Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

Thousands of Grok chats are now searchable on Google

New Zero-Day startup offers $20 million for a tool that can hack your smartphone

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Noodle malware campaign expands global reach with copyright fishing lures
Identity

Noodle malware campaign expands global reach with copyright fishing lures

userBy userAugust 18, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

August 18, 2025Ravi LakshmananMalware/Enterprise Security

Threat actors behind the noodle malware are leveraging spear phishing emails and updated delivery mechanisms to launch information stealing in attacks targeting businesses in the US, Europe, the Baltic countries and the Asia-Pacific region (APAC).

“Over a year, the noodle campaign has been active, leveraging advanced spear phishing emails as a piracy notification coordinated with details from reconnaissance, such as specific Facebook page IDs and company ownership information,” Morphisec researcher Shmuel Uzan said in a report in a common report with Hacker News.

The noodles were previously detailed in May 2025 by cybersecurity vendors, and are being used by attackers using fake artificial intelligence (AI) as lures to propagate malware. We found that these counterfeiting programs are being promoted on social media platforms like Facebook.

Cybersecurity

However, adoption of copyright infringing lures is not a new development. In November 2024, Checkpoint dropped Rhadamanthys Stealer after discovering a massive phishing effort targeting individuals and organizations under the false premise of a copyright violation.

However, the latest iterations of noodle attacks show significant deviations, particularly when it comes to legitimate software vulnerabilities, esoteric staging through telegrams, and dynamic payload execution.

It all starts with a phishing email aimed at tricking employees into downloading and running malicious payloads by claiming copyright violations on a specific Facebook page and inducing false sense of urgency. The message comes from your Gmail account to avoid doubt.

In the message, there is a Dropbox link that drops a ZIP or MSI installer. This will use the malicious DLL with the legitimate binary associated with Haihaisoft PDF Reader to launch the obfuscated noodle theft, but before running the batch script and establishing persistence using Windows Registry,

What’s noteworthy about attack chains is that they leverage the Telegram group description as a dead-drop resolver to get the actual server (“Paste[.]rs”) Host Stealer Payload and challenge detection and takedown efforts.

“This approach is based on previous campaign techniques (e.g., base64 encoded archives, lolbin abuse like certutil.exe), but it also adds a layer of avoidance through telegram-based command-and-control and in-memory execution to avoid disk-based detection,” Uzan said.

Identity Security Risk Assessment

Noodlophile is a full-fledged steeler that can capture data from a web browser and collect system information. Steeler source code analysis demonstrates ongoing development efforts to extend capabilities that facilitate screenshot capture, keylogs, file removal, process monitoring, network information collection, file encryption, and browser history extraction.

“The broad targeting of browser data emphasizes the campaign’s focus on companies with a critical social media footprint, especially on platforms like Facebook,” Morphisec said. “These unimplemented features show that Steeler developers are actively working to expand their capabilities, potentially turning it into a more versatile and dangerous threat.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTexas Attorney General accuses meta of misleading children’s characters, mental health claims
Next Article The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know
user
  • Website

Related Posts

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

August 20, 2025

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

August 20, 2025

Discover and control Shadow AI agents in your company before hackers do it

August 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

FBI warns FSB-linked hackers exploiting Patchededed Cisco devices for Cyber Spionage

Thousands of Grok chats are now searchable on Google

New Zero-Day startup offers $20 million for a tool that can hack your smartphone

Experts have discovered that AI browsers can be tricked by ProsptFix exploits to run malicious hidden prompts

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

What’s Wrong with the Web? Tim Berners-Lee Speaks Out in Rare Interview

The Next Frontier: NYC Island Becomes Epicenter for Climate Solutions

The AI-Powered Career Path: How TwinH by FySelf Evolves Your Digital Professional Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.