Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–[Cellebrite zero-day exploit used to target phone of Serbian student activist](https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/)[One in Four Cyberattacks in 2024 Traced to Infostealers, Huntress Reports](https://www.infostealers.com/article/one-in-four-cyberattacks-in-2024-traced-to-infostealers-huntress-reports/)[Uncovering .NET Malware Obfuscated by Encryption and Virtualization](https://unit42.paloaltonetworks.com/malware-obfuscation-techniques/)[Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal](https://www.trendmicro.com/en_us/research/25/b/black-basta-cactus-ransomware-backconnect.html)[Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes](https://www.humansecurity.com/learn/blog/satori-threat-intelligence-disruption-badbox-2-0/)[Fingerprint Heists: How your browser fingerprint can be stolen and used by fraudsters](https://www.group-ib.com/blog/fingerprint-heists/)[Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom](https://thehackernews.com/2025/03/medusa-ransomware-hits-40-victims-in.html)[Thousands of websites hit by four backdoors in 3rd party JavaScript attack](https://cside.dev/blog/thousands-of-websites-hit-by-four-backdoors-in-3rd-party-javascript-attack)[Infostealer Campaign against ISPs](https://www.splunk.com/en_us/blog/security/infostealer-campaign-against-isps.html)[Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware](https://www.proofpoint.com/us/blog/threat-insight/call-it-what-you-want-threat-actor-delivers-highly-targeted-multistage-polyglot)[New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran](https://www.greynoise.io/blog/new-ddos-botnet-discovered)[The evolution of Dark Caracal tools: analysis of a campaign featuring Poco RAT](https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/the-evolution-of-dark-caracal-tools-analysis-of-a-campaign-featuring-poco-rat)[Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools](https://blog.talosintelligence.com/lotus-blossom-espionage-group/)[Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation](https://arxiv.org/abs/2503.04302)[Malware Classification from Memory Dumps Using Machine Learning, Transformers, and Large Language Models](https://arxiv.org/abs/2503.02144)[Self-MCKD: Enhancing the Effectiveness and Efficiency of Knowledge Transfer in Malware Classification](https://www.mdpi.com/2079-9292/14/6/1077)[Is Malware Detection Needed for Android TV?](https://www.mdpi.com/2076-3417/15/5/2802)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, [malware](https://securityaffairs.com/174816/malware/security-affairs-malware-newsletter-round-35.html))**
Related Tags:
Lotus Blossom
Spring Dragon
DRAGONFISH
RADIUM
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 52 – Finance And Insurance
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
Associated Indicators:


