<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: THREAT CHAIN</title>
    <description>The latest articles on Forem by THREAT CHAIN (@threatchain).</description>
    <link>https://forem.com/threatchain</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3861535%2Fe18a3da9-c1ad-41f5-8328-665ce2b9d1b8.png</url>
      <title>Forem: THREAT CHAIN</title>
      <link>https://forem.com/threatchain</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/threatchain"/>
    <language>en</language>
    <item>
      <title>CVE-2026-39337: Church Management Software Flaw Gives Attackers Complete Server Control</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Wed, 08 Apr 2026 00:41:04 +0000</pubDate>
      <link>https://forem.com/threatchain/cve-2026-39337-church-management-software-flaw-gives-attackers-complete-server-control-75a</link>
      <guid>https://forem.com/threatchain/cve-2026-39337-church-management-software-flaw-gives-attackers-complete-server-control-75a</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/cve-2026-39337-church-management-software-flaw-gives-attackers-complete-server-c-39435d2c" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. CVE-2026-39337 is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If you're running ChurchCRM to manage your congregation's data, you need to act now. A critical vulnerability allows attackers to take complete control of your server during the software's initial setup process—no username or password required.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is This CVE
&lt;/h2&gt;

&lt;p&gt;CVE-2026-39337 is a remote code execution vulnerability in ChurchCRM, a popular open-source system used by thousands of churches worldwide to manage members, donations, events, and other sensitive information. The flaw carries a perfect 10.0 CVSS score—the highest possible severity rating.&lt;/p&gt;

&lt;p&gt;Here's what makes this especially dangerous: attackers can exploit this vulnerability during ChurchCRM's setup wizard, before you've even finished installing the software. The setup process fails to properly sanitize database password input, allowing attackers to inject malicious PHP code that runs with full server privileges.&lt;/p&gt;

&lt;p&gt;This means an attacker could potentially access all church records, financial data, personal information of congregation members, and use your server as a launching pad for other attacks. What's particularly concerning is that this vulnerability exists as an incomplete fix for a previous issue (CVE-2025-62521), suggesting the original patch didn't fully address the underlying problem.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who Is At Risk
&lt;/h2&gt;

&lt;p&gt;You're affected if you're running any version of ChurchCRM prior to version 7.1.0. This includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Churches that recently installed ChurchCRM but haven't completed the setup process&lt;/li&gt;
&lt;li&gt;Organizations running older versions that haven't updated to 7.1.0&lt;/li&gt;
&lt;li&gt;Anyone who has ChurchCRM installations accessible from the internet&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The vulnerability is particularly dangerous for new installations because it's exploitable during the setup wizard—a process that typically happens when the software is first deployed and potentially most exposed.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Check
&lt;/h2&gt;

&lt;p&gt;First, determine which version of ChurchCRM you're running:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Log into your ChurchCRM admin panel&lt;/strong&gt; and look for version information in the footer or about section&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Check your installation directory&lt;/strong&gt; for a &lt;code&gt;VERSION&lt;/code&gt; file or similar&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Look at your server files&lt;/strong&gt; in the ChurchCRM root directory for version indicators&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you can't access the system normally, check your web server logs for the ChurchCRM directory path, then examine the files directly.&lt;/p&gt;

&lt;p&gt;To verify if you're vulnerable:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If your version is &lt;strong&gt;older than 7.1.0&lt;/strong&gt;, you are definitely affected&lt;/li&gt;
&lt;li&gt;If you have &lt;strong&gt;any incomplete ChurchCRM installations&lt;/strong&gt; (setup wizard accessible), you are at immediate risk&lt;/li&gt;
&lt;li&gt;If you're &lt;strong&gt;unsure of your version&lt;/strong&gt;, assume you're vulnerable until proven otherwise&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can also test if your setup wizard is accessible by navigating to &lt;code&gt;yoursite.com/churchcrm/setup/&lt;/code&gt; in a web browser. If you see the setup interface, you're potentially exposed.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Fix
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Immediate Actions (Do Today):&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Update to ChurchCRM 7.1.0 or later&lt;/strong&gt; - This is the definitive fix. Download from the official GitHub repository and follow the upgrade instructions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Block access to the setup wizard&lt;/strong&gt; if you can't update immediately. Add these rules to your web server:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Apache&lt;/strong&gt;: Add to your .htaccess file: &lt;code&gt;RewriteRule ^setup/ - [F,L]&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Nginx&lt;/strong&gt;: Add to server block: &lt;code&gt;location /setup { deny all; }&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;If you have incomplete installations&lt;/strong&gt;, take the system offline immediately until you can update.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Longer-term Actions:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Review your server access logs for suspicious activity around the &lt;code&gt;/setup/&lt;/code&gt; directory&lt;/li&gt;
&lt;li&gt;Consider changing database passwords if you suspect compromise&lt;/li&gt;
&lt;li&gt;Implement network-level restrictions to limit who can access your ChurchCRM installation during setup&lt;/li&gt;
&lt;li&gt;Set up monitoring for unauthorized access attempts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;For New Installations:&lt;/strong&gt;&lt;br&gt;
Only install ChurchCRM version 7.1.0 or later. Do not use older versions even if they appear in package repositories or cached downloads.&lt;/p&gt;

&lt;h2&gt;
  
  
  ThreatChain Coverage
&lt;/h2&gt;

&lt;p&gt;CVE-2026-39337 is already indexed in ThreatChain's CVE database at threatchain.io, where you can search for additional indicators of compromise and related threat intelligence as they become available.&lt;/p&gt;

&lt;h2&gt;
  
  
  Bottom Line
&lt;/h2&gt;

&lt;p&gt;This is a drop-everything-and-fix-it situation. With a perfect 10.0 CVSS score and no authentication required, CVE-2026-39337 represents one of the most serious vulnerabilities we've seen in church management software. The fact that it affects the setup process means even brand-new installations are at risk from day one. Update to ChurchCRM 7.1.0 immediately, and if you can't update right now, block access to the setup wizard until you can.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Action Items:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check your ChurchCRM version immediately&lt;/li&gt;
&lt;li&gt;Update to version 7.1.0 or later today&lt;/li&gt;
&lt;li&gt;Block setup wizard access if immediate updates aren't possible&lt;/li&gt;
&lt;li&gt;Review server logs for signs of compromise&lt;/li&gt;
&lt;li&gt;Verify all ChurchCRM installations in your organization are patched&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>cve202639337</category>
    </item>
    <item>
      <title>AsyncRAT: The Silent Spy That Gives Attackers Full Control of Your Computer</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Wed, 08 Apr 2026 00:40:18 +0000</pubDate>
      <link>https://forem.com/threatchain/asyncrat-the-silent-spy-that-gives-attackers-full-control-of-your-computer-5h7k</link>
      <guid>https://forem.com/threatchain/asyncrat-the-silent-spy-that-gives-attackers-full-control-of-your-computer-5h7k</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/asyncrat-the-silent-spy-that-gives-attackers-full-control-of-your-computer-4c3b97c1" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Open-source. Free. And in the hands of thousands of attackers who use it to watch your every move through your own webcam.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Picture this: you download what looks like a normal program — maybe a cracked utility, a PDF someone emailed you, or an update that popped up at just the right time. Nothing happens. No warning, no flashing screen. You go about your day.&lt;/p&gt;

&lt;p&gt;But behind the scenes, someone on the other side of the world just got the keys to your computer. They can watch your screen, read your keystrokes, open your files, and even turn on your webcam. And they can do all of this without you noticing for weeks or months.&lt;/p&gt;

&lt;p&gt;That's exactly what AsyncRAT does. And a fresh sample of it was flagged by ThreatChain on April 7, 2025 — confirmed malicious by nearly every major security tool in the industry.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is AsyncRAT, Exactly?
&lt;/h2&gt;

&lt;p&gt;AsyncRAT is a "Remote Access Trojan." Let's break that down:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Remote Access&lt;/strong&gt; means someone can control your computer from anywhere in the world, as if they were sitting at your desk.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Trojan&lt;/strong&gt; means it disguises itself as something harmless to get onto your machine — just like the wooden horse from the old Greek story.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Think of it like this: imagine handing a stranger a copy of your house key, your filing cabinet key, and a pair of binoculars pointed at your desk — except you didn't know you did it.&lt;/p&gt;

&lt;p&gt;AsyncRAT has been around since at least 2019. Its source code is publicly available on GitHub, which means any aspiring cybercriminal can grab it, customize it, and start attacking people. That accessibility is what makes it so widespread and dangerous. It's not some rare, exotic weapon — it's the criminal equivalent of a cheap handgun that anyone can get.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who Should Care About This?
&lt;/h2&gt;

&lt;p&gt;If you use a Windows computer, you're a potential target. But AsyncRAT campaigns frequently go after:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Small businesses&lt;/strong&gt; that don't have a dedicated IT security team&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Freelancers and remote workers&lt;/strong&gt; who download software from informal sources&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Anyone who opens email attachments&lt;/strong&gt; without double-checking the sender&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The malware is especially popular in campaigns targeting businesses because a single infected employee laptop can give attackers access to shared drives, email accounts, customer databases, and financial systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  This Specific Sample: What We Know
&lt;/h2&gt;

&lt;p&gt;The sample ThreatChain flagged is a small Windows executable — only about 48 kilobytes, which is tiny. For context, a single smartphone photo is usually 50 times larger. That small size is intentional: it helps the malware slip past simple size-based filters and download quickly.&lt;/p&gt;

&lt;p&gt;Here are the key details:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;code&gt;118f6f175a840830421c090e05b15358.exe&lt;/code&gt; (also seen as &lt;code&gt;Stub.exe&lt;/code&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Windows .exe (built with .NET, Microsoft's programming framework)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;~48 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Infrastructure traced to the Netherlands&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;59 out of 75&lt;/strong&gt; antivirus engines flagged it as malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256 hash&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;4c3b97c157d08ee298edb5d30fa86a3b90b04fedfbe517e7e0307b6013eacbf0&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;That 59/75 detection rate means the overwhelming majority of security tools recognize this file as dangerous. Multiple independent labs — ANY.RUN, CAPE, VMRay, Kaspersky, Intezer, and others — all independently confirmed it as AsyncRAT.&lt;/p&gt;

&lt;p&gt;The name &lt;code&gt;Stub.exe&lt;/code&gt; is telling. In the AsyncRAT ecosystem, a "stub" is the piece of malware that gets sent to the victim. The attacker uses a separate "builder" tool to create it, baking in the address of their command server and choosing what features to enable. It's like ordering a custom spy kit online: pick your options, click generate, and out pops a weapon.&lt;/p&gt;

&lt;h2&gt;
  
  
  How the Attack Actually Works
&lt;/h2&gt;

&lt;p&gt;Here's what a typical AsyncRAT infection looks like, step by step:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: The bait.&lt;/strong&gt; You receive something that looks legitimate — a phishing email with an attached "invoice," a link to download a "free tool," or a file shared through a messaging app. You click, you open, you run.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: The quiet setup.&lt;/strong&gt; The malware installs itself and takes steps to survive restarts. One technique this sample is flagged for is called &lt;strong&gt;registry persistence&lt;/strong&gt; — it writes a small entry into your Windows Registry (the system's internal configuration database) so that the malware launches every time you turn on your computer. Think of it like the malware writing its name on the guest list at a club so the bouncer lets it back in every night.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Phoning home.&lt;/strong&gt; AsyncRAT connects to a &lt;strong&gt;C2 server&lt;/strong&gt; — short for "command and control." This is the attacker's remote control. Once the connection is live, the attacker can send commands and receive data. The communication is often encrypted, which means your network monitoring tools might see traffic going out but can't easily tell what's being said.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Total control.&lt;/strong&gt; Now the attacker can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Log every keystroke&lt;/strong&gt; you type (passwords, messages, credit card numbers)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Watch your screen&lt;/strong&gt; in real time&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Browse and steal your files&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Download additional malware&lt;/strong&gt; (ransomware, cryptocurrency miners, you name it)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Activate your webcam or microphone&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This sample also includes an &lt;strong&gt;anti-debugging check&lt;/strong&gt; — a technique where the malware looks around to see if it's being examined by a security researcher. If it detects analysis tools, it can change its behavior or shut down entirely. It's like a burglar who checks for security cameras before breaking in.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Real-World Impact
&lt;/h2&gt;

&lt;p&gt;AsyncRAT infections don't usually announce themselves with a dramatic ransom note. They're quiet. That's what makes them worse in some ways.&lt;/p&gt;

&lt;p&gt;A small accounting firm might lose months of client financial records to an attacker who siphoned data slowly. A freelance designer could have their banking credentials stolen through keylogging. A startup might discover that a competitor somehow got access to their product roadmap — because an employee's laptop was compromised three months ago and nobody noticed.&lt;/p&gt;

&lt;p&gt;And because AsyncRAT is often just the &lt;em&gt;first step&lt;/em&gt;, the damage can cascade. Attackers frequently use it as a beachhead to deploy ransomware later, once they've mapped out what's valuable on your network.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Protect Yourself
&lt;/h2&gt;

&lt;p&gt;You don't need a six-figure security budget. Here are five concrete things you can do right now:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Don't open unexpected attachments — even from people you know.&lt;/strong&gt; If your "accountant" sends a surprise invoice as an .exe file, call them and ask. Attackers spoof email addresses all the time. Real invoices come as PDFs, not executable programs.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keep Windows and your apps updated.&lt;/strong&gt; Many AsyncRAT campaigns exploit known vulnerabilities that already have fixes available. Turning on automatic updates is one of the simplest, highest-impact things you can do.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Use an antivirus — and make sure it's actually running.&lt;/strong&gt; This particular sample is caught by 59 out of 75 engines. Even Windows Defender (the free antivirus built into Windows) is catching AsyncRAT variants. But it only works if it's turned on and up to date.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Never download cracked or pirated software.&lt;/strong&gt; This is one of the most common delivery methods for AsyncRAT. That "free" version of Photoshop or that game crack? There's a meaningful chance it comes bundled with a remote access trojan. The software is free because &lt;em&gt;you&lt;/em&gt; are the product.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Back up your important files to a separate location.&lt;/strong&gt; An external hard drive you disconnect after backups, or a cloud backup service. If an attacker does get in and deploys ransomware as a follow-up, your backups are your lifeline.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Bonus for IT admins and developers:&lt;/strong&gt; If you want to check whether this specific sample has touched your environment, search your systems for the SHA-256 hash listed above, or look for files named &lt;code&gt;Stub.exe&lt;/code&gt; or &lt;code&gt;umxpxlmo.exe&lt;/code&gt; in unusual locations. Monitor for unexpected outbound connections, especially from .NET processes you don't recognize.&lt;/p&gt;




&lt;p&gt;AsyncRAT isn't glamorous. It doesn't make headlines the way a massive ransomware attack does. But that's exactly why it works — it's quiet, it's cheap, it's everywhere, and it gives attackers everything they need to ruin your day, your quarter, or your business. The good news? Basic security hygiene stops most of these attacks cold. You don't have to be a cybersecurity expert. You just have to be a little bit careful.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>asyncrat</category>
    </item>
    <item>
      <title>ACRStealer: The Hidden Threat Disguised as a Google Verification File</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Tue, 07 Apr 2026 19:16:45 +0000</pubDate>
      <link>https://forem.com/threatchain/acrstealer-the-hidden-threat-disguised-as-a-google-verification-file-j4</link>
      <guid>https://forem.com/threatchain/acrstealer-the-hidden-threat-disguised-as-a-google-verification-file-j4</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/acrstealer-the-hidden-threat-disguised-as-a-google-verification-file-de5691a0" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Your security tools might have missed this one. ACRStealer is actively targeting networks right now — here's what you need to know before it hits yours.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Picture this: you're a freelance designer, and a client sends over what looks like a Google verification plugin. The file name even says "verificationgoogle." You double-click it without a second thought. Within sixty seconds — before you've even noticed anything wrong — your saved browser passwords, cryptocurrency wallets, and cloud storage credentials are being silently packaged up and shipped to a stranger on the other side of the world.&lt;/p&gt;

&lt;p&gt;That's ACRStealer. And it's getting better at slipping past the tools we trust to catch it.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is ACRStealer, Exactly?
&lt;/h2&gt;

&lt;p&gt;ACRStealer is an &lt;strong&gt;information stealer&lt;/strong&gt; — a type of malware whose entire job is to vacuum up your personal and financial data, then send it to attackers. Think of it like a digital pickpocket: it doesn't trash your computer or lock your files. It just quietly rifles through your pockets, grabs what's valuable, and disappears.&lt;/p&gt;

&lt;p&gt;First spotted as a growing threat in early 2025, ACRStealer is sold as a service on underground forums. That means the person who built it isn't necessarily the person using it. Anyone willing to pay a subscription fee gets access to a slick dashboard and a ready-made stealing tool. This "malware-as-a-service" model is exactly why ACRStealer keeps showing up in new campaigns — there are many customers.&lt;/p&gt;

&lt;p&gt;What makes the sample we're looking at today especially interesting is how &lt;em&gt;sneaky&lt;/em&gt; it is.&lt;/p&gt;

&lt;h2&gt;
  
  
  This Sample: Hiding in Plain Sight
&lt;/h2&gt;

&lt;p&gt;ThreatChain recently flagged a file called &lt;strong&gt;&lt;code&gt;verificationgoogle.dll&lt;/code&gt;&lt;/strong&gt; — a name carefully chosen to look like something legitimate from Google. Here are the details:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;verificationgoogle.dll&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Also seen as&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;code&gt;WSCPlugin.dll&lt;/code&gt;, &lt;code&gt;verification.google&lt;/code&gt;, &lt;code&gt;yee85erl.exe&lt;/code&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Windows 64-bit DLL (a shared code library that other programs can load)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;~3.4 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;April 7, 2026&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;de5691a05fff72c33b1a67cab94f0ce24a712fdf46e71d2cbd47bc76b634f54d&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;15 out of 75 antivirus engines flagged it&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;That last number is the headline: &lt;strong&gt;only 20% of antivirus scanners caught it&lt;/strong&gt;. Several well-known security tools — including at least one sandbox environment — initially returned a verdict of "clean" or "no threats detected." The malware was specifically designed to dodge automated analysis.&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Works (Without the Jargon)
&lt;/h2&gt;

&lt;p&gt;Let's walk through what this file actually does, step by step.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. The Disguise
&lt;/h3&gt;

&lt;p&gt;The file pretends to be a DLL — a type of Windows helper file that legitimate programs load all the time. By naming itself after Google verification or a "WSC Plugin" (WSC stands for Windows Security Center), it's betting that neither you nor your security tools will look twice. It's like a burglar wearing a FedEx uniform: people hold the door open for them.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Anti-Analysis Tricks
&lt;/h3&gt;

&lt;p&gt;This sample is packed with techniques to detect when it's being watched. Security researchers often run suspicious files inside a "sandbox" — a virtual padded room where malware can't do real damage. This ACRStealer variant checks whether a debugger is attached (a debugger is a tool researchers use to step through code line by line). If it senses it's being analyzed, it behaves itself. It only goes to work when it believes it's running on a real victim's machine.&lt;/p&gt;

&lt;p&gt;Think of it like a con artist who acts perfectly normal whenever a police officer is watching but goes back to pickpocketing the moment the cop turns the corner.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Written in Go
&lt;/h3&gt;

&lt;p&gt;Here's a technical wrinkle that matters: this sample is written in &lt;strong&gt;Go&lt;/strong&gt; (also called Golang), a programming language created by Google. Most Windows malware is written in C or C++. Go is unusual — and that's exactly the point. Security tools that are excellent at analyzing C-based malware can struggle with Go binaries. The code structure looks different, the file is larger, and automated detection rules often don't apply cleanly.&lt;/p&gt;

&lt;p&gt;It's an increasingly popular trick. Attackers get a kind of camouflage just by choosing an unexpected programming language.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Phone Home
&lt;/h3&gt;

&lt;p&gt;Once running, ACRStealer connects to a command-and-control server — the attacker's remote control panel. This is where it receives instructions and sends your stolen data. Some ACRStealer variants are known for a clever twist here: instead of hard-coding a server address (which defenders can block), they hide the real address inside posts on legitimate platforms like Google Docs or Steam community pages. This technique is called &lt;strong&gt;"dead drop resolving"&lt;/strong&gt; — the malware visits a public webpage to pick up its instructions, like a spy checking a dead drop location in a park.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. The Grab
&lt;/h3&gt;

&lt;p&gt;Once active, ACRStealer typically goes after:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Browser passwords and cookies&lt;/strong&gt; (Chrome, Firefox, Edge — all of them)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cryptocurrency wallet files&lt;/strong&gt; (Bitcoin, Ethereum, and dozens of others)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;FTP and email credentials&lt;/strong&gt; (FileZilla, Outlook, Thunderbird)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Two-factor authentication codes&lt;/strong&gt; from desktop authenticator apps&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Files matching specific patterns&lt;/strong&gt; — documents, text files, anything that might contain passwords or keys&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Everything gets compressed, encrypted, and sent off. The whole process can take under a minute.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who Should Care?
&lt;/h2&gt;

&lt;p&gt;If you use a Windows computer and store passwords in your browser — which is most of us — you're a potential target. But some groups face outsized risk:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Small businesses&lt;/strong&gt; without dedicated IT security. A single employee opening this file could expose client data, financial accounts, and business credentials.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Freelancers and remote workers&lt;/strong&gt; who regularly receive files from clients and collaborators.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cryptocurrency holders.&lt;/strong&gt; Stolen wallet keys mean stolen funds, and there's no bank to call for a reversal.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Developers&lt;/strong&gt; who might encounter this disguised as a plugin, SDK component, or verification file.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Real-World Cost
&lt;/h2&gt;

&lt;p&gt;Information stealers like ACRStealer don't just steal one password. They steal &lt;em&gt;all&lt;/em&gt; of them — and then attackers sell that bundle on dark web marketplaces, often within hours. A single "log" (one victim's complete stolen data set) sells for anywhere from $5 to $50. Multiply that by thousands of infections, and you can see the business model.&lt;/p&gt;

&lt;p&gt;But for the victim, the cost is far higher. Compromised bank accounts. Hijacked social media profiles. Business email accounts used to send fraudulent invoices to your own clients. The cleanup can take weeks. The reputational damage can last much longer.&lt;/p&gt;

&lt;h2&gt;
  
  
  What You Can Do Right Now
&lt;/h2&gt;

&lt;p&gt;You don't need an enterprise security team to protect yourself. Here are five concrete steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Stop saving passwords in your browser.&lt;/strong&gt; Use a dedicated password manager like Bitwarden or 1Password instead. If a stealer grabs your browser data, your password manager vault remains separate and encrypted.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Be suspicious of unexpected DLL and EXE files&lt;/strong&gt; — especially ones with names designed to sound trustworthy like "verificationgoogle" or "WSCPlugin." If you didn't specifically go looking for it, don't run it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Enable two-factor authentication everywhere&lt;/strong&gt;, but prefer hardware keys (like YubiKey) or phone-based authentication apps over desktop-based ones. Stealers can grab codes from desktop authenticator apps.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keep Windows and your antivirus updated.&lt;/strong&gt; Yes, only 20% of scanners caught this sample initially — but that number improves quickly as detections are added. Being on the latest signatures matters.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;If you run a small business, consider a DNS-level filter&lt;/strong&gt; (like Cloudflare Gateway's free tier or Quad9). These can block connections to known malicious command-and-control servers, stopping the malware from phoning home even if it does get in.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The Bottom Line
&lt;/h2&gt;

&lt;p&gt;ACRStealer isn't flashy. It doesn't splash a ransom note on your screen or make your computer unusable. That's what makes it dangerous — it steals everything quietly and moves on. The sample we examined today is particularly well-crafted: written in an unusual language, packed with anti-analysis tricks, and barely detected by most antivirus tools at the time it appeared.&lt;/p&gt;

&lt;p&gt;The best defense isn't any single tool. It's a healthy dose of skepticism about unexpected files, good password hygiene, and keeping your systems updated. None of that costs a dime — and it makes you a much harder target.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Sample SHA-256:&lt;/strong&gt; &lt;code&gt;de5691a05fff72c33b1a67cab94f0ce24a712fdf46e71d2cbd47bc76b634f54d&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Family:&lt;/strong&gt; ACRStealer | &lt;strong&gt;First seen:&lt;/strong&gt; April 7, 2026 | &lt;strong&gt;Origin:&lt;/strong&gt; US&lt;br&gt;
&lt;strong&gt;VirusTotal detection:&lt;/strong&gt; 15/75 | &lt;strong&gt;Threat label:&lt;/strong&gt; trojan.midie&lt;/p&gt;

&lt;p&gt;&lt;em&gt;If you encounter this file or similar ones, report them to your IT team or upload them to &lt;a href="https://www.virustotal.com" rel="noopener noreferrer"&gt;VirusTotal&lt;/a&gt; for analysis.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>acrstealer</category>
    </item>
    <item>
      <title>What is a reverse shell and how SIEMs detect them</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Tue, 07 Apr 2026 15:15:06 +0000</pubDate>
      <link>https://forem.com/threatchain/what-is-a-reverse-shell-and-how-siems-detect-them-356j</link>
      <guid>https://forem.com/threatchain/what-is-a-reverse-shell-and-how-siems-detect-them-356j</guid>
      <description>&lt;p&gt;🚨 78% of breaches involve reverse shells that went undetected for MONTHS. A reverse shell lets attackers control your systems remotely by having compromised hosts call back to them. Your SIEM should flag unusual outbound connections + process spawning anomalies. Monitor NOW. #InfoSec&lt;/p&gt;




&lt;p&gt;&lt;em&gt;From &lt;a href="https://threatchain.io" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>CVE-2026-34208: JavaScript Sandbox Library Can't Keep Attackers Out</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Tue, 07 Apr 2026 11:17:23 +0000</pubDate>
      <link>https://forem.com/threatchain/cve-2026-34208-javascript-sandbox-library-cant-keep-attackers-out-5li</link>
      <guid>https://forem.com/threatchain/cve-2026-34208-javascript-sandbox-library-cant-keep-attackers-out-5li</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/cve-2026-34208-javascript-sandbox-library-can-t-keep-attackers-out-81071546" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;What CVE-2026-34208 is, how it works, and how to defend against it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;CVSS Score: 10.0 (CRITICAL)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If your application uses SandboxJS to run untrusted JavaScript code safely, you need to patch immediately. A critical vulnerability lets attackers completely escape the sandbox and potentially take control of the entire Node.js process. This isn't a theoretical risk—it's a fundamental breakdown of the security boundary that SandboxJS is supposed to provide.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is This CVE?
&lt;/h2&gt;

&lt;p&gt;CVE-2026-34208 affects SandboxJS, a popular JavaScript library used to run untrusted code in a "sandbox"—think of it as a secure container that should prevent malicious scripts from accessing or modifying things they shouldn't.&lt;/p&gt;

&lt;p&gt;The problem is in how SandboxJS tries to block attackers from overwriting important global objects like &lt;code&gt;Math.random&lt;/code&gt;. While it successfully blocks direct assignments (like &lt;code&gt;Math.random = evilFunction&lt;/code&gt;), attackers discovered they can use a more complex path: &lt;code&gt;this.constructor.call(target, attackerObject)&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;Here's why this matters: &lt;code&gt;this.constructor&lt;/code&gt; points to an internal SandboxJS function, and since &lt;code&gt;Function.prototype.call&lt;/code&gt; is allowed, attackers can use this combination to write arbitrary data into the host application's global objects. Worse yet, these modifications persist across different sandbox instances in the same process, meaning one malicious script can affect other sandboxed code running later.&lt;/p&gt;

&lt;p&gt;In practical terms, this means an attacker can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Overwrite critical JavaScript functions&lt;/li&gt;
&lt;li&gt;Inject malicious code that runs outside the sandbox&lt;/li&gt;
&lt;li&gt;Potentially escalate to full system compromise in Node.js applications&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Who Is At Risk?
&lt;/h2&gt;

&lt;p&gt;You are vulnerable if you're running &lt;strong&gt;SandboxJS versions before 0.8.36&lt;/strong&gt;. This includes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Web applications&lt;/strong&gt; that execute user-submitted JavaScript code (code playgrounds, educational platforms, automation tools)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Node.js servers&lt;/strong&gt; using SandboxJS to safely run plugins or user scripts
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Content management systems&lt;/strong&gt; that allow JavaScript customization&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Development platforms&lt;/strong&gt; with code execution features&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Any application&lt;/strong&gt; that relies on SandboxJS to isolate untrusted JavaScript&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you're unsure whether you use SandboxJS, it might be pulled in as a dependency of another package. Popular use cases include online IDEs, website builders with custom scripting, and applications that run user-generated automation scripts.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Check If You're Vulnerable
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;For Node.js applications:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Check your &lt;code&gt;package.json&lt;/code&gt; and &lt;code&gt;package-lock.json&lt;/code&gt; files:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   &lt;span class="nb"&gt;grep&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; &lt;span class="s2"&gt;"sandboxjs"&lt;/span&gt; package&lt;span class="k"&gt;*&lt;/span&gt;.json
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Check installed packages:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   npm list sandboxjs
   &lt;span class="c"&gt;# or&lt;/span&gt;
   yarn list &lt;span class="nt"&gt;--pattern&lt;/span&gt; sandboxjs
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Search your entire project for SandboxJS imports:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   &lt;span class="nb"&gt;grep&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; &lt;span class="s2"&gt;"require.*sandboxjs&lt;/span&gt;&lt;span class="se"&gt;\|&lt;/span&gt;&lt;span class="s2"&gt;import.*sandboxjs"&lt;/span&gt; &lt;span class="nb"&gt;.&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;If you find SandboxJS, check the version:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;   npm list sandboxjs &lt;span class="nt"&gt;--depth&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If the version shows anything below 0.8.36, you're vulnerable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;For applications using SandboxJS indirectly:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Run a dependency audit to see if any of your packages depend on vulnerable SandboxJS versions:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm audit
&lt;span class="c"&gt;# Look for SandboxJS in the output&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  How to Fix This
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Primary Solution: Update Immediately&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Update SandboxJS to version 0.8.36 or later:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm update sandboxjs
&lt;span class="c"&gt;# or&lt;/span&gt;
yarn upgrade sandboxjs
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Then verify the update worked:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;npm list sandboxjs
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;If You Can't Update Right Now:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Disable user script execution&lt;/strong&gt; temporarily if possible&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Add input validation&lt;/strong&gt; to reject scripts containing &lt;code&gt;constructor.call&lt;/code&gt; patterns (though this is easily bypassed)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Run SandboxJS in isolated processes&lt;/strong&gt; rather than threads, so escapes can't affect other parts of your application&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Monitor for unusual JavaScript execution&lt;/strong&gt; or unexpected global object modifications&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Important:&lt;/strong&gt; There are no reliable workarounds for this vulnerability. The sandbox escape is fundamental to how the library handles constructor references. You must update to 0.8.36.&lt;/p&gt;

&lt;h2&gt;
  
  
  ThreatChain Coverage
&lt;/h2&gt;

&lt;p&gt;CVE-2026-34208 is already indexed in ThreatChain's CVE database at threatchain.io, where you can search for additional indicators of compromise and related threat intelligence as the security community discovers more details about potential exploits.&lt;/p&gt;

&lt;h2&gt;
  
  
  Bottom Line
&lt;/h2&gt;

&lt;p&gt;This is a drop-everything-and-patch situation. SandboxJS exists specifically to provide security isolation, and this vulnerability completely defeats that purpose with a perfect CVSS score of 10.0. Any application that processes untrusted JavaScript through vulnerable SandboxJS versions is essentially running that code directly on the host system. Update to version 0.8.36 immediately, and if you can't update right now, consider temporarily disabling any features that execute user-provided JavaScript until you can patch.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Action Items:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Search your codebase&lt;/strong&gt; for SandboxJS usage (direct and indirect dependencies)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Update to SandboxJS 0.8.36&lt;/strong&gt; or later immediately
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Test your application&lt;/strong&gt; after updating to ensure functionality works correctly&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review logs&lt;/strong&gt; for any suspicious JavaScript execution from the past few weeks&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Consider adding monitoring&lt;/strong&gt; for unexpected global object modifications in production&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>cve202634208</category>
    </item>
    <item>
      <title>That Fake Purchase Order in Your Inbox? It Might Be Formbook Stealing Every Keystroke You Type</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Tue, 07 Apr 2026 11:16:34 +0000</pubDate>
      <link>https://forem.com/threatchain/that-fake-purchase-order-in-your-inbox-it-might-be-formbook-stealing-every-keystroke-you-type-4md1</link>
      <guid>https://forem.com/threatchain/that-fake-purchase-order-in-your-inbox-it-might-be-formbook-stealing-every-keystroke-you-type-4md1</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/that-fake-purchase-order-in-your-inbox-it-might-be-formbook-stealing-every-keyst-af3f5610" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;A commodity stealer hiding in phishing attachments. Here's the full picture.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine you work at a mid-sized company. It's a Tuesday morning. You open your email and see a message with the subject line "PO-000806758" — a purchase order. Maybe it's from a supplier you've been waiting on. The attachment is an &lt;code&gt;.exe&lt;/code&gt; file, but it looks like a standard document. You double-click.&lt;/p&gt;

&lt;p&gt;Nothing dramatic happens. No skull-and-crossbones, no ransom note. Your screen doesn't even flicker. But from that moment on, every password you type, every form you fill out, every credit card number you enter into a browser — all of it is being silently copied and sent to someone you've never met.&lt;/p&gt;

&lt;p&gt;That's Formbook. And this is a real sample spotted in the wild this April.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is Formbook, Exactly?
&lt;/h2&gt;

&lt;p&gt;Formbook is one of the most popular and long-running information stealers in the world. Think of it as a silent spy that moves into your computer and watches everything you do — especially in your web browser.&lt;/p&gt;

&lt;p&gt;Its specialty is &lt;strong&gt;form grabbing&lt;/strong&gt;: intercepting data you type into web forms &lt;em&gt;before&lt;/em&gt; it gets encrypted and sent to a website. That means even if you're on an HTTPS site (the kind with the little padlock icon), Formbook can still see your login credentials, payment details, and personal information. It captures the data at the source — your keyboard and your browser — not in transit.&lt;/p&gt;

&lt;p&gt;It can also:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Log keystrokes&lt;/strong&gt; (record every key you press)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Take screenshots&lt;/strong&gt; of your desktop&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Steal saved passwords&lt;/strong&gt; from browsers and email clients&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Download and run additional malware&lt;/strong&gt; — opening the door for even worse attacks&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Send everything back&lt;/strong&gt; to the attacker's remote server (security folks call this a "command-and-control" or C2 server — think of it as the attacker's remote control for your compromised machine)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Formbook has been around since at least 2016, and for a while it was literally sold as a service on underground forums for as little as $30 a week. That low barrier to entry means it's not just used by sophisticated criminal gangs — anyone with a little money and bad intentions can deploy it.&lt;/p&gt;

&lt;h2&gt;
  
  
  This Specific Sample: What We Know
&lt;/h2&gt;

&lt;p&gt;Our platform flagged this file on &lt;strong&gt;April 7, 2026&lt;/strong&gt;. Here's a snapshot:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;PO-000806758.exe&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Windows executable (.exe), built with .NET&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;~1.2 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Origin&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Germany (DE)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Formbook&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;27 out of 76 antivirus engines flagged it on VirusTotal&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;That detection rate is worth pausing on. &lt;strong&gt;27 out of 76&lt;/strong&gt; means roughly a third of antivirus products caught it — which also means about two-thirds &lt;em&gt;didn't&lt;/em&gt;. If your antivirus wasn't one of the 27, this file would have sailed right past your defenses.&lt;/p&gt;

&lt;p&gt;Multiple respected analysis platforms — CAPE, VMRay, Kaspersky, and vxCube — independently confirmed it as Formbook or flagged it as malware. Interestingly, one sandbox (ANY.RUN) initially reported "No threats detected," which tells you something important: &lt;strong&gt;Formbook is good at hiding&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The file also has some known aliases: &lt;code&gt;Bfdf.exe&lt;/code&gt;, &lt;code&gt;aqoni.exe&lt;/code&gt;, and some scanners associated it with AgentTesla, a related info-stealer family. This kind of overlap is common — these malware families share techniques and sometimes even code.&lt;/p&gt;

&lt;h2&gt;
  
  
  How the Attack Works (Without the Jargon)
&lt;/h2&gt;

&lt;p&gt;Here's the chain of events, step by step:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: The bait.&lt;/strong&gt; The attacker sends a convincing email — often disguised as a purchase order, invoice, or shipping notification. The file name &lt;code&gt;PO-000806758.exe&lt;/code&gt; is textbook. It looks like a routine business document. In some cases, the &lt;code&gt;.exe&lt;/code&gt; extension is hidden by Windows, or the file is wrapped inside a &lt;code&gt;.zip&lt;/code&gt; or &lt;code&gt;.rar&lt;/code&gt; archive to seem less suspicious.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: The Trojan horse.&lt;/strong&gt; When you run the file, it doesn't immediately do anything obviously malicious. This sample is built using .NET (Microsoft's programming framework), but here's the clever part: it has &lt;strong&gt;no standard import table&lt;/strong&gt;. In plain English, that means it doesn't openly declare what system functions it plans to use — like a burglar who brings their own tools instead of borrowing the homeowner's. This makes it harder for security tools to predict what it's about to do.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: The shell game.&lt;/strong&gt; Formbook is famous for a technique called &lt;strong&gt;process injection&lt;/strong&gt; — it essentially disguises itself inside a legitimate Windows program that's already running. Imagine a criminal putting on a police uniform. The operating system sees a trusted process and doesn't intervene. This is how it evades antivirus software that only checks files on disk.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Silent surveillance.&lt;/strong&gt; Once embedded, Formbook hooks into your browsers and starts capturing form data, keystrokes, and screenshots. It phones home to its C2 server with everything it collects. It also installs &lt;strong&gt;persistence mechanisms&lt;/strong&gt; — ways to survive a reboot, like adding itself to your startup programs. Think of it as the malware hiding a spare key under your doormat so it can always get back in.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who Should Care?
&lt;/h2&gt;

&lt;p&gt;If you're thinking "I'm not a target," think again. Formbook isn't a precision weapon aimed at governments or giant corporations. It's a &lt;strong&gt;dragnet&lt;/strong&gt;. Attackers spray it out to thousands of email addresses and see what sticks. That means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Small business owners&lt;/strong&gt; who handle invoices and purchase orders daily — you're the primary target for these social engineering lures&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Remote workers&lt;/strong&gt; who may not have corporate-grade security on their home machines&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Developers&lt;/strong&gt; who download tools and libraries from the internet and may encounter repackaged malicious executables&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Anyone who uses a web browser&lt;/strong&gt; to log into banking, email, or shopping sites&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The real-world damage looks like this: stolen banking credentials drained overnight. Client databases exfiltrated and sold on dark web forums. Email accounts hijacked to send more phishing emails to your contacts. Company credentials used to breach your employer's network. And because Formbook can download &lt;em&gt;additional&lt;/em&gt; malware, a single infection can be the first domino in a much larger attack — including ransomware (digital kidnapping of your files for payment).&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Protect Yourself
&lt;/h2&gt;

&lt;p&gt;You don't need a six-figure security budget. Here are concrete things you can do right now:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Never open &lt;code&gt;.exe&lt;/code&gt; attachments from email.&lt;/strong&gt; Period. Legitimate purchase orders come as PDFs. If someone sends you an executable — or a compressed archive containing one — treat it as suspicious, even if you recognize the sender's name. (Attackers routinely spoof email addresses.)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Turn on "Show file extensions" in Windows.&lt;/strong&gt; By default, Windows hides file extensions, so &lt;code&gt;PO-000806758.exe&lt;/code&gt; might just look like &lt;code&gt;PO-000806758&lt;/code&gt;. Go to File Explorer → View → check "File name extensions." This one setting removes a huge category of deception.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keep Windows and your antivirus updated.&lt;/strong&gt; Yes, only 27/76 engines caught this sample &lt;em&gt;at the time of analysis&lt;/em&gt;. But detection improves quickly once a sample is flagged. Keeping definitions current means you benefit from the community's collective response.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Use a password manager instead of letting your browser save passwords.&lt;/strong&gt; Formbook specifically targets browser-stored credentials. A dedicated password manager stores credentials in an encrypted vault that's much harder for malware to raid.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Enable multi-factor authentication (MFA) everywhere you can.&lt;/strong&gt; Even if Formbook steals your password, a second factor — like a code from your phone — means the attacker still can't get in. This single step neutralizes a huge portion of stolen-credential attacks.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The Bottom Line
&lt;/h2&gt;

&lt;p&gt;Formbook isn't flashy. It doesn't lock your screen or make demands. It just quietly watches and copies, like someone reading over your shoulder — except they're reading &lt;em&gt;everything&lt;/em&gt;, and they never leave.&lt;/p&gt;

&lt;p&gt;This sample, &lt;code&gt;PO-000806758.exe&lt;/code&gt; (SHA-256: &lt;code&gt;af3f5610187dd9fadeffd7148fce068c920c10a824bc7e139550e06dd4cca882&lt;/code&gt;), is one of thousands of Formbook variants circulating right now. The social engineering is simple. The malware is well-engineered. And the consequences — stolen credentials, financial loss, deeper network compromise — are very real.&lt;/p&gt;

&lt;p&gt;The best defense isn't expensive software. It's a moment of pause before you click.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;This analysis is based on data collected by ThreatChain and corroborated by multiple public malware analysis services including CAPE, VMRay, Kaspersky, and VirusTotal. Sample first observed April 7, 2026.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>formbook</category>
    </item>
    <item>
      <title>Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 06 Apr 2026 19:31:30 +0000</pubDate>
      <link>https://forem.com/threatchain/claude-code-source-leak-how-one-packaging-mistake-created-a-hacker-feeding-frenzy-4g40</link>
      <guid>https://forem.com/threatchain/claude-code-source-leak-how-one-packaging-mistake-created-a-hacker-feeding-frenzy-4g40</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/claude-code-source-leak-how-one-packaging-mistake-created-a-hacker-feeding-frenz-claude-c" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;What Supply Chain Attack is, how it works, and how to defend against it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Imagine accidentally dropping your house keys in a crowded mall – and within hours, those keys have been duplicated and distributed to every pickpocket in the city. That's essentially what happened on March 31st when Anthropic accidentally exposed the complete source code for Claude Code, their enterprise AI agent platform, in what security researchers are calling one of the most consequential accidental leaks in AI history.&lt;/p&gt;

&lt;p&gt;Here's the kicker: hackers didn't just study the leaked code – they weaponized it within 48 hours, creating a sophisticated malware campaign that's already tricking thousands of developers and organizations worldwide.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Accident That Shook the AI World
&lt;/h2&gt;

&lt;p&gt;It started with something embarrassingly mundane: a packaging error. On March 31st, 2026, Anthropic's development team was pushing routine updates to Claude Code via npm (the JavaScript package manager that millions of developers use daily). Version 2.1.88 was supposed to be a standard release.&lt;/p&gt;

&lt;p&gt;Instead, it became a cybersecurity nightmare.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What went wrong?&lt;/strong&gt; A single developer forgot to exclude the source map files during the build process. Think of source maps as the "director's commentary" for code – they contain the original, human-readable version of software that's normally compressed and obscured for public release.&lt;/p&gt;

&lt;p&gt;The result: a 59.8 MB JavaScript source map containing &lt;strong&gt;513,000 lines of unobfuscated TypeScript code across 1,906 files&lt;/strong&gt; was accidentally bundled with the public npm package. For context, that's like Netflix accidentally including the raw footage, deleted scenes, and production notes with every movie they stream.&lt;/p&gt;

&lt;p&gt;Security researcher Chaofan Shou was first to spot the leak, posting on X: &lt;em&gt;"Holy shit, Anthropic just leaked their entire Claude Code architecture in an npm package."&lt;/em&gt; By then, it was too late – the package had already been downloaded thousands of times.&lt;/p&gt;

&lt;h2&gt;
  
  
  What the Hackers Found: A Treasure Trove of AI Secrets
&lt;/h2&gt;

&lt;p&gt;The leaked code revealed far more than just how Claude Code works – it exposed Anthropic's most advanced AI capabilities, many of which were previously unknown to the public:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🤖 Agent Orchestration Logic&lt;/strong&gt;: The complete system for how Claude spawns and manages multiple AI agents simultaneously, including the permission structures that keep them contained.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🧠 Self-Healing Memory Architecture&lt;/strong&gt;: Code showing how Claude maintains persistent memory across conversations and automatically fixes its own errors.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;👻 KAIROS Feature&lt;/strong&gt;: A background agent that continuously monitors and repairs system issues – essentially giving Claude a form of "digital immune system."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;💭 Dream Mode&lt;/strong&gt;: Perhaps most fascinating, this allows Claude to think continuously in the background, processing and refining responses even when not actively engaged with users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🥷 Undercover Mode&lt;/strong&gt;: A stealth system enabling Claude to make anonymous contributions to open-source projects – raising significant questions about AI transparency in software development.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;🛡️ Anti-Distillation Controls&lt;/strong&gt;: Clever defensive mechanisms that inject fake tool definitions to poison competitors' attempts to reverse-engineer Claude's capabilities.&lt;/p&gt;

&lt;p&gt;Think of it this way: if AI capabilities were a restaurant's secret recipes, hackers didn't just get the ingredient list – they got the cookbook, cooking techniques, and the chef's personal notes.&lt;/p&gt;

&lt;h2&gt;
  
  
  The 48-Hour Weaponization: How Hackers Struck Back
&lt;/h2&gt;

&lt;p&gt;What happened next demonstrates the lightning speed of modern cybercrime. Within 48 hours, multiple hacker groups had analyzed the leaked code and launched coordinated attacks.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Fake Repository Trap
&lt;/h3&gt;

&lt;p&gt;User "idbzoomh" quickly created a GitHub repository with an enticing promise: access to "unlocked enterprise features with no usage restrictions." The repo was SEO-optimized to appear at the top of Google searches for "Claude Code leak" and "free Claude enterprise."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The bait&lt;/strong&gt;: A professional-looking repository offering a 7-Zip archive containing "ClaudeCode_x64.exe"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The hook&lt;/strong&gt;: What users actually downloaded was a Rust-based dropper that deployed two pieces of malware:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Vidar Infostealer&lt;/strong&gt;: Harvests login credentials, credit card information, and browser history&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;GhostSocks Proxy Malware&lt;/strong&gt;: Turns infected machines into proxy nodes for masking criminal activity&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  The Supply Chain Poisoning
&lt;/h3&gt;

&lt;p&gt;Simultaneously, hackers published five malicious npm packages with names designed to appear legitimate:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;code&gt;audio-capture-napi&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;color-diff-napi&lt;/code&gt; &lt;/li&gt;
&lt;li&gt;&lt;code&gt;image-processor-napi&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;modifiers-napi&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;url-handler-napi&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These packages contained cross-platform remote access trojans (RATs) that give hackers complete control over infected systems. The "-napi" suffix is particularly clever – it mimics legitimate Node.js addon packages that developers commonly install.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Critical Window
&lt;/h3&gt;

&lt;p&gt;Perhaps most concerning: anyone who installed or updated Claude Code via npm on March 31st between 00:21-03:29 UTC may have unknowingly downloaded a trojanized version. That's a 3-hour window where legitimate package updates could have been compromised.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why This Matters to YOU (Even If You Don't Use AI)
&lt;/h2&gt;

&lt;p&gt;"But I don't use Claude Code," you might be thinking. "How does this affect me?"&lt;/p&gt;

&lt;p&gt;This incident matters for three critical reasons:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. The Ripple Effect&lt;/strong&gt;: Claude Code is integrated into thousands of enterprise applications. If your workplace, bank, healthcare provider, or any service you use employs Claude Code, your data could be at risk from secondary attacks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. The Precedent&lt;/strong&gt;: This leak demonstrates how quickly advanced AI capabilities can be weaponized. The techniques exposed in Claude's code could be adapted to enhance other malware campaigns, making them more sophisticated and harder to detect.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. The Trust Factor&lt;/strong&gt;: If Anthropic – one of the most security-conscious AI companies – can accidentally leak their entire codebase, what does that say about the security practices across the broader tech industry?&lt;/p&gt;

&lt;h2&gt;
  
  
  Anthropic's Response: Damage Control in Motion
&lt;/h2&gt;

&lt;p&gt;To their credit, Anthropic acted swiftly once the leak was discovered. The company immediately removed version 2.1.88 from npm and issued a public statement:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;"This was a release packaging issue caused by human error, not a security breach. No sensitive customer data or credentials were involved or exposed."&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;While technically accurate, this response understates the severity. The leaked code itself has become the weapon – customer data wasn't exposed, but the tools to potentially access it were gift-wrapped for cybercriminals.&lt;/p&gt;

&lt;h2&gt;
  
  
  Your Action Plan: 7 Steps to Stay Protected
&lt;/h2&gt;

&lt;p&gt;Don't panic, but do act quickly. Here's your immediate action checklist:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. &lt;strong&gt;Audit Your npm Packages NOW&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Run &lt;code&gt;npm audit&lt;/code&gt; in all your projects and specifically check for these malicious packages:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;audio-capture-napi&lt;/li&gt;
&lt;li&gt;color-diff-napi
&lt;/li&gt;
&lt;li&gt;image-processor-napi&lt;/li&gt;
&lt;li&gt;modifiers-napi&lt;/li&gt;
&lt;li&gt;url-handler-napi&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  2. &lt;strong&gt;Downgrade Claude Code Immediately&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;If you're using Claude Code version 2.1.88, downgrade to version 2.1.87 or earlier immediately. Do not pass go, do not collect $200.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. &lt;strong&gt;Rotate ALL Credentials&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Change passwords, API keys, and access tokens for any systems that interact with Claude Code. Yes, this is painful. Yes, it's necessary.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. &lt;strong&gt;Verify Package Authenticity&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Before installing any AI-related packages, verify they come from official sources. When in doubt, wait and verify through official channels.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. &lt;strong&gt;Monitor Your Systems&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Watch for unusual network activity, unexpected CPU usage, or unknown processes. The malware from this campaign is designed to be stealthy, but it's not invisible.&lt;/p&gt;

&lt;h3&gt;
  
  
  6. &lt;strong&gt;Update Your Security Tools&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Ensure your antivirus, endpoint detection, and network monitoring tools have the latest signatures. Major security vendors are rapidly updating their systems to detect the malware from this campaign.&lt;/p&gt;

&lt;h3&gt;
  
  
  7. &lt;strong&gt;Educate Your Team&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Share this information with colleagues, especially developers and IT staff. The fake GitHub repositories are professionally crafted and could fool even experienced developers.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Bigger Picture: A Wake-Up Call for AI Security
&lt;/h2&gt;

&lt;p&gt;This incident isn't just about one company's mistake – it's a preview of the cybersecurity challenges we'll face as AI becomes more sophisticated and ubiquitous. The speed with which hackers weaponized the leaked code should serve as a wake-up call for the entire tech industry.&lt;/p&gt;

&lt;p&gt;As AI capabilities advance, the potential damage from such leaks grows exponentially. Today it's source code and malware. Tomorrow, it could be training data, model architectures, or worse – techniques that could be used to create deepfakes, manipulate elections, or launch AI-powered social engineering attacks at unprecedented scale.&lt;/p&gt;

&lt;p&gt;The Claude Code leak reminds us that in cybersecurity, there are no small mistakes – only small windows of opportunity that hackers are remarkably efficient at exploiting.&lt;/p&gt;

&lt;p&gt;Stay vigilant, stay updated, and remember: in the age of AI-powered cybercrime, paranoia isn't a bug – it's a feature.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>supplychainattack</category>
    </item>
    <item>
      <title>Vidar: The Silent Thief Hiding Inside That Free Software Download</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 06 Apr 2026 19:16:24 +0000</pubDate>
      <link>https://forem.com/threatchain/vidar-the-silent-thief-hiding-inside-that-free-software-download-p9f</link>
      <guid>https://forem.com/threatchain/vidar-the-silent-thief-hiding-inside-that-free-software-download-p9f</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/vidar-the-silent-thief-hiding-inside-that-free-software-download-6d557467" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;An info-stealer that doubles as a loader. Full breakdown inside.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Last Tuesday, a freelance graphic designer in Ohio downloaded what she thought was a cracked version of a popular video editing tool. Within 90 seconds — before she even noticed the installer hadn't actually opened anything — her saved browser passwords, her crypto wallet seed phrase, her autofill credit card numbers, and a folder of client contracts had been quietly zipped up and sent to a server halfway around the world. She didn't get a ransom note. She didn't see a scary skull on her screen. She had no idea anything happened until her bank called three days later.&lt;/p&gt;

&lt;p&gt;This is what Vidar does. And a fresh sample just surfaced that shows the malware is evolving in ways that make it harder to catch.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is Vidar, Exactly?
&lt;/h2&gt;

&lt;p&gt;Vidar is an &lt;strong&gt;information stealer&lt;/strong&gt; — a type of malware whose entire job is to grab your personal data and send it to an attacker as fast as possible, then disappear. Think of it less like a burglar who moves into your house, and more like a pickpocket on a crowded subway. Quick hands, gone before you notice, and by the time you check your pockets it's too late.&lt;/p&gt;

&lt;p&gt;Specifically, Vidar hunts for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Passwords saved in your browser&lt;/strong&gt; (Chrome, Firefox, Edge — all of them)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Credit card numbers&lt;/strong&gt; stored in autofill&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cryptocurrency wallets&lt;/strong&gt; (Bitcoin, Ethereum, and dozens of others)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Two-factor authentication data&lt;/strong&gt; — those backup codes and authenticator app databases&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Files on your desktop&lt;/strong&gt; that match certain patterns (documents, text files, key files)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Screenshots&lt;/strong&gt; of what's on your screen at the moment of infection&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It collects everything into a neat package, uploads it to the attacker's server, and then often deletes itself. The whole operation can take under a minute.&lt;/p&gt;

&lt;h2&gt;
  
  
  This Specific Sample: What We Know
&lt;/h2&gt;

&lt;p&gt;ThreatChain flagged a new Vidar sample on &lt;strong&gt;April 6, 2026&lt;/strong&gt;. Here's what makes it interesting:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The file itself&lt;/strong&gt; is a Windows executable (an &lt;code&gt;.exe&lt;/code&gt; file), about 1.9 megabytes — small enough to download in a blink. It arrived with a generic filename simply called "file," which is common when malware is delivered as a secondary payload — something that another piece of malicious software drops onto your machine after you're already compromised.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It was delivered by GCleaner&lt;/strong&gt;, a known malware dropper that pretends to be a system optimization or "PC cleaner" tool. You know those ads that say "Your PC is slow! Download this free tool to speed it up!"? That's GCleaner's hunting ground. Once you install GCleaner thinking it'll help your computer, it quietly downloads Vidar (and potentially other malware) in the background.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It's digitally signed.&lt;/strong&gt; This is the worrying part. Digital signatures are supposed to be a trust signal — like a seal on a letter saying "this really came from who it says it came from." Attackers increasingly steal or buy code-signing certificates to make their malware look legitimate. When software is signed, Windows is less likely to flag it, and so are some security tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Detection is still low.&lt;/strong&gt; When this sample was scanned against 76 different antivirus engines, only &lt;strong&gt;14 flagged it as malicious&lt;/strong&gt; — that's less than 19%. Meaning the majority of security tools would have let it through without a peep. Kaspersky, ANY.RUN, and FileScan.IO caught it. Many others didn't.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It uses Telegram for command-and-control.&lt;/strong&gt; Instead of communicating with a suspicious-looking server (which security tools might block), this variant uses Telegram — the popular messaging app — as its remote control channel. The attacker posts instructions to a Telegram channel, and the malware reads them. Since Telegram traffic looks normal and is encrypted, this is fiendishly clever. It's like a spy receiving orders through a public bulletin board that everyone uses — nobody thinks twice about the traffic.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It actively fights analysis.&lt;/strong&gt; The sample includes multiple anti-debugging techniques — essentially, it checks whether it's being watched. If the malware detects it's running inside a security researcher's sandbox or virtual machine, it changes behavior or shuts down entirely. It's the digital equivalent of a shoplifter who cases a store for cameras before pocketing anything.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who Should Care?
&lt;/h2&gt;

&lt;p&gt;If you use a Windows computer and have ever:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Downloaded free or cracked software&lt;/li&gt;
&lt;li&gt;Used a "PC optimization" tool you found through an ad&lt;/li&gt;
&lt;li&gt;Saved passwords in your browser (be honest — most of us have)&lt;/li&gt;
&lt;li&gt;Stored cryptocurrency wallet files on your computer&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;...then you're squarely in Vidar's crosshairs.&lt;/p&gt;

&lt;p&gt;Small businesses are especially vulnerable. A single employee downloading a "free PDF converter" on a work machine can expose the company's saved credentials, client data, and financial information. Vidar doesn't discriminate between personal and business data — it takes everything it can find.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Happens After Your Data Is Stolen?
&lt;/h2&gt;

&lt;p&gt;Vidar operators don't usually use your data themselves. They sell it in bulk on dark web marketplaces. Your stolen credentials become part of a massive bundle sold for a few dollars. Buyers then use those credentials to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Drain bank accounts and crypto wallets&lt;/li&gt;
&lt;li&gt;Take over email and social media accounts&lt;/li&gt;
&lt;li&gt;Commit identity fraud&lt;/li&gt;
&lt;li&gt;Launch further attacks against your employer or clients&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The designer in Ohio? Her stolen browser passwords included her login to a client's WordPress site. Within a week, that site was defaced and injecting malware onto &lt;em&gt;its&lt;/em&gt; visitors. One infection cascaded outward.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Protect Yourself
&lt;/h2&gt;

&lt;p&gt;You don't need an enterprise security team to defend against Vidar. Here are five concrete things you can do this week:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Stop saving passwords in your browser.&lt;/strong&gt; Use a dedicated password manager like Bitwarden or 1Password instead. Browsers store passwords in ways that Vidar (and many other stealers) can extract trivially. A password manager encrypts them separately.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Never download "cracked" or "free" versions of paid software.&lt;/strong&gt; This is the number-one delivery method for stealers like Vidar. If you need a tool and can't afford it, look for a legitimate open-source alternative. The "free" cracked copy will cost you far more.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Be deeply skeptical of PC cleaner and optimizer tools&lt;/strong&gt;, especially ones promoted through web ads. Legitimate tools exist, but they don't need pop-up ads to find you.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keep Windows and your antivirus updated.&lt;/strong&gt; Yes, this sample evades many antivirus tools &lt;em&gt;today&lt;/em&gt;. But detection rates improve quickly once samples are flagged. Running outdated definitions means you're missing even the threats that &lt;em&gt;have&lt;/em&gt; been caught.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Move cryptocurrency wallets to hardware wallets or at minimum move seed phrases offline.&lt;/strong&gt; A piece of paper in a safe is unhackable. A text file on your desktop is the first thing Vidar grabs.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The Technical Details (For Those Who Want Them)
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;6d557467cdb0b20561acab3c95707230dded7798732430d9aff2b9c7f885ae0c&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File Type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Win32 PE32+ executable (64-bit, GUI)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File Size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;~1.9 MB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Vidar (information stealer)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Delivery&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Dropped by GCleaner&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Signing&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Digitally signed (likely stolen/purchased certificate)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;C2 Channel&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Telegram-based communication&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection Rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;14 out of 76 engines (as of first scan)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First Seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;April 6, 2026&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;If you're an IT admin or security professional, this sample's YARA detections include command-and-control signatures, multiple debugger evasion checks, and encrypted variant detection patterns. The Golang-related tags and method signatures suggest parts of the payload or its dropper are written in Go — a language attackers increasingly favor because it compiles into large, noisy binaries that can overwhelm some analysis tools.&lt;/p&gt;




&lt;p&gt;Vidar isn't flashy. It doesn't lock your screen. It doesn't make demands. It just takes what it wants and leaves. That's what makes it so effective — and why it keeps showing up, year after year, in new disguises.&lt;/p&gt;

&lt;p&gt;The best defense isn't expensive software. It's skepticism. That free download, that PC optimizer ad, that email attachment you weren't expecting — pause before you click. Your future self will thank you.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>vidar</category>
    </item>
    <item>
      <title>That "Payment Wire" Email Attachment? It's a Trojan Wearing Trusted Software as a Disguise</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 06 Apr 2026 17:35:09 +0000</pubDate>
      <link>https://forem.com/threatchain/that-payment-wire-email-attachment-its-a-trojan-wearing-trusted-software-as-a-disguise-17k6</link>
      <guid>https://forem.com/threatchain/that-payment-wire-email-attachment-its-a-trojan-wearing-trusted-software-as-a-disguise-17k6</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/that-payment-wire-email-attachment-it-s-a-trojan-wearing-trusted-software-as-a-d-5bbb1e4d" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;What ConnectWise is, how it works, and how to defend against it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Picture this: It's a Monday morning. You're the office manager at a mid-size company in Stockholm, plowing through emails. One catches your eye — the subject line says something about a wire payment and a copier invoice. There's an attachment: &lt;code&gt;Payment-WIRE_COPIER.PDF.js&lt;/code&gt;. Looks like a PDF. You double-click.&lt;/p&gt;

&lt;p&gt;Nothing visible happens. No document opens. You shrug, maybe try again, then move on with your day.&lt;/p&gt;

&lt;p&gt;But something &lt;em&gt;did&lt;/em&gt; happen. In those few quiet seconds, a script ran in the background and started installing remote access software on your machine — the kind IT departments use every day to manage computers. Except in this case, &lt;em&gt;your&lt;/em&gt; IT team didn't install it. Someone else now has a remote control to your computer, and they can see your screen, move your mouse, browse your files, and come back any time they want.&lt;/p&gt;

&lt;p&gt;This is the story of a real malware sample spotted in early April 2026, and it's a clever one. Let's break down what it does, why it's hard to catch, and what you can do about it.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Is This Thing, Exactly?
&lt;/h2&gt;

&lt;p&gt;The file — &lt;code&gt;Payment-WIRE_COPIER.PDF.js&lt;/code&gt; — is a JavaScript file pretending to be a PDF. That &lt;code&gt;.PDF.js&lt;/code&gt; double extension is a classic trick. On many Windows machines, the system hides the last extension, so all you see is &lt;code&gt;Payment-WIRE_COPIER.PDF&lt;/code&gt;. It looks completely normal.&lt;/p&gt;

&lt;p&gt;But it's not a document. It's a script — a small program your computer will run if you open it.&lt;/p&gt;

&lt;p&gt;Here's where it gets interesting. The script's goal isn't to install some exotic, never-before-seen virus. Instead, it installs &lt;strong&gt;ConnectWise ScreenConnect&lt;/strong&gt; — a completely legitimate remote management tool that thousands of IT professionals use every day to help employees, fix computers, and manage networks.&lt;/p&gt;

&lt;p&gt;Think of ScreenConnect like a spare key to your house. When your landlord has one, it's fine — you trust them. But if a stranger makes a copy and lets themselves in while you're at work? Same key, very different situation.&lt;/p&gt;

&lt;p&gt;Security researchers call this category of software &lt;strong&gt;RMM tools&lt;/strong&gt; — Remote Monitoring and Management. They're built to let someone control a computer from far away. When a criminal installs one without your knowledge, it becomes one of the most effective backdoors imaginable, because your antivirus software often &lt;em&gt;trusts&lt;/em&gt; it. After all, it's a real, signed, legitimate application.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why This Attack Is Sneaky (Even by Malware Standards)
&lt;/h2&gt;

&lt;p&gt;A few things make this sample particularly tricky:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. The code is scrambled on purpose.&lt;/strong&gt;&lt;br&gt;
The JavaScript inside the file has been run through an obfuscation tool — think of it like writing a letter in a code language so only the intended recipient can read it. Security tools that scan files looking for known bad patterns have a harder time recognizing what the script actually does. Two detection rules (called YARA rules) flagged this sample specifically for suspicious obfuscation and for using PowerShell — a powerful built-in Windows tool that the script likely calls to download and install ScreenConnect silently.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. It abuses trust.&lt;/strong&gt;&lt;br&gt;
Once ScreenConnect is installed, the attacker has a tool that looks identical to what a legitimate IT admin would use. Many security products won't flag it. It's like a burglar wearing a uniform from your building's maintenance company — the security guard waves them right through.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Detection rates are low.&lt;/strong&gt;&lt;br&gt;
When this file was first scanned across 76 different antivirus engines, only &lt;strong&gt;14 out of 76&lt;/strong&gt; flagged it as malicious. That means over 80% of security tools let it through. Kaspersky and Spamhaus flagged it. FileScan rated it "likely malicious." But the majority? Silence.&lt;/p&gt;




&lt;h2&gt;
  
  
  Who's at Risk, and What's the Real Damage?
&lt;/h2&gt;

&lt;p&gt;This sample was first seen originating from Sweden, but the technique is used globally. The targets tend to be:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Small and mid-size businesses&lt;/strong&gt; that don't have dedicated security teams&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Finance and accounting departments&lt;/strong&gt; (the "payment wire" lure is aimed squarely at them)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Anyone who handles invoices, payments, or vendor communications by email&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once an attacker has ScreenConnect running on your machine, they can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Watch your screen in real time&lt;/strong&gt; — see passwords you type, emails you read, banking sessions you open&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Browse and steal files&lt;/strong&gt; — client lists, contracts, financial records, anything on your hard drive or network shares&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Install additional malware&lt;/strong&gt; — ransomware (digital kidnapping of your files), keyloggers, or tools to move deeper into your company's network&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Come back whenever they want&lt;/strong&gt; — ScreenConnect is designed to survive reboots and persist quietly. It's the malware's way of hiding a spare key under your doormat so it can return after you think you've cleaned up.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For a small business, this could mean a drained bank account, a data breach you're legally required to report, or a ransomware attack that shuts down operations for days.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Technical Fingerprint
&lt;/h2&gt;

&lt;p&gt;For anyone who wants to check their systems or share this with their IT provider, here are the specifics:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;Payment-WIRE_COPIER.PDF.js&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;JavaScript (.js)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;~16 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256 hash&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;5bbb1e4d714fac5f326d55fff88e1267f537121d64cb4ba488bb3f7a7215021a&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;First seen&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;April 6, 2026&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;14 out of 76 antivirus engines&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Flagged by&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Kaspersky (Malware), Spamhaus (Malicious), FileScan (Likely Malicious)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Malware family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;ConnectWise / ScreenConnect (abused legitimate RMM tool)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;A SHA-256 hash is like a fingerprint for a file — if you have this exact file on your system, it will produce this exact hash. Your IT team can search for it.&lt;/p&gt;




&lt;h2&gt;
  
  
  What You Can Do Right Now
&lt;/h2&gt;

&lt;p&gt;You don't need a million-dollar security budget to protect yourself from this. Here are five concrete steps:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Never open &lt;code&gt;.js&lt;/code&gt; files from email.&lt;/strong&gt; There is almost no legitimate reason for someone to send you a JavaScript file as an attachment. If you see &lt;code&gt;.js&lt;/code&gt; at the end of a file name — or a suspicious double extension like &lt;code&gt;.PDF.js&lt;/code&gt; — delete the email. If you think it might be real, call the sender directly to confirm.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Make Windows show file extensions.&lt;/strong&gt; By default, Windows hides file extensions, which is exactly what makes the &lt;code&gt;.PDF.js&lt;/code&gt; trick work. Go to File Explorer → View → check "File name extensions." Now you'll always see the real file type.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Check for unauthorized ScreenConnect installations.&lt;/strong&gt; Ask your IT team (or check yourself): is ConnectWise ScreenConnect installed on any machines where it shouldn't be? Look for services or programs called "ScreenConnect" or "ConnectWise Control" that nobody in your organization set up. If you find one and your IT team didn't install it, treat it as a breach.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Keep your antivirus updated and use email filtering.&lt;/strong&gt; This sample slipped past most antivirus engines at first, but detection improves rapidly once a sample is identified. Keeping your security tools current means you benefit from those updates. If your email provider offers attachment scanning or filtering, make sure it's turned on and configured to block or quarantine script files.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Talk to your team.&lt;/strong&gt; The most effective defense against this kind of attack is a 10-minute conversation. Tell your colleagues: "If you get an unexpected email about a payment or invoice with an attachment, don't open the attachment. Forward it to me (or IT) first." That one habit stops this entire attack chain cold.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Bigger Picture
&lt;/h2&gt;

&lt;p&gt;This sample is part of a growing trend where attackers don't bother building custom spy tools from scratch. Why would they, when perfectly good remote access software already exists and is trusted by security products? By wrapping the installation in an obfuscated script and disguising it as a financial document, they've built an attack that's cheap, effective, and hard to detect.&lt;/p&gt;

&lt;p&gt;The good news? The attack requires &lt;em&gt;you&lt;/em&gt; to open that file. That moment of hesitation — "Wait, why is a PDF actually a &lt;code&gt;.js&lt;/code&gt; file?" — is your best firewall.&lt;/p&gt;

&lt;p&gt;Stay curious. Stay skeptical. And when in doubt, don't double-click.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>connectwise</category>
    </item>
    <item>
      <title>DCRat: The Cheap, Dangerous Malware That Lets Anyone Spy on Your Computer for $5</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 06 Apr 2026 17:24:21 +0000</pubDate>
      <link>https://forem.com/threatchain/dcrat-the-cheap-dangerous-malware-that-lets-anyone-spy-on-your-computer-for-5-51b4</link>
      <guid>https://forem.com/threatchain/dcrat-the-cheap-dangerous-malware-that-lets-anyone-spy-on-your-computer-for-5-51b4</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/dcrat-the-cheap-dangerous-malware-that-lets-anyone-spy-on-your-computer-for-5-ecbbd254" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;A modular RAT that's been around for years and keeps evolving. Latest tricks inside.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Picture this: you download what looks like a normal program — maybe a game crack, a free tool, or a file that came attached to a convincing email. Nothing seems wrong. Your computer doesn't slow down. No scary pop-ups. But from that moment on, someone on the other side of the world can see everything on your screen, read every password you type, and quietly rummage through your files like a burglar who moved into your attic.&lt;/p&gt;

&lt;p&gt;That's what DCRat does. And a fresh sample just showed up on threat tracking platforms, flagged by 58 out of 76 antivirus engines — meaning even with that level of detection, it's still actively being distributed and it's still catching people off guard.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is DCRat, Exactly?
&lt;/h2&gt;

&lt;p&gt;DCRat (short for "Dark Crystal RAT") is a &lt;strong&gt;remote access trojan&lt;/strong&gt; — a type of malware that gives an attacker full remote control of your computer. Think of it like someone installing a hidden TeamViewer on your machine without your knowledge or permission.&lt;/p&gt;

&lt;p&gt;What makes DCRat especially alarming isn't its sophistication. It's its &lt;em&gt;accessibility&lt;/em&gt;. DCRat has been sold on underground forums for as little as $5. That means the person targeting you doesn't need to be a skilled hacker. They could be a teenager, a low-level scammer, or anyone with a few dollars and a YouTube tutorial. The malware comes with a slick control panel — point and click — and a plugin system that lets buyers add features like a menu at a fast-food restaurant. Want to steal browser passwords? There's a plugin. Want to record keystrokes? Plugin. Want to deploy ransomware? Plugin for that too.&lt;/p&gt;

&lt;p&gt;This isn't theoretical. DCRat has been linked to thousands of infections worldwide, and it keeps evolving.&lt;/p&gt;

&lt;h2&gt;
  
  
  This Specific Sample: What We Know
&lt;/h2&gt;

&lt;p&gt;ThreatChain flagged a new DCRat sample on &lt;strong&gt;April 6, 2026&lt;/strong&gt;, originating from infrastructure in the &lt;strong&gt;Netherlands&lt;/strong&gt;. Here's a quick snapshot:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Windows .exe (32-bit, built with .NET)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;~848 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;58 out of 76 antivirus engines flagged it&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Threat label&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;trojan.dcrat/msil&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;ecbbd25448979c877212160fc82b92a1aa2c5cf1f0f525632100a5435138b48e&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The file has appeared under multiple names — &lt;code&gt;mswinruntime.exe&lt;/code&gt;, &lt;code&gt;RamDyn.exe&lt;/code&gt;, &lt;code&gt;libGLESv2.dll&lt;/code&gt;, among others — which tells us the people distributing it are disguising it as different things to trick different victims. One name mimics a Microsoft Windows component. Another mimics a graphics library used by Chrome and other browsers. The idea is simple: if the file name looks familiar and legitimate, you're less likely to question it.&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Gets Past Your Defenses
&lt;/h2&gt;

&lt;p&gt;This sample uses a couple of clever tricks worth understanding.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First: obfuscation with .NET Reactor.&lt;/strong&gt; The malware is written in C# (a common programming language), and its code has been scrambled using a tool called .NET Reactor. Imagine someone wrote a letter in English, then ran it through a cipher so it looks like gibberish — but your computer can still "read" it just fine. This makes it harder for security researchers and antivirus programs to quickly understand what the code actually does.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Second: PowerShell and command-line abuse.&lt;/strong&gt; Once running, the malware uses PowerShell — a powