SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 20

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–**Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.**[New Campaign Uses Remcos RAT to Exploit Victims](https://www.fortinet.com/blog/threat-research/new-campaign-uses-remcos-rat-to-exploit-victims)[Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign](https://news.sophos.com/en-us/2024/11/06/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign/)[Ymir: new stealthy ransomware in the wild](https://securelist.com/new-ymir-ransomware-found-in-colombia/114493/)[ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again](https://www.bitdefender.com/en-gb/blog/businessinsights/shrinklocker-decryptor-from-friend-to-foe-and-back-again)[Stealthy Attributes of APT Lazarus: Evading Detection with Extended Attributes](https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/)[Glove Stealer: Leveraging IElevator to Bypass App-Bound Encryption -& Steal Sensitive Data](https://www.gendigital.com/blog/news/innovation/glove-stealer)[Botnet exploits GeoVision zero-day to install Mirai malware](https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/)[Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM](https://arxiv.org/abs/2411.05982)[Chaotic-Based Shellcode Encryption: A New Strategy for Bypassing Antivirus Mechanisms](https://www.mdpi.com/2073-8994/16/11/1526)[Malware Spotlight: A Deep-Dive Analysis of WezRat](https://research.checkpoint.com/2024/wezrat-malware-deep-dive/)[APT Actors Embed Malware within macOS Flutter Applications](https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/)[Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity](https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/)[CVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wild](https://www.clearskysec.com/0d-vulnerability-exploited-in-the_wild/)[New PXA Stealer targets government and education sectors for sensitive information](https://blog.talosintelligence.com/new-pxa-stealer/)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, [newsletter](https://securityaffairs.com/170041/breaking-news/security-affairs-newsletter-round-494-by-pierluigi-paganini-international-edition.html))**

Related Tags:
NAICS: 61 – Educational Services

NAICS: 611 – Educational Services

NAICS: 923 – Administration Of Human Resource Programs

NAICS: 519 – Web Search Portals

Libraries

Archives

Other Information Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 92 – Public Administration

NAICS: 922 – Justice

Public Order

Safety Activities

NAICS: 51 – Information

WIRTE

Associated Indicators: