SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 21

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[Fake AI video generators infect Windows, macOS with infostealers](https://www.bleepingcomputer.com/news/security/fake-ai-video-generators-infect-windows-macos-with-infostealers/)[How Italy became an unexpected spyware hub](https://therecord.media/how-italy-became-an-unexpected-spyware-hub)[Babble Babble Babble Babble Babble Babble BabbleLoader](https://intezer.com/blog/research/babble-babble-babble-babble-babble-babble-babbleloader/)[One Sock Fits All: The use and abuse of the NSOCKS botnet](https://blog.lumen.com/one-sock-fits-all-the-use-and-abuse-of-the-nsocks-botnet/)[Helldown Ransomware: an overview of this emerging threat](https://blog.sekoia.io/helldown-ransomware-an-overview-of-this-emerging-threat/)[Python NodeStealer Targets Facebook Ads Manager with New Techniques](https://www.netskope.com/blog/python-nodestealer-targets-facebook-ads-manager-with-new-techniques)[Chaotic-Based Shellcode Encryption: A New Strategy for Bypassing Antivirus Mechanisms](https://www.mdpi.com/2073-8994/16/11/1526)[Correction: Xu et al. Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks. Electronics 2023, 12, 4817](https://www.mdpi.com/2079-9292/13/22/4464)[A Study of Malware Prevention in Linux Distributions](https://arxiv.org/abs/2411.11017)[When Guardians Become Predators: How Malware Corrupts the Protectors](https://www.trellix.com/blogs/research/when-guardians-become-predators-how-malware-corrupts-the-protectors/)[StopRansomware: BianLian Data Extortion Group](https://www.cisa.gov/news-events/alerts/2024/11/20/cisa-and-partners-release-update-bianlian-ransomware-cybersecurity-advisory)[BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA](https://www.volexity.com/blog/2024/11/15/brazenbamboo-weaponizes-forticlient-vulnerability-to-steal-vpn-credentials-via-deepdata/)[Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine](https://www.welivesecurity.com/en/eset-research/unveiling-wolfsbane-gelsemiums-linux-counterpart-to-gelsevirine/#Technical%20analysis)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, [newsletter](https://securityaffairs.com/170041/breaking-news/security-affairs-newsletter-round-494-by-pierluigi-paganini-international-edition.html))**

Related Tags:
NAICS: 519 – Web Search Portals

Libraries

Archives

Other Information Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 51 – Information

Gelsemine

Gelsenicine

Gelsemium

Gelsevirine

Blog: Security Affairs

Associated Indicators: