Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

In the end Meta decided not to shut down Horizon Worlds on VR

FBI seizes website of pro-Iranian hacker group following devastating hack by Stryker

FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New malware campaigns highlight the rise in AI and the risks of phishing
Identity

New malware campaigns highlight the rise in AI and the risks of phishing

By September 9, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rising AI and phishing risks

Cybersecurity researchers have revealed details of a phishing campaign that provides a remote access trojan that has been turned into stealth banking malware called Master Rats.

Phishing attacks incorporate many advanced evasion techniques, extending functionality by providing full control over compromised systems, Siphon-sensitive data and providing secondary plugins, says Fortinet Fortiguard Labs.

“This includes the use of a simple programming language (EPL) to develop step-by-step payloads, hiding malicious operations, disabling security tools to prevent alert triggers, ensuring command-and-control (C2) communication using mutual TLS (MTL), supporting various ways to deploy additional payloads, and installing popular remote tools.

EPL is an ambiguous visual programming language that supports traditional Chinese, simplified Chinese, English and Japanese variants. This is primarily intended for users who are not proficient in English.

Designed primarily to target Japanese users, emails are Microsoft Word files that embed ZIP archives by leveraging lures associated with business inquiries and clicking on malicious links that go to infected sites to deceive recipients.

Audit and subsequent

The executable file that resides in the ZIP file is an executable that triggers the execution of Mosterat and is used to drop several tools such as AnyDesk, Tigervnc, TigeVNC, etc. using modules written in EPL. A notable aspect of malware is its ability to disable Windows security mechanisms and block network traffic related to a hard-coded list of security programs.

“This traffic blocking technique is similar to the known red team tool “Edrsilencer.” This uses Windows Filtering Platform (WFP) filters to prevent filters from using multiple stages of the network communications stack, connecting to the server and sending detection data, alerts, event logs, or other telemetry,” says Wan.

The other is a function that runs as TrustEdInStaller, an internal Windows system account with high privileges, allowing you to interfere with important Windows processes, modify Windows registry entries, and delete system files.

Additionally, one of the modules deployed by Mothererat is equipped to monitor foreground window activity related to Alibaba’s seller tools, log keystrokes, sending heartbeat signals to external servers, and Qianniu related to process commands issued by the server.

The command collects details of the victim’s host, runs a DLL, EPK, or EXE file, reads shellcode, reads/deletes files, inserts EXE into svChost.exe using early bird injection, enumerates users, captures screenshots, promotes RDP logins, and even creates and adds hidden users to the administrators group.

“These tactics significantly increase the difficulty of detection, prevention and analysis,” Fortinet said. “In addition to updating solutions, it remains essential to educate users about the dangers of social engineering.”

Clickfix gets another novel twist

The findings coincide with the emergence of another campaign that employs “Clickfix-Ensque Technique,” and distribute a commodity information steeler known as Metastealer to users searching for tools like AnyDesk.

The attack chain will provide a fake Cloudflare turnstyle page before downloading the expected anydesk installer and ask you to click on the check box to complete the confirmation step. However, this action triggers a pop-up message asking you to open Windows File Explorer.

When Windows File Explorer is opened, the PHP code hidden in the turnstyle verification page is configured to use the “Search MS:” URI protocol handler.

The LNK file activates a series of steps to collect host names and executes an MSI package that is responsible for the removal of Metastealer.

“These types of attacks that require some degree of manual interaction from the victim work to “fix” the broken process itself, which may allow you to bypass the security solution,” Huntress said. “Threat officials continue to move the needle with the infection chain, throwing the wrench into detection and prevention.”

CIS Build Kit

This disclosure is also made as CloudSek has detailed a new adaptation of Clickfix social engineering tactics that weaponize AI systems using CSS-based obfuscation methods and create a summary containing the instructions for clickfixes controlled by attackers.

Proof-of-concept (POC) attacks are achieved using a strategy called prompt overdose. This strategy is extensively embedded in HTML content to dominate the context window of large language models to manipulate the output.

“This approach targets summaries embedded in applications such as email clients, browser extensions, and productivity platforms,” ​​the company said. “By leveraging trust users’ locations in AI-generated summaries, this method secretly provides malicious, step-by-step instructions that can facilitate ransomware deployment.”

“Prompt Overdose is an operational technique that overwhels the context window of an AI model with dense, repetitive content and controls the output. By saturating input with text selected by the attacker, legitimate context is pushed aside, and model attention is pulled back to the injected payload.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRethinking methane emissions in the global food system
Next Article Transforming treatment for pulmonary hypertension

Related Posts

FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

March 19, 2026

New Perseus Android banking malware monitors Notes app and extracts sensitive data

March 19, 2026

How Ceros gives security teams visibility and control over their code

March 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

In the end Meta decided not to shut down Horizon Worlds on VR

FBI seizes website of pro-Iranian hacker group following devastating hack by Stryker

FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

Alphabet X spins out again to pursue one of the world’s most expensive bureaucratic nightmares

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.