URL leading to a form where they must enter their corporate credentials to “confirm their employee status”. These credentials, of course, are the ultimate goal of the phishing attack.<br />
<br />
<a href="https://www.kaspersky.com/blog/google-tasks-phishing/55326/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to recognize a deepfake: attack of the clones]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21578</link>
			<pubDate>Fri, 06 Feb 2026 16:58:31 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21578</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.</span><br />
 <br />
Technologies for creating fake video and voice messages are accessible to anyone these days, and scammers are busy mastering the art of deepfakes. No one is immune to the threat — modern neural networks can clone a person’s voice from just <a href="https://www.cnet.com/personal-finance/ai-voice-clones-let-scammers-spoof-your-loved-ones-and-take-your-money/" target="_blank" rel="noopener" class="mycode_url">three to five seconds of audio</a>, and create highly convincing videos from a couple of photos. We’ve previously discussed <a href="https://www.kaspersky.com/blog/real-or-fake-image-analysis-and-provenance/50932/" target="_blank" rel="noopener" class="mycode_url">how to distinguish a real photo or video from a fake and trace its origin to when it was taken or generated</a>. Now let’s take a look at how attackers create and use deepfakes in real time, how to spot a fake without forensic tools, and how to protect yourself and loved ones from “clone attacks”.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How deepfakes are made</span><br />
<br />
Scammers gather source material for deepfakes from open sources: webinars, public videos on social networks and channels, and online speeches. Sometimes they simply call identity theft targets and keep them on the line for as long as possible to collect data for maximum-quality voice cloning. And <a href="https://www.kaspersky.com/blog/how-to-prevent-whatsapp-telegram-account-hijacking-and-quishing/53012/" target="_blank" rel="noopener" class="mycode_url">hacking the messaging account</a> of someone who loves voice and video messages is the ultimate jackpot for scammers. With access to video recordings and voice messages, they can generate realistic fakes that <a href="https://www.telegraph.co.uk/money/consumer-affairs/one-in-12-britons-victims-rise-ai-scams-clone-voice-money/" target="_blank" rel="noopener" class="mycode_url">95% of folks are unable to tell apart</a> from real messages from friends or colleagues.<br />
<br />
The tools for creating deepfakes vary widely, from simple Telegram bots to professional generators like HeyGen and ElevenLabs. Scammers use deepfakes together with social engineering: for example, they might first simulate a messenger app call that appears to drop out constantly, then send a pre-generated video message of fairly low quality, blaming it on the supposedly poor connection.<br />
<br />
In most cases, the message is about some kind of emergency in which the deepfake victim requires immediate help. Naturally the “friend in need” is desperate for money, but, as luck would have it, they’ve no access to an ATM, or have lost their wallet, and the bad connection rules out an online transfer. The solution is, of course, to send the money not directly to the “friend”, but to a fake account, phone number, or cryptowallet.<br />
<br />
Such scams often involve pre-generated videos, but of late real-time deepfake streaming services have come into play. Among other things, these allow users to substitute their own face in a chat-roulette or video call.<br />
<br />
<a href="https://www.kaspersky.com/blog/how-to-recognize-a-deepfake/55247/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.</span><br />
 <br />
Technologies for creating fake video and voice messages are accessible to anyone these days, and scammers are busy mastering the art of deepfakes. No one is immune to the threat — modern neural networks can clone a person’s voice from just <a href="https://www.cnet.com/personal-finance/ai-voice-clones-let-scammers-spoof-your-loved-ones-and-take-your-money/" target="_blank" rel="noopener" class="mycode_url">three to five seconds of audio</a>, and create highly convincing videos from a couple of photos. We’ve previously discussed <a href="https://www.kaspersky.com/blog/real-or-fake-image-analysis-and-provenance/50932/" target="_blank" rel="noopener" class="mycode_url">how to distinguish a real photo or video from a fake and trace its origin to when it was taken or generated</a>. Now let’s take a look at how attackers create and use deepfakes in real time, how to spot a fake without forensic tools, and how to protect yourself and loved ones from “clone attacks”.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">How deepfakes are made</span><br />
<br />
Scammers gather source material for deepfakes from open sources: webinars, public videos on social networks and channels, and online speeches. Sometimes they simply call identity theft targets and keep them on the line for as long as possible to collect data for maximum-quality voice cloning. And <a href="https://www.kaspersky.com/blog/how-to-prevent-whatsapp-telegram-account-hijacking-and-quishing/53012/" target="_blank" rel="noopener" class="mycode_url">hacking the messaging account</a> of someone who loves voice and video messages is the ultimate jackpot for scammers. With access to video recordings and voice messages, they can generate realistic fakes that <a href="https://www.telegraph.co.uk/money/consumer-affairs/one-in-12-britons-victims-rise-ai-scams-clone-voice-money/" target="_blank" rel="noopener" class="mycode_url">95% of folks are unable to tell apart</a> from real messages from friends or colleagues.<br />
<br />
The tools for creating deepfakes vary widely, from simple Telegram bots to professional generators like HeyGen and ElevenLabs. Scammers use deepfakes together with social engineering: for example, they might first simulate a messenger app call that appears to drop out constantly, then send a pre-generated video message of fairly low quality, blaming it on the supposedly poor connection.<br />
<br />
In most cases, the message is about some kind of emergency in which the deepfake victim requires immediate help. Naturally the “friend in need” is desperate for money, but, as luck would have it, they’ve no access to an ATM, or have lost their wallet, and the bad connection rules out an online transfer. The solution is, of course, to send the money not directly to the “friend”, but to a fake account, phone number, or cryptowallet.<br />
<br />
Such scams often involve pre-generated videos, but of late real-time deepfake streaming services have come into play. Among other things, these allow users to substitute their own face in a chat-roulette or video call.<br />
<br />
<a href="https://www.kaspersky.com/blog/how-to-recognize-a-deepfake/55247/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[The Notepad++ supply chain attack — unnoticed execution chains and new IoCs]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21569</link>
			<pubDate>Tue, 03 Feb 2026 08:27:22 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21569</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Introduction</span><br />
<br />
On February 2, 2026, the developers of Notepad++, a text editor popular among developers, <a href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/" target="_blank" rel="noopener" class="mycode_url">published a statement</a> claiming that the update infrastructure of Notepad++ has been compromised. According to the statement, this was due to a hosting provider level incident, which occurred from June to September 2025. However, attackers were able to retain access to internal services until December 2025.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Multiple execution chains and payloads</span><br />
<br />
Having checked our telemetry related to this incident, we have been amazed to find out how different and unique were the execution chains used in this supply chain attack. We identified that over the course of four months, from July to October 2025, attackers who have compromised Notepad++ have been constantly rotating C2 server addresses used for distributing malicious updates, the downloaders used for implant delivery, as well as the final payloads.<br />
<br />
We observed three different infection chains overall designed to attack about a dozen machines, belonging to:<ul class="mycode_list"><li>Individuals located in Vietnam, El Salvador and Australia;<br />
</li>
<li>A government organization located in the Philippines;<br />
</li>
<li>A financial organization located in El Salvador;<br />
</li>
<li>An IT service provider organization located in Vietnam.<br />
</li>
</ul>
Despite the variety of payloads observed, Kaspersky solutions have been able to block the identified attacks as they occurred.<br />
<br />
In this article, we describe the variety of the infection chains we observed in the Notepad++ supply chain attack, as well as provide numerous previously unpublished IoCs related to it.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Chain #1 — late July and early August 2025</span><br />
<br />
We observed attackers to deploy a malicious Notepad++ update for the first time in late July 2025. It was hosted at <a href="http://45.76.155" target="_blank" rel="noopener" class="mycode_url">http://45.76.155</a>[.]202/update/update.exe. Notably, the first scan of this URL on the VirusTotal platform occurred in late September, by a user from Taiwan.<br />
<br />
<a href="https://securelist.com/notepad-supply-chain-attack/118708/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-weight: bold;" class="mycode_b">Introduction</span><br />
<br />
