In August 2025, Australian authorities issued multiple scam alerts after users reported suspicious Facebook groups promoting “active senior trips.” What initially appeared as harmless community gatherings concealed a sophisticated mobile malware operation. ThreatFabric researchers uncovered that these groups were managed by fraudsters who lured seniors into downloading a malicious Android Trojan they have dubbed “Datzbro.” […]
AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, “Workflow Clarity: Where AI Fits in Modern Automation,” with Thomas Kinsella, Co-founder & Chief Customer Officer at Tines, to explore how leading teams are cutting through the hype and building workflows that actually deliver.The rise of AI has changed how organizations think about automation.
A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions.
OpenShift AI is a platform for managing the lifecycle of predictive and generative artificial intelligence (GenAI) models at scale and across hybrid cloud environments. It also facilitates data
The digital landscape in 2025 is characterized by unprecedented connectivity and an equally sophisticated array of cyber threats. Organizations face a constant barrage of attacks targeting their data, infrastructure, and reputation. Selecting the right cybersecurity partners has become a mission-critical decision, directly impacting an organization’s ability to thrive and survive in this dynamic environment. This […]
JFrog’s security research team has identified a malicious PyPI package named SoopSocks that masquerades as a legitimate SOCKS5 proxy utility while stealthily implanting a backdoor on Windows systems. This package leverages automated installation, advanced persistence techniques, and real-time network reconnaissance to establish a covert egress channel, putting organizational networks at significant risk. While monitoring PyPI […]
WestJet Airlines has confirmed that a recent cybersecurity incident exposed certain personal information belonging to its customers. The Canadian carrier says the breach took place in mid-June and was discovered on June 13, 2025. Company officials stress that the situation is now resolved and that no financial account data or passwords were compromised. What Happened […]
Since mid-2025, cybersecurity researchers have tracked a resurgence of Patchwork Advanced Persistent Threat (APT) campaigns targeting government and telecommunications sectors across Asia and Eastern Europe.
Initially leveraging spear-phishing emails containing malicious Office document attachments, this latest wave of activity has evolved into a multi-stage infection chain employing sophisticated persistence and payload retrieval tactics.
The initial intrusion typically begins when an unsuspecting user enables macros in a weaponized Word document, triggering an embedded PowerShell script that silently reaches out to a command-and-control server.
From there, Patchwork’s operators establish a foothold, harvest credentials, and maintain long-term access within compromised networks.
In recent weeks, K7 Security Labs analysts noted that the PowerShell component responsible for persistence had been enhanced with dynamic URL generation and randomized scheduled task names to evade detection by endpoint monitoring solutions.
Analysts identified a shift from static command URLs to a multi-URL failover mechanism, ensuring that if one download source is blocked, subsequent attempts still succeed.
This refinement underscores the group’s focus on defeating conventional network-based detection controls by distributing payload hosting across multiple compromised web servers.
The impact of these operations has ranged from credential theft to the deployment of custom remote access tools, enabling lateral movement and data exfiltration.
Victims report CPU spikes and anomalous outbound HTTP requests occurring at regular intervals, indicative of scheduled task execution.
Collecting System information (Source – K7 Security Labs)
In several instances, the operators have deployed a final payload that leverages legitimate Windows binaries to load malicious DLLs into memory, complicating forensic analysis.
The observed payloads vary from password-dumping utilities to bespoke C2 frameworks capable of executing arbitrary commands and staging additional modules on demand.
Infection Mechanism via Scheduled Tasks
A deep dive into Patchwork’s infection mechanism reveals how it leverages native Windows utilities to orchestrate its payload execution.
Upon execution of the initial PowerShell downloader, the malware generates a unique task name, often resembling standard Windows maintenance services.
The following PowerShell snippet, recovered from an incident response log, illustrates the core of this persistence tactic:-
This scheduled task runs silently at frequent intervals, downloading and executing the final payload without writing files to disk.
The use of Invoke-Expression (IEX) combined with New-Object Net.WebClient allows the malware to stream scripts directly into memory, bypassing file-based detection.
Once the secondary payload is loaded, the operators gain full interactive access via a custom backdoor, enabling credential harvesting and lateral movement.
By abusing legitimate Windows task scheduling and networking APIs, Patchwork APT successfully blends into normal system activity, posing significant challenges for defenders attempting to differentiate malicious behavior from routine maintenance operations.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
NVIDIA has issued a critical security bulletin revealing multiple vulnerabilities in its NVIDIA App software that can enable attackers to escalate privileges on Windows systems. The flaws, addressed in the September 2025 update, stem from improper file handling during the installation of Frameview SDK components. Users of NVIDIA App on Windows 10 and 11 are […]
Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s cyber defense landscape: mounting pressure to remain silent after breaches, a gap between leadership and frontline teams, and a growing urgency to shrink the enterprise attack surface.
The annual research combines insights from over 1,200 IT and security professionals across six countries, along with an
Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022.
French cybersecurity company SEKOIA said the attackers are exploiting the cellular router’s API to send malicious SMS messages containing phishing URLs, with the campaigns primarily targeting Sweden, Italy,