techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#clipboard

1 post1 participant0 posts today

Efimer Trojan delivered via email and hacked WordPress websites

The Efimer Trojan is spreading through compromised WordPress sites, malicious torrents, and email campaigns impersonating lawyers. It steals cryptocurrency by replacing wallet addresses in the clipboard and can execute additional malicious scripts. The Trojan communicates with its command-and-control server via the Tor network. It has additional capabilities to brute-force WordPress sites and harvest email addresses for further distribution. The malware primarily targeted users in Brazil, India, Spain, Russia, Italy, and Germany between October 2024 and July 2025, affecting over 5,000 Kaspersky users.

Pulse ID: 689603fc3a16a87400a387ee
Pulse Link: otx.alienvault.com/pulse/68960
Pulse Author: AlienVault
Created: 2025-08-08 14:04:44

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

FAKE TELEGRAM PREMIUM SITE DISTRIBUTES NEW LUMMA STEALER VARIANT

A malicious campaign using the domain 'telegrampremium[.]app' is distributing a new variant of Lumma Stealer malware. The fake site mimics the official Telegram Premium platform and automatically downloads an executable file 'start.exe' upon access. This sophisticated information-stealing trojan can exfiltrate browser credentials, cryptocurrency wallet details, and system information. The malware employs various techniques for persistence, defense evasion, and data theft, including file system manipulation, registry modification, and clipboard operations. The campaign highlights the ongoing use of brand impersonation and social engineering for large-scale malware distribution, emphasizing the need for robust security measures and user awareness.

Pulse ID: 688ee51c244879cbcd8b5826
Pulse Link: otx.alienvault.com/pulse/688ee
Pulse Author: AlienVault
Created: 2025-08-03 04:27:08

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Spear Phishing Campaign Delivers VIP Keylogger via Email Attachment

A sophisticated spear phishing campaign has been identified, distributing the VIP keylogger through email attachments. The malware is delivered via a ZIP file containing a malicious executable disguised as a PDF. Once executed, an AutoIt script drops two encrypted files, which are then decrypted and injected into RegSvcs.exe using process hollowing techniques. The VIP keylogger is designed to steal sensitive information by logging keystrokes, capturing credentials from popular web browsers, and monitoring clipboard activity. The campaign employs obfuscation techniques and maintains persistence through a VBS script in the Startup folder. The final payload exfiltrates data through SMTP and communicates with a command and control server.

Pulse ID: 688a355ead4c75a9701f25fd
Pulse Link: otx.alienvault.com/pulse/688a3
Pulse Author: AlienVault
Created: 2025-07-30 15:08:14

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Threat Actors Utilize ClickFix to Dominate Targeted Organizations

Recently, it was observed that threat actors have been utilizing sophisticated social
engineering techniques to deceive users into executing malicious commands. These
operations are primarily conducted through compromised websites, malvertising,
and YouTube tutorials. In addition, fake tech support forums that rely on
clipboard hijacking have also been observed in these malware deployment
campaigns. Clipboard hijacking, also known as pastejacking, involves injecting
harmful scripts into a victim’s clipboard, which users are then instructed to execute
via the Run dialog or Windows shortcut keys. This method has proven to be highly
effective for threat actors, as it can lead to full organizational takeovers, data
exfiltration, and ransomware deployments.

Pulse ID: 6872e095ee3ea12bb08911d5
Pulse Link: otx.alienvault.com/pulse/6872e
Pulse Author: cryptocti
Created: 2025-07-12 22:24:21

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
Continued thread

While we await proper details about the "on device" #AI models that #Apple mentioned during the macOS segment of the #WWDC keynote, here is what I am most excited about from Apple's 2026 operating systems.

Cross-OS features:
- #LiveTranslation (finally)
- #Polls in the #Messages!
- #HoldAssist? TBD

#macOS
- #Spotlight actions (with #QuickKeys)
- #Clipboard history
- New #Shortcuts (and "Intelligent actions")
- Custom folder colors!
- Now with the #Phone app!
- More control center customization

#iPadOS
- See post above
- Mac's red-yellow-green window control buttons
- Also getting the Phone app!

#watchOS
- The #WristFlick gesture? We'll see.
- Configurable #widgets? Maybe.

My current workflows probably won't benefit from
- the "liquid" or "glass" aesthetic
- a #WorkoutBuddy (no more voices talking to me during workouts, please)
- the #Games app
- anything #tvOS, #visionOS, #emoji

What excited you?

What disappointed you?

What surprised you?

What was missing from your wish list?