acint

Infinity Stealer: New macOS Infostealer Uses ClickFix and Nuitka Compilation to Evade Detection

A sophisticated new information-stealing malware named Infinity Stealer has emerged targeting macOS systems, combining the increasingly popular ClickFix social engineering technique with advanced evasion capabilities through Nuitka compilation. According to Malwarebytes research, this represents the first documented macOS campaign combining ClickFix delivery with a Python-based infostealer compiled using Nuitka—a technique that produces native binaries far…

Read More

Iranian Handala Hackers Breach FBI Director Kash Patel’s Personal Email, Leak Photos and Documents

Iran-linked hacking group Handala Hack Team has successfully breached the personal email account of FBI Director Kash Patel, publishing photographs and documents stolen from his inbox, according to The Guardian and confirmed by the FBI. Attack Details The breach was announced by Handala on their website, where they stated that Patel “will now find his…

Read More

    ShinyHunters Claims 350GB Data Theft from European Commission’s AWS Cloud Infrastructure

    The European Commission, the executive branch of the European Union, has confirmed a significant cyberattack after the notorious ShinyHunters extortion group claimed responsibility for breaching its Amazon Web Services cloud infrastructure and stealing over 350GB of sensitive data. Attack Details On March 24, 2026, the European Commission detected malicious activity targeting its cloud infrastructure hosting…

    Read More

      Infinity Stealer: New macOS Malware Uses ClickFix Lures and Nuitka-Compiled Python Payload

      Security researchers at Malwarebytes have uncovered a new macOS infostealer called Infinity Stealer that combines the ClickFix social engineering technique with a Python payload compiled using the open-source Nuitka compiler — a first for documented macOS malware campaigns. Why Nuitka Matters Unlike PyInstaller, which bundles Python with bytecode that analysts can often extract and decompile,…

      Read More

      FBI Alert: Iranian MOIS Hackers Weaponize Telegram for Global Espionage Against Dissidents

      The FBI has issued a public alert warning that Iranian government hackers affiliated with the Ministry of Intelligence and Security (MOIS) are actively weaponizing Telegram as a command-and-control (C2) platform to conduct espionage operations against dissidents, opposition groups, and journalists worldwide. Attack Chain: From Social Engineering to Full Device Compromise The sophisticated attack campaign begins…

      Read More

      Iranian Handala Hackers Breach FBI Director Kash Patel’s Personal Email Account

      In a significant escalation of Iranian cyber operations against U.S. government officials, the Iran-linked hacktivist group Handala has successfully compromised the personal email account of FBI Director Kash Patel. The breach, confirmed by the FBI on March 27, 2026, resulted in the publication of photographs and documents from Patel’s Gmail account. Attack Details Handala posted…

      Read More

      Pro-Ukraine Bearlyfy Group Deploys Custom GenieLocker Ransomware Against 70+ Russian Companies

      A pro-Ukrainian hacking group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since January 2025, with recent operations deploying a proprietary Windows ransomware strain called GenieLocker, according to research from Russian security vendor F6 via The Hacker News. Dual-Purpose Operations Bearlyfy (also known as Labubu) operates with dual objectives:…

      Read More

      Chinese APT Red Menshen Plants Stealthy BPFdoor Backdoors in Global Telecom Networks

      A months-long investigation by Rapid7 Labs has exposed a sophisticated state-sponsored espionage campaign by the China-nexus threat actor Red Menshen, which has embedded some of the most covert digital sleeper cells ever documented inside global telecommunications infrastructure. Why It Matters Telecommunications networks carry government communications, authenticate subscriber identities, coordinate critical industries, and process signaling flows…

      Read More

      Red Menshen Plants BPFdoor Backdoors in Global Telecom Networks for Long-Term Espionage

      A comprehensive investigation by Rapid7 Labs has exposed a sophisticated, state-sponsored espionage campaign by the China-nexus threat actor Red Menshen, revealing one of the most covert digital sleeper cell operations ever documented within global telecommunications infrastructure. The campaign represents a deliberate shift from opportunistic hacking to long-term pre-positioning within the very backbone networks that underpin…

      Read More

      Pawn Storm Deploys PRISMEX Malware Suite Against Ukrainian Defense Supply Chain and NATO Allies

      Russia-aligned APT group Pawn Storm (APT28/Fancy Bear) has launched an aggressive campaign deploying a sophisticated new malware suite dubbed PRISMEX against Ukrainian defense infrastructure and NATO logistics partners across Central and Eastern Europe. Campaign Overview The campaign, active since September 2025 and significantly escalating in January 2026, targets the operational backbone of Ukrainian defense and…

      Read More