Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-[CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure](https://www.cisa.gov/news-events/alerts/2025/03/28/cisa-releases-malware-analysis-report-resurge-malware-associated-ivanti-connect-secure)[Unboxing Anubis: Exploring the Stealthy Tactics of FIN7’s Latest Backdoor](https://www.gdatasoftware.com/blog/2025/03/38161-analysis-fin7-anubis-backdoor)[Advancements in delivery: Scripting with Nietzsche](https://www.acronis.com/en-us/cyber-protection-center/posts/advancements-in-delivery-scripting-with-nietzsche/)[Analyzing New HijackLoader Evasion Tactics](https://www.zscaler.com/blogs/security-research/analyzing-new-hijackloader-evasion-tactics)[Malicious Python packages target popular Bitcoin library](https://www.reversinglabs.com/blog/malicious-python-packages-target-popular-bitcoin-library)[New version of Triada steals cryptocurrency, messenger accounts and replaces phone numbers during calls](https://www.kaspersky.ru/about/press-releases/novaya-versiya-triada-kradyot-kriptovalyutu-akkaunty-v-messendzherah-i-podmenyaet-nomera-telefonov-vo-vremya-zvonkov)[Hidden Malware Strikes Again: Mu-Plugins Under Attack](https://blog.sucuri.net/2025/03/hidden-malware-strikes-again-mu-plugins-under-attack.html)[Gamaredon campaign abuses LNK files to distribute Remcos backdoor](https://blog.talosintelligence.com/gamaredon-campaign-distribute-remcos/)[DarkCloud Malware Analysis](https://rexorvc0.com/2025/03/31/DarkCloud/)[The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques](https://www.trendmicro.com/en_us/research/25/c/the-espionage-toolkit-of-earth-alux.html)[UAC-0219: Cyber espionage using PowerShell stealer WRECKSTEEL](https://cert.gov.ua/article/6282902)[MaLAware: Automating the Comprehension of Malicious Software Behaviours using Large Language Models (LLMs)](https://arxiv.org/abs/2504.01145)[Advanced Financial Fraud Malware Detection Method in the Android Environment](https://www.mdpi.com/2076-3417/15/7/3905)[AOAFS: A Malware Detection System Using an Improved Arithmetic Optimization Algorithm](https://www.mdpi.com/2227-7080/13/4/145)[Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code](https://arxiv.org/abs/2504.01481)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, [malware](https://securityaffairs.com/174816/malware/security-affairs-malware-newsletter-round-35.html))**
Related Tags:
NAICS: 519 – Web Search Portals
Libraries
Archives
Other Information Services
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
NAICS: 51 – Information
NAICS: 928 – National Security And International Affairs
Blog: Security Affairs
Remcos
Associated Indicators:


