Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[Finding Malware: Unveiling PLAYFULGHOST with Google Security Operations](https://www.googlecloudcommunity.com/gc/Community-Blog/Finding-Malware-Unveiling-PLAYFULGHOST-with-Google-Security/ba-p/850676)[Scam Sniffer 2024: Web3 Phishing Attacks — Wallet Drainers Drain $494 Million](https://drops.scamsniffer.io/scam-sniffer-2024-web3-phishing-attacks-wallet-drainers-drain-494-million/)[EAGERBEE, with updated and novel components, targets the Middle East](https://securelist.com/eagerbee-backdoor/115175/)[Gayfemboy: A Botnet Deliver Through a Four-Faith Industrial Router 0-day Exploit](https://blog.xlab.qianxin.com/gayfemboy-en/)[Top 5 Malware Threats to Prepare Against in 2025](https://thehackernews.com/2025/01/top-5-malware-threats-to-prepare.html)[NonEuclid RAT](https://www.cyfirma.com/research/noneuclid-rat/)[Cracking the Code: How Banshee Stealer Targets macOS Users](https://blog.checkpoint.com/research/cracking-the-code-how-banshee-stealer-targets-macos-users/)[Recruitment Phishing Scam Imitates CrowdStrike Hiring Process](https://www.crowdstrike.com/en-us/blog/recruitment-phishing-scam-imitates-crowdstrike-hiring-process/)[Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware](https://arxiv.org/abs/2501.04848)[Integrating Explainable AI for Effective Malware Detection in Encrypted Network Traffic](https://arxiv.org/abs/2501.05387)[A Malware-Detection Method Using Deep Learning to Fully Extract API Sequence Features](https://www.mdpi.com/2079-9292/14/1/167)[Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit](https://www.trendmicro.com/en_us/research/25/a/information-stealer-masquerades-as-ldapnightmare-poc-exploit.html)[Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain](https://www.recordedfuture.com/research/reddelta-chinese-state-sponsored-group-targets-mongolia-taiwan-southeast-asia)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, malware)**
Related Tags:
NAICS: 921 – Executive
Legislative
Other General Government Support
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
NAICS: 924 – Administration Of Environmental Quality Programs
Thoper
Kaba
Korplug
Associated Indicators: