Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-Malware Newsletter[Astaroth: Banking Trojan Abusing GitHub for Resilience](https://www.mcafee.com/blogs/other-blogs/mcafee-labs/astaroth-banking-trojan-abusing-github-for-resilience/)[North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads](https://socket.dev/blog/north-korea-contagious-interview-campaign-338-malicious-npm-packages)[New Rust Malware ‘ChaosBot’ Uses Discord for Command and Control](https://www.esentire.com/blog/new-rust-malware-chaosbot-uses-discord-for-command-and-control)[Weaponizing Discord for Command and Control Across npm, PyPI, and RubyGems.org](https://socket.dev/blog/weaponizing-discord-for-command-and-control)[When the monster bytes: tracking TA585 and its arsenal](https://www.proofpoint.com/us/blog/threat-insight/when-monster-bytes-tracking-ta585-and-its-arsenal)[TigerJack’s Extensions Continue to Rob Developers Blind Across Different Marketplaces](https://www.koi.ai/blog/tiger-jack-malicious-vscode-extensions-stealing-code)[LinkPro: eBPF rootkit analysis](https://www.synacktiv.com/en/publications/linkpro-ebpf-rootkit-analysis)[New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware](https://cloud.google.com/blog/topics/threat-intelligence/unc5142-etherhiding-distribute-malware)[Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits](https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html)[Jewelbug: Chinese APT Group Widens Reach to Russia](https://www.security.com/threat-intelligence/jewelbug-apt-russia)[DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains](https://cloud.google.com/blog/topics/threat-intelligence/dprk-adopts-etherhiding)[Operation MotorBeacon : Threat Actor targets Russian Automotive Sector using .NET Implant](https://www.seqrite.com/blog/seqrite-capi-backdoor-dotnet-stealer-russian-auto-commerce-oct-2025/)[BeaverTail and OtterCookie evolve with a new Javascript module](https://blog.talosintelligence.com/beavertail-and-ottercookie/)[Operation Silk Lure: Scheduled Tasks Weaponized for DLL Side-Loading (drops ValleyRAT)](https://www.seqrite.com/blog/operation-silk-lure-scheduled-tasks-weaponized-for-dll-side-loading-drops-valleyrat/)[Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia](https://www.fortinet.com/blog/threat-research/tracking-malware-and-attack-expansion-a-hacker-groups-journey-across-asia)[Applying Graph Analysis for Unsupervised Fast Malware Fingerprinting](https://arxiv.org/abs/2510.12811)[Quantum Computing Methods for Malware Detection](https://arxiv.org/abs/2510.06803)[From Continuous Integer-Order to Fractional Discrete-Time: A New Computer Virus Model with Chaotic Dynamics](https://www.mdpi.com/2227-7080/13/10/471)[A Railway Mobile Terminal Malware Detection Method Based on SE-ResNet](https://www.mdpi.com/2076-3417/15/19/10760)Follow me on Twitter: [@securityaffairs](https://twitter.com/securityaffairs) and [Facebook](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[Pierluigi Paganini](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)([SecurityAffairs](http://securityaffairs.co/wordpress/) — hacking, [newsletter](https://securityaffairs.com/182960/malware/security-affairs-malware-newsletter-round-65.html))
Related Tags:
NAICS: 334 – Computer And Electronic Product Manufacturing
NAICS: 336 – Transportation Equipment Manufacturing
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 33 – Manufacturing – Metal
Electronics And Other
NAICS: 51 – Information
Disco
Guildma
Astaroth
Associated Indicators:


