According to sources, cybercriminals seeking financial gain have been observed adapting their strategies within the Casbaneiro banking malware family by gaining full administrative privileges on compromised machines via a User Account Control (UAC) bypass technique, making detection and execution of malicious code more difficult. While their first targets were Latin American financial institutions, the modified approaches now pose a significant risk to multi-regional financial organizations. Casbaneiro, also known as Metamorfo and Ponteiro, initially appeared as a banking trojan in 2018, spreading via mass email spam campaigns aimed at the Latin American financial industry. Typically, the infection process begins with a phishing email including a malicious attachment. When opened, it starts a chain of events that lead to the deployment of banking malware to collect system metadata and fingerprint the host. A binary named Horabot is then downloaded, responsible for internally propagating the infection to other unsuspecting employees within the compromised organization. This approach adds credibility to the emails sent, as they avoid any obvious anomalies in email headers that could trigger security solutions. Attackers now employ spear-phishing emails embedded with links to HTML files that redirect targets to download RAR files, rather than relying on malicious PDF attachments with ZIP files. Another significant change involves using fodhelper.exe for UAC bypass and achieving high integrity level execution. Additionally, mock folders are created in the C:\Windows\system32 directory to copy the fodhelper.exe executable. While this specific method hasn't been used in an intrusion yet, it may serve to bypass antivirus detections or facilitate side-loading of DLLs with Microsoft-signed binaries for UAC bypass.
A critical vulnerability has been identified in PX4 Autopilot, widely used in drones and autonomous vehicles across global industries. Highlighted by Cybersecurity and Infrastructu...
Cybercriminals are now weaponizing legitimate hotel reservation data to trick travelers into surrendering their payment details. This "Reservation Hijack Scam" stands out b...
A serious security issue has been discovered in nginx-ui, which can allow attackers to take full control of a system. This vulnerability is tracked as CVE-2026-33026. The problem e...