SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 11

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights](https://dfrlab.org/2024/09/04/mythical-beasts-and-where-to-find-them-report/)[Dissecting Lumma Malware: Analyzing the Fake CAPTCHA and Obfuscation Techniques — Part 2](https://denwp.com/dissecting-lumma-malware/)[Predator Spyware Infrastructure Returns Following Exposure and Sanctions](https://www.recordedfuture.com/research/predator-spyware-infrastructure-returns-following-exposure-sanctions)[Malware’s Shared Secrets: Code Similarity Insights for Ransomware Gangs Activities Tracking](https://www.emanueledelucia.net/malwares-shared-secrets-code-similarity-insights-for-ransomware-gangs-activities-tracking/)[Mallox ransomware: in-depth analysis and evolution](https://securelist.com/mallox-ransomware/113529/)[A glimpse into the Quad7 operators’ next moves and associated botnets](https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/)[CosmicBeetle steps up: Probation period at RansomHub](https://www.welivesecurity.com/en/eset-research/cosmicbeetle-steps-up-probation-period-ransomhub/)[New RansomHub attack uses TDSKiller and LaZagne, disables EDR](https://www.threatdown.com/blog/new-ransomhub-attack-uses-tdskiller-and-lazagne-disables-edr/)[Hadooken Malware Targets Weblogic Applications](https://www.aquasec.com/blog/hadooken-malware-targets-weblogic-applications/)[Ajina attacks Central Asia: Story of an Uzbek Android Pandemic](https://www.group-ib.com/blog/ajina-malware/)[Void captures over a million Android TV boxes](https://news.drweb.com/show/?i=14900&lng=en)[Applications of Fuzzy Logic and Probabilistic Neural Networks in E-Service for Malware Detection](https://www.mdpi.com/2075-1680/13/9/624)[A new TrickMo saga: from Banking Trojan to Victim’s Data Leak](https://www.cleafy.com/cleafy-labs/a-new-trickmo-saga-from-banking-trojan-to-victims-data-leak)[Earth Preta Evolves its Attacks with New Malware and Strategies](https://www.trendmicro.com/en_us/research/24/i/earth-preta-new-malware-and-strategies.html)[Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401](https://www.fortinet.com/blog/threat-research/threat-actors-exploit-geoserver-vulnerability-cve-2024-36401)[TIDRONE Targets Military and Satellite Industries in Taiwan](https://www.trendmicro.com/en_us/research/24/i/tidrone-targets-military-and-satellite-industries-in-taiwan.html)[Fake recruiter coding tests target devs with malicious Python packages](https://www.reversinglabs.com/blog/fake-recruiter-coding-tests-target-devs-with-malicious-python-packages) [Targeted Iranian Attacks Against Iraqi Government Infrastructure](https://research.checkpoint.com/2024/iranian-malware-attacks-iraqi-government/)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, newsletter)**

Related Tags:
NAICS: 923 – Administration Of Human Resource Programs

NAICS: 519 – Web Search Portals

Libraries

Archives

Other Information Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 922 – Justice

Public Order

Safety Activities

NAICS: 51 – Information

NAICS: 928 – National Security And International Affairs

LaZagne

Blog: Security Affairs

Associated Indicators: