Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-[Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs](https://tinyhack.com/2025/03/13/decrypting-encrypted-files-from-akira-ransomware-linux-esxi-variant-2024-using-a-bunch-of-gpus/)[Jaguar Land Rover Breached by HELLCAT Ransomware Group Using Its Infostealer Playbook—Then a Second Hacker Strikes](https://www.infostealers.com/article/jaguar-land-rover-breached-by-hellcat-ransomware-using-its-infostealer-playbook-then-a-second-hacker-strikes/)[ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery](https://blog.sekoia.io/clearfakes-new-widespread-variant-increased-web3-exploitation-for-malware-delivery/)[Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes](https://www.humansecurity.com/learn/blog/satori-threat-intelligence-disruption-badbox-2-0/)[StilachiRAT analysis: From system reconnaissance to cryptocurrency theft](https://www.microsoft.com/en-us/security/blog/2025/03/17/stilachirat-analysis-from-system-reconnaissance-to-cryptocurrency-theft/)[IAS Threat Lab Uncovers Extensive Fraud Scheme Leveraging Fake Android Apps](https://integralads.com/insider/ias-threat-lab-fraud-scheme-fake-android-apps/)[UAC-0200: Espionage against the defense-industrial complex using DarkCrystal RAT (CERT-UA#14045)](https://cert.gov.ua/article/6282737)[Technical Advisory: Mass Exploitation of CVE-2024-4577](https://www.bitdefender.com/en-us/blog/businessinsights/technical-advisory-update-mass-exploitation-cve-2024-4577)[Arcane stealer: We want all your data](https://securelist.com/arcane-stealer/115919/)[Shedding light on the ABYSSWORKER driver](https://www.elastic.co/security-labs/abyssworker)[RansomHub: Attackers Leverage New Custom Backdoor](https://www.security.com/threat-intelligence/ransomhub-betruger-backdoor)[Head Mare and Twelve join forces to attack Russian entities](https://securelist.com/head-mare-twelve-collaboration/115887/)[Steam pulls game demo infecting Windows with info-stealing malware](https://www.bleepingcomputer.com/news/security/steam-pulls-game-demo-infecting-windows-with-info-stealing-malware/)[Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection](https://arxiv.org/abs/2503.11841)[Enhancing Malware Fingerprinting through Analysis of Evasive Techniques](https://arxiv.org/abs/2503.06495)[A Wide and Weighted Deep Ensemble Model for Behavioral Drifting Ransomware Attacks](https://www.mdpi.com/2227-7390/13/7/1037)[Trandroid: An Android Mobile Threat Detection System Using Transformer Neural Networks](https://www.mdpi.com/2079-9292/14/6/1230)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, [malware](https://securityaffairs.com/174816/malware/security-affairs-malware-newsletter-round-35.html))**
Related Tags:
Akira
PUNK SPIDER
CVE-2024-4577
NAICS: 334 – Computer And Electronic Product Manufacturing
NAICS: 519 – Web Search Portals
Libraries
Archives
Other Information Services
NAICS: 336 – Transportation Equipment Manufacturing
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
NAICS: 33 – Manufacturing – Metal
Electronics And Other
Associated Indicators:


