A rising cyberattack trend in early 2025 involves the use of Dark Crystal RAT (DCRat) malware to target users via YouTube. Cybercriminals create or hijack YouTube accounts to upload videos advertising gaming cheats, cracked software, and bots, enticing gamers with promises of free perks. These videos include links directing users to file-sharing platforms, where they are tricked into downloading password-protected archives. Once extracted, these files install both the malware and deceptive decoy content on the victim’s system, granting attackers remote access and control. This attack campaign operates under a Malware-as-a-Service (MaaS) model, allowing even unskilled hackers to deploy sophisticated malware by purchasing access to the DCRat backdoor, technical support, and Command and Control (C2) infrastructure. DCRat is a highly capable remote access tool equipped with keylogging, webcam hijacking, file theft, and credential harvesting functionalities. The campaign primarily targets users in Russia, with smaller-scale infections reported in Belarus, Kazakhstan, and China. Attackers rely on distinctive domain names, often within the .RU domain, to host their C2 servers, making it easier to track this specific threat pattern. To stay protected, users should exercise caution when downloading gaming-related software, especially from unofficial sources such as cheat and crack websites. These platforms are frequently used to distribute malware, posing significant security risks. Cybersecurity experts recommend only downloading software from reputable sources, such as official developer websites or verified platforms, which implement rigorous malware screening processes to reduce the risk of infection.
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...
A new Windows malware called ResokerRAT has been discovered, which allows attackers to secretly control infected systems. This malware uses Telegram instead of traditional servers ...
A vulnerability has been identified in Google Cloud’s Vertex AI platform that could allow unauthorized users to access sensitive data associated with machine learning workloads. ...