The Pidgin messaging app has recently removed the ScreenShareOTR plugin from its official third-party plugin list after it was discovered to contain malware. Initially promoted as a secure screen-sharing tool for the Off-The-Record (OTR) protocol the plugin was found to install keyloggers, information stealers, and Dark Gate malware used for gaining unauthorized access to corporate networks. The malicious plugin, available for both Windows and Linux, was listed on Pidgin’s plugin repository from July 6 to August 16, 2024. Users reported suspicious activity, leading to the plugin’s removal. Notably the ScreenShareOTR only provided binaries without source code, a red flag that went unnoticed due to insufficient review mechanisms in Pidgin’s repository. ESET’s investigation revealed that the plugin installer was signed with a valid digital certificate from INTERREX SP. Z O.O., a legitimate Polish company. The plugin while offering legitimate screen-sharing functions and also allowed the download of additional malicious payloads which includes PowerShell scripts and DarkGate malware in which were also signed by the same Interrex certificate. Similar tactics were used for other plugins hosted on the same malicious server, which has now been taken down. Affected users are advised to remove the ScreenShareOTR plugin immediately and perform a full system scan with a trusted antivirus tool.
A malicious supply chain campaign has been identified targeting Python developers through trojanized packages hosted on the Python Package Index (PyPI). The attackers disguised a f...
Hackers are leveraging weaponized Windows shortcut (LNK) files and GitHub infrastructure to carry out a stealthy, multi-stage malware campaign targeting organizations in South Kore...
A critical vulnerability (CVE-2026-34976) has been discovered in the Dgraph database, allowing unauthenticated attackers to bypass built-in security controls and gain administrativ...