On February 2, 2026, the developers of Notepad++, a text editor popular among developers, <a href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/" target="_blank" rel="noopener" class="mycode_url">published a statement</a> claiming that the update infrastructure of Notepad++ has been compromised. According to the statement, this was due to a hosting provider level incident, which occurred from June to September 2025. However, attackers were able to retain access to internal services until December 2025.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Multiple execution chains and payloads</span><br />
<br />
Having checked our telemetry related to this incident, we have been amazed to find out how different and unique were the execution chains used in this supply chain attack. We identified that over the course of four months, from July to October 2025, attackers who have compromised Notepad++ have been constantly rotating C2 server addresses used for distributing malicious updates, the downloaders used for implant delivery, as well as the final payloads.<br />
<br />
We observed three different infection chains overall designed to attack about a dozen machines, belonging to:<ul class="mycode_list"><li>Individuals located in Vietnam, El Salvador and Australia;<br />
</li>
<li>A government organization located in the Philippines;<br />
</li>
<li>A financial organization located in El Salvador;<br />
</li>
<li>An IT service provider organization located in Vietnam.<br />
</li>
</ul>
Despite the variety of payloads observed, Kaspersky solutions have been able to block the identified attacks as they occurred.<br />
<br />
In this article, we describe the variety of the infection chains we observed in the Notepad++ supply chain attack, as well as provide numerous previously unpublished IoCs related to it.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Chain #1 — late July and early August 2025</span><br />
<br />
We observed attackers to deploy a malicious Notepad++ update for the first time in late July 2025. It was hosted at <a href="http://45.76.155" target="_blank" rel="noopener" class="mycode_url">http://45.76.155</a>[.]202/update/update.exe. Notably, the first scan of this URL on the VirusTotal platform occurred in late September, by a user from Taiwan.<br />
<br />
<a href="https://securelist.com/notepad-supply-chain-attack/118708/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[The perfect storm of Android threats]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21508</link>
			<pubDate>Wed, 28 Jan 2026 06:31:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21508</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.</span><br />
 <br />
The year 2025 saw a record-breaking number of attacks on Android devices. Scammers are currently riding a few major waves: the hype surrounding AI apps, the urge to bypass site blocks or age checks, the hunt for a bargain on a new smartphone, the ubiquity of mobile banking, and, of course, the popularity of NFC. Let’s break down the primary threats of 2025–2026, and figure out how to keep your Android device safe in this new landscape.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Sideloading</span><br />
<br />
Malicious installation packages (APK files) have always been the Final Boss among Android threats, despite Google’s multi-year efforts to fortify the OS. By using sideloading — installing an app via an APK file instead of grabbing it from the official store — users can install pretty much anything, including straight-up malware. And neither the rollout of Google Play Protect, nor the various permission restrictions for shady apps have managed to put a dent in the scale of the problem.<br />
<br />
According to preliminary data from Kaspersky for 2025, the number of detected Android threats <a href="https://www.kaspersky.com/about/press-releases/kaspersky-report-attacks-on-smartphones-increased-in-the-first-half-of-2025" target="_blank" rel="noopener" class="mycode_url">grew almost by half</a>. In the third quarter alone, detections <a href="https://securelist.com/malware-report-q3-2025-mobile-statistics/118013/" target="_blank" rel="noopener" class="mycode_url">jumped by 38%</a> compared to the second. In certain niches, like Trojan bankers, the growth was even more aggressive. In Russia alone, the <a href="https://www.kaspersky.com/blog/mamont-banker-tracking-app/52786/" target="_blank" rel="noopener" class="mycode_url">notorious Mamont banker</a> attacked 36 times more users than it did the previous year, while globally this entire category saw a nearly fourfold increase.<br />
<br />
Today, bad actors primarily distribute malware via messaging apps by sliding malicious files into DMs and group chats. The installation file usually sports an enticing name (think “party_pics.jpg.apk” or “clearance_sale_catalog.apk”), accompanied by a message “helpfully” explaining how to install the package while bypassing the OS restrictions and security warnings.<br />
<br />
Once a new device is infected, the malware often spams itself to everyone in the victim’s contact list.<br />
<br />
Search engine spam and email campaigns are also trending, luring users to sites that look exactly like an official app store. There, they’re prompted to download the “latest helpful app”, such as an AI assistant. In reality, instead of an installation from an official app store, the user ends up downloading an APK package. A prime example of these tactics is the <a href="https://zimperium.com/blog/clayrat-a-new-android-spyware-targeting-russia" target="_blank" rel="noopener" class="mycode_url">ClayRat Android Trojan</a>, which uses a mix of all these techniques to target Russian users. It spreads through groups and fake websites, blasts itself to the victim’s contacts via SMS, and then proceeds to steal the victim’s chat logs and call history; it even goes as far as snapping photos of the owner using the front-facing camera. In just three months, over 600 distinct ClayRat builds have surfaced.<br />
<br />
The scale of the disaster is so massive that Google even <a href="https://www.androidpolice.com/google-tries-to-justify-androids-upcoming-sideloading-restrictions/" target="_blank" rel="noopener" class="mycode_url">announced an upcoming ban</a> on distributing apps from unknown developers starting in 2026. However, after a couple of months of pushback from the dev community, the company <a href="https://www.theverge.com/news/819835/google-android-sideloading-experienced-users-developer-verification" target="_blank" rel="noopener" class="mycode_url">pivoted</a> to a softer approach: unsigned apps will likely only be installable via some kind of superuser mode. As a result, we can expect scammers to simply update their how-to guides with instructions on how to toggle that mode on.<br />
<br />
<a href="https://www.kaspersky.com/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2" target="_blank" rel="noopener" class="mycode_url">Kaspersky for Android</a> will help you protect yourself from counterfeit and trojanized APK files. Unfortunately, due to Google’s decision, our Android security apps are currently unavailable on Google Play. We’ve previously provided detailed information on <a href="https://www.kaspersky.com/blog/kaspersky-apps-removed-from-google-play/52254/" target="_blank" rel="noopener" class="mycode_url">how to install our Android apps with a 100% guarantee of authenticity</a>.<br />
<br />
<a href="https://www.kaspersky.com/blog/growing-2026-android-threats-and-protection/55191/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">NFC relay attacks, pre-installed Trojans, and other nasties ruining the Android experience in 2026.</span><br />
 <br />
The year 2025 saw a record-breaking number of attacks on Android devices. Scammers are currently riding a few major waves: the hype surrounding AI apps, the urge to bypass site blocks or age checks, the hunt for a bargain on a new smartphone, the ubiquity of mobile banking, and, of course, the popularity of NFC. Let’s break down the primary threats of 2025–2026, and figure out how to keep your Android device safe in this new landscape.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Sideloading</span><br />
<br />
Malicious installation packages (APK files) have always been the Final Boss among Android threats, despite Google’s multi-year efforts to fortify the OS. By using sideloading — installing an app via an APK file instead of grabbing it from the official store — users can install pretty much anything, including straight-up malware. And neither the rollout of Google Play Protect, nor the various permission restrictions for shady apps have managed to put a dent in the scale of the problem.<br />
<br />
According to preliminary data from Kaspersky for 2025, the number of detected Android threats <a href="https://www.kaspersky.com/about/press-releases/kaspersky-report-attacks-on-smartphones-increased-in-the-first-half-of-2025" target="_blank" rel="noopener" class="mycode_url">grew almost by half</a>. In the third quarter alone, detections <a href="https://securelist.com/malware-report-q3-2025-mobile-statistics/118013/" target="_blank" rel="noopener" class="mycode_url">jumped by 38%</a> compared to the second. In certain niches, like Trojan bankers, the growth was even more aggressive. In Russia alone, the <a href="https://www.kaspersky.com/blog/mamont-banker-tracking-app/52786/" target="_blank" rel="noopener" class="mycode_url">notorious Mamont banker</a> attacked 36 times more users than it did the previous year, while globally this entire category saw a nearly fourfold increase.<br />
<br />
Today, bad actors primarily distribute malware via messaging apps by sliding malicious files into DMs and group chats. The installation file usually sports an enticing name (think “party_pics.jpg.apk” or “clearance_sale_catalog.apk”), accompanied by a message “helpfully” explaining how to install the package while bypassing the OS restrictions and security warnings.<br />
<br />
Once a new device is infected, the malware often spams itself to everyone in the victim’s contact list.<br />
<br />
Search engine spam and email campaigns are also trending, luring users to sites that look exactly like an official app store. There, they’re prompted to download the “latest helpful app”, such as an AI assistant. In reality, instead of an installation from an official app store, the user ends up downloading an APK package. A prime example of these tactics is the <a href="https://zimperium.com/blog/clayrat-a-new-android-spyware-targeting-russia" target="_blank" rel="noopener" class="mycode_url">ClayRat Android Trojan</a>, which uses a mix of all these techniques to target Russian users. It spreads through groups and fake websites, blasts itself to the victim’s contacts via SMS, and then proceeds to steal the victim’s chat logs and call history; it even goes as far as snapping photos of the owner using the front-facing camera. In just three months, over 600 distinct ClayRat builds have surfaced.<br />
<br />
The scale of the disaster is so massive that Google even <a href="https://www.androidpolice.com/google-tries-to-justify-androids-upcoming-sideloading-restrictions/" target="_blank" rel="noopener" class="mycode_url">announced an upcoming ban</a> on distributing apps from unknown developers starting in 2026. However, after a couple of months of pushback from the dev community, the company <a href="https://www.theverge.com/news/819835/google-android-sideloading-experienced-users-developer-verification" target="_blank" rel="noopener" class="mycode_url">pivoted</a> to a softer approach: unsigned apps will likely only be installable via some kind of superuser mode. As a result, we can expect scammers to simply update their how-to guides with instructions on how to toggle that mode on.<br />
<br />
<a href="https://www.kaspersky.com/mobile-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____da04049114cf37d2" target="_blank" rel="noopener" class="mycode_url">Kaspersky for Android</a> will help you protect yourself from counterfeit and trojanized APK files. Unfortunately, due to Google’s decision, our Android security apps are currently unavailable on Google Play. We’ve previously provided detailed information on <a href="https://www.kaspersky.com/blog/kaspersky-apps-removed-from-google-play/52254/" target="_blank" rel="noopener" class="mycode_url">how to install our Android apps with a 100% guarantee of authenticity</a>.<br />
<br />
<a href="https://www.kaspersky.com/blog/growing-2026-android-threats-and-protection/55191/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Are your Bluetooth headphones spying on you?]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21486</link>
			<pubDate>Wed, 21 Jan 2026 13:31:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21486</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Breaking down the WhisperPair attack, which allows victims to be tracked via ordinary Bluetooth headphones.</span><br />
 <br />
A newly discovered vulnerability named WhisperPair can turn Bluetooth headphones and headsets from many well-known brands into personal tracking beacons — regardless of whether the accessories are currently connected to an iPhone, Android smartphone, or even a laptop. Even though the technology behind this flaw was originally developed by Google for Android devices, the tracking risks are actually much higher for those using vulnerable headsets with other operating systems — like iOS, macOS, Windows, or Linux. For iPhone owners, this is especially concerning.<br />
<br />
Connecting Bluetooth headphones to Android smartphones became a whole lot faster when Google rolled out Fast Pair, a technology now used by dozens of accessory manufacturers. To pair a new headset, you just turn it on and hold it near your phone. If your device is relatively modern (produced after 2019), a pop-up appears inviting you to connect and download the accompanying app, if it exists. One tap, and you’re good to go.<br />
<br />
Unfortunately, it seems quite a few manufacturers didn’t pay attention to the particulars of this tech when implementing it, and now their accessories can be hijacked by a stranger’s smartphone in seconds — even if the headset isn’t actually in pairing mode. This is the core of the WhisperPair vulnerability, recently discovered by researchers at KU Leuven and recorded as <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-36911" target="_blank" rel="noopener" class="mycode_url">CVE-2025-36911</a>.<br />
<br />
The attacking device — which can be a standard smartphone, tablet or laptop — broadcasts Google Fast Pair requests to any Bluetooth devices within a 14-meter radius. As it turns out, a long list of headphones from Sony, JBL, Redmi, Anker, Marshall, Jabra, OnePlus, and even Google itself (the Pixel Buds 2) will respond to these pings even when they aren’t looking to pair. On average, the attack takes just 10 seconds.<br />
<br />
Once the headphones are paired, the attacker can do pretty much anything the owner can: listen in through the microphone, blast music, or — in some cases — locate the headset on a map if it supports Google Find Hub. That latter feature, designed strictly for finding lost headphones, creates a perfect opening for stealthy remote tracking. And here’s the twist: it’s actually most dang<br />
<br />
<a href="https://www.kaspersky.com/blog/whisperpair-blueooth-headset-location-tracking/55162/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">Breaking down the WhisperPair attack, which allows victims to be tracked via ordinary Bluetooth headphones.</span><br />
 <br />
A newly discovered vulnerability named WhisperPair can turn Bluetooth headphones and headsets from many well-known brands into personal tracking beacons — regardless of whether the accessories are currently connected to an iPhone, Android smartphone, or even a laptop. Even though the technology behind this flaw was originally developed by Google for Android devices, the tracking risks are actually much higher for those using vulnerable headsets with other operating systems — like iOS, macOS, Windows, or Linux. For iPhone owners, this is especially concerning.<br />
<br />
Connecting Bluetooth headphones to Android smartphones became a whole lot faster when Google rolled out Fast Pair, a technology now used by dozens of accessory manufacturers. To pair a new headset, you just turn it on and hold it near your phone. If your device is relatively modern (produced after 2019), a pop-up appears inviting you to connect and download the accompanying app, if it exists. One tap, and you’re good to go.<br />
<br />
Unfortunately, it seems quite a few manufacturers didn’t pay attention to the particulars of this tech when implementing it, and now their accessories can be hijacked by a stranger’s smartphone in seconds — even if the headset isn’t actually in pairing mode. This is the core of the WhisperPair vulnerability, recently discovered by researchers at KU Leuven and recorded as <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-36911" target="_blank" rel="noopener" class="mycode_url">CVE-2025-36911</a>.<br />
<br />
The attacking device — which can be a standard smartphone, tablet or laptop — broadcasts Google Fast Pair requests to any Bluetooth devices within a 14-meter radius. As it turns out, a long list of headphones from Sony, JBL, Redmi, Anker, Marshall, Jabra, OnePlus, and even Google itself (the Pixel Buds 2) will respond to these pings even when they aren’t looking to pair. On average, the attack takes just 10 seconds.<br />
<br />
Once the headphones are paired, the attacker can do pretty much anything the owner can: listen in through the microphone, blast music, or — in some cases — locate the headset on a map if it supports Google Find Hub. That latter feature, designed strictly for finding lost headphones, creates a perfect opening for stealthy remote tracking. And here’s the twist: it’s actually most dang<br />
<br />
<a href="https://www.kaspersky.com/blog/whisperpair-blueooth-headset-location-tracking/55162/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Epochalypse Now — or how to deal with Y2K38]]></title>
			<link>https://www.geeks.fyi/showthread.php?tid=21483</link>
			<pubDate>Tue, 20 Jan 2026 08:05:47 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.geeks.fyi/member.php?action=profile&uid=1322">harlan4096</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.geeks.fyi/showthread.php?tid=21483</guid>
			<description><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?</span><br />
 <br />
Millions of IT systems — some of them industrial and IoT — may start behaving unpredictably on January 19. Potential failures include: glitches in processing card payments; false alarms from security systems; incorrect operation of medical equipment; failures in automated lighting, heating, and water supply systems; and many more less serious types of errors. The catch is — it will happen on January 19, <span style="font-weight: bold;" class="mycode_b">2038</span>. Not that that’s a reason to relax — the time left to prepare may already be insufficient. The cause of this mass of problems will be an overflow in the integers storing date and time. While the root cause of the error is simple and clear, fixing it will require extensive and systematic efforts on every level — from governments and international bodies and down to organizations and private individuals.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">The unwritten standard of the Unix epoch</span><br />
<br />
The Unix epoch is the timekeeping system adopted by Unix operating systems, which became popular across the entire IT industry. It counts the seconds from 00:00:00 UTC on January 1, 1970, which is considered the zero point. Any given moment in time is represented as the number of seconds that have passed since that date. For dates before 1970, negative values are used. This approach was chosen by Unix developers for its simplicity — instead of storing the year, month, day, and time separately, only a single number is needed. This facilitates operations like sorting or calculating the interval between dates. Today, the Unix epoch is used far beyond Unix systems: in databases, programming languages, network protocols, and in smartphones running iOS and Android.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">The Y2K38 time bomb</span><br />
<br />
Initially, when Unix was developed, a decision was made to store time as a 32-bit signed integer. This allowed for representing a date range from roughly 1901 to 2038. The problem is that on January 19, 2038, at 03:14:07 UTC, this number will reach its maximum value (2,147,483,647 seconds) and overflow, becoming negative, and causing computers to “teleport” from January 2038 back to December 13, 1901. In some cases, however, shorter “time travel” might happen — to point zero, which is the year 1970.<br />
<br />
This event, known as the “year 2038 problem”, “Epochalypse”, or “Y2K38”, could lead to failures in systems that still use 32-bit time representation — from POS terminals, <a href="https://www.securityweek.com/the-y2k38-bug-is-a-vulnerability-not-just-a-date-problem-researchers-warn/#:~:text=%E2%80%9CWe,well%2E" target="_blank" rel="noopener" class="mycode_url">embedded systems, and routers, to automobiles and industrial equipment</a>. Modern systems solve this problem by using 64 bits to store time. This extends the date range to hundreds of billions of years into the future. However, millions of devices with 32-bit dates are still in operation, and will require updating or replacement before “day Y” arrives.<br />
<br />
<a href="https://www.kaspersky.com/blog/mitigating-y2k38-vulnerability-in-organization/55150/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></description>
			<content:encoded><![CDATA[<blockquote class="mycode_quote"><cite>Quote:</cite><span style="font-size: medium;" class="mycode_size">What is the year 2038 problem — also known as “Unix Y2K” — and how to prepare corporate IT systems for it?</span><br />
 <br />
Millions of IT systems — some of them industrial and IoT — may start behaving unpredictably on January 19. Potential failures include: glitches in processing card payments; false alarms from security systems; incorrect operation of medical equipment; failures in automated lighting, heating, and water supply systems; and many more less serious types of errors. The catch is — it will happen on January 19, <span style="font-weight: bold;" class="mycode_b">2038</span>. Not that that’s a reason to relax — the time left to prepare may already be insufficient. The cause of this mass of problems will be an overflow in the integers storing date and time. While the root cause of the error is simple and clear, fixing it will require extensive and systematic efforts on every level — from governments and international bodies and down to organizations and private individuals.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">The unwritten standard of the Unix epoch</span><br />
<br />
The Unix epoch is the timekeeping system adopted by Unix operating systems, which became popular across the entire IT industry. It counts the seconds from 00:00:00 UTC on January 1, 1970, which is considered the zero point. Any given moment in time is represented as the number of seconds that have passed since that date. For dates before 1970, negative values are used. This approach was chosen by Unix developers for its simplicity — instead of storing the year, month, day, and time separately, only a single number is needed. This facilitates operations like sorting or calculating the interval between dates. Today, the Unix epoch is used far beyond Unix systems: in databases, programming languages, network protocols, and in smartphones running iOS and Android.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">The Y2K38 time bomb</span><br />
<br />
Initially, when Unix was developed, a decision was made to store time as a 32-bit signed integer. This allowed for representing a date range from roughly 1901 to 2038. The problem is that on January 19, 2038, at 03:14:07 UTC, this number will reach its maximum value (2,147,483,647 seconds) and overflow, becoming negative, and causing computers to “teleport” from January 2038 back to December 13, 1901. In some cases, however, shorter “time travel” might happen — to point zero, which is the year 1970.<br />
<br />
This event, known as the “year 2038 problem”, “Epochalypse”, or “Y2K38”, could lead to failures in systems that still use 32-bit time representation — from POS terminals, <a href="https://www.securityweek.com/the-y2k38-bug-is-a-vulnerability-not-just-a-date-problem-researchers-warn/#:~:text=%E2%80%9CWe,well%2E" target="_blank" rel="noopener" class="mycode_url">embedded systems, and routers, to automobiles and industrial equipment</a>. Modern systems solve this problem by using 64 bits to store time. This extends the date range to hundreds of billions of years into the future. However, millions of devices with 32-bit dates are still in operation, and will require updating or replacement before “day Y” arrives.<br />
<br />
<a href="https://www.kaspersky.com/blog/mitigating-y2k38-vulnerability-in-organization/55150/" target="_blank" rel="noopener" class="mycode_url">Continue Reading...</a></blockquote>
]]></content:encoded>
		</item>
	</channel>
</rss>