SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 13

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–**Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.**[How the Necro Trojan infiltrated Google Play, again](https://securelist.com/necro-trojan-is-back-on-google-play/113881/)[Kryptina RaaS -| From Unsellable Cast-Off to Enterprise Ransomware](https://www.sentinelone.com/labs/kryptina-raas-from-unsellable-cast-off-to-enterprise-ransomware/)[‘Marko Polo’ Navigates Uncharted Waters With Infostealer Empire](http://go.recordedfuture.com/hubfs/reports/cta-2024-0917.pdf)[Octo2: European Banks Already Under Attack by New Malware Variant](https://www.threatfabric.com/blogs/octo2-european-banks-already-under-attack-by-new-malware-variant)[Infostealer malware bypasses Chrome’s new cookie-theft defenses](https://www.bleepingcomputer.com/news/security/infostealer-malware-bypasses-chromes-new-cookie-theft-defenses/)[AI-Generated Malware Found in the Wild](https://www.securityweek.com/ai-generated-malware-found-in-the-wild/)[Inside SnipBot: The Latest RomCom Malware Variant](https://unit42.paloaltonetworks.com/snipbot-romcom-malware-variant/)[DCRat Targets Users with HTML Smuggling](https://www.netskope.com/blog/dcrat-targets-users-with-html-smuggling)[Examining the Rat in the Tunnel: Interpretable Multi-Label Classification of Tor-based Malware](https://arxiv.org/pdf/2409.16639)[Deep-Learning-Based Approach for IoT Attack and Malware Detection](https://www.mdpi.com/2076-3417/14/18/8505)[Wallet Scam: A Case Study in Crypto Drainer Tactics](https://research.checkpoint.com/2024/wallet-scam-a-case-study-in-crypto-drainer-tactics/)[Storm-0501: Ransomware attacks expanding to hybrid cloud environments](https://www.microsoft.com/en-us/security/blog/2024/09/26/storm-0501-ransomware-attacks-expanding-to-hybrid-cloud-environments/)[Security Brief: Actor Uses Compromised Accounts, Customized Social Engineering to Target Transport and Logistics Firms with Malware](https://www.proofpoint.com/us/blog/threat-insight/security-brief-actor-uses-compromised-accounts-customized-social-engineering)[Earth Baxia Uses Spear-Phishing and GeoServer Exploit to Target APAC](https://www.trendmicro.com/en_us/research/24/i/earth-baxia-spear-phishing-and-geoserver-exploit.html)[Gleaming Pisces Poisoned Python Packages Campaign Delivers PondRAT Linux and MacOS Backdoors](https://unit42.paloaltonetworks.com/gleaming-pisces-applejeus-poolrat-and-pondrat/)[Inside the Dragon: DragonForce Ransomware Group](https://www.group-ib.com/blog/dragonforce-ransomware/)[Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy](https://unit42.paloaltonetworks.com/kimsuky-new-keylogger-backdoor-variant/)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, malware)**

Related Tags:
NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 922 – Justice

Public Order

Safety Activities

NAICS: 522 – Credit Intermediation And Related Activities

NAICS: 51 – Information

Blog: Security Affairs

Associated Indicators: