Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–**Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.**[CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging](https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-latest-tactic-in-malware-staging/)[Typosquat Campaign Targeting npm Developers](https://blog.phylum.io/supply-chain-security-typosquat-campaign-targeting-puppeteer-users/)[ToxicPanda: a new banking trojan from Asia hit Europe and LATAM](https://www.cleafy.com/cleafy-labs/toxicpanda-a-new-banking-trojan-from-asia-hit-europe-and-latam)[Threat Campaign Spreads Winos4.0 Through Game Application](https://www.fortinet.com/blog/threat-research/threat-campaign-spreads-winos4-through-game-application)[New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency](https://securelist.com/steelfox-trojan-drops-stealer-and-miner/114414/)[CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits](https://research.checkpoint.com/2024/massive-phishing-campaign-deploys-latest-rhadamanthys-version/)[Cloudy With a Chance of RATs: Unveiling APT36 and the Evolution of ElizaRAT](https://research.checkpoint.com/2024/the-evolution-of-transparent-tribes-new-malware/)[Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave](https://www.cloudsek.com/blog/mozi-resurfaces-as-androxgh0st-botnet-unraveling-the-latest-exploitation-wave)[Roblox Developers Targeted with npm Packages Infected with Skuld Infostealer and Blank Grabber](https://socket.dev/blog/roblox-developers-targeted-with-npm-packages-infected-with-infostealers)[Malicious Python Package Typosquats Popular ‘fabric’ SSH Library, Exfiltrates AWS Credentials](https://socket.dev/blog/malicious-python-package-typosquats-fabric-ssh-library)[Design and Evaluation of Steganographic Channels in Fifth-Generation New Radio](https://www.mdpi.com/1999-5903/16/11/410)[LLMs for Domain Generation Algorithm Detection](https://arxiv.org/abs/2411.03307)[VEEAM exploit seen used again with a new ransomware: ‘Frag’](https://news.sophos.com/en-us/2024/11/08/veeam-exploit-seen-used-again-with-a-new-ransomware-frag/)[BlueNoroff Hidden Risk -| Threat Actor Targets Macs with Fake Crypto News and Novel Persistence](https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, [newsletter](https://securityaffairs.com/170041/breaking-news/security-affairs-newsletter-round-494-by-pierluigi-paganini-international-edition.html))**
Related Tags:
COPERNICIUM
NAICS: 519 – Web Search Portals
Libraries
Archives
Other Information Services
NAICS: 51 – Information
Stardust Chollima
Bluenoroff
NICKEL GLADSTONE
APT38
BeagleBoyz
Mythic Leopard
Associated Indicators: