Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Advanced PFAS treatment technology: innovation and development

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Noodle malware campaign expands global reach with copyright fishing lures
Identity

Noodle malware campaign expands global reach with copyright fishing lures

userBy userAugust 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 18, 2025Ravi LakshmananMalware/Enterprise Security

Threat actors behind the noodle malware are leveraging spear phishing emails and updated delivery mechanisms to launch information stealing in attacks targeting businesses in the US, Europe, the Baltic countries and the Asia-Pacific region (APAC).

“Over a year, the noodle campaign has been active, leveraging advanced spear phishing emails as a piracy notification coordinated with details from reconnaissance, such as specific Facebook page IDs and company ownership information,” Morphisec researcher Shmuel Uzan said in a report in a common report with Hacker News.

The noodles were previously detailed in May 2025 by cybersecurity vendors, and are being used by attackers using fake artificial intelligence (AI) as lures to propagate malware. We found that these counterfeiting programs are being promoted on social media platforms like Facebook.

Cybersecurity

However, adoption of copyright infringing lures is not a new development. In November 2024, Checkpoint dropped Rhadamanthys Stealer after discovering a massive phishing effort targeting individuals and organizations under the false premise of a copyright violation.

However, the latest iterations of noodle attacks show significant deviations, particularly when it comes to legitimate software vulnerabilities, esoteric staging through telegrams, and dynamic payload execution.

It all starts with a phishing email aimed at tricking employees into downloading and running malicious payloads by claiming copyright violations on a specific Facebook page and inducing false sense of urgency. The message comes from your Gmail account to avoid doubt.

In the message, there is a Dropbox link that drops a ZIP or MSI installer. This will use the malicious DLL with the legitimate binary associated with Haihaisoft PDF Reader to launch the obfuscated noodle theft, but before running the batch script and establishing persistence using Windows Registry,

What’s noteworthy about attack chains is that they leverage the Telegram group description as a dead-drop resolver to get the actual server (“Paste[.]rs”) Host Stealer Payload and challenge detection and takedown efforts.

“This approach is based on previous campaign techniques (e.g., base64 encoded archives, lolbin abuse like certutil.exe), but it also adds a layer of avoidance through telegram-based command-and-control and in-memory execution to avoid disk-based detection,” Uzan said.

Identity Security Risk Assessment

Noodlophile is a full-fledged steeler that can capture data from a web browser and collect system information. Steeler source code analysis demonstrates ongoing development efforts to extend capabilities that facilitate screenshot capture, keylogs, file removal, process monitoring, network information collection, file encryption, and browser history extraction.

“The broad targeting of browser data emphasizes the campaign’s focus on companies with a critical social media footprint, especially on platforms like Facebook,” Morphisec said. “These unimplemented features show that Steeler developers are actively working to expand their capabilities, potentially turning it into a more versatile and dangerous threat.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTexas Attorney General accuses meta of misleading children’s characters, mental health claims
Next Article The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know
user
  • Website

Related Posts

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

February 11, 2026

Public training opens the door to crypto mining in Fortune 500 cloud environments

February 11, 2026

Microsoft patches 59 vulnerabilities, including 6 actively exploited zero-days

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Advanced PFAS treatment technology: innovation and development

Former Founders Fund VC Sam Blond launches AI sales startup that will transform Salesforce

APT36 and SideCopy launch cross-platform RAT campaign against Indian companies

Compliance raises $20 million to help businesses manage risk and compliance

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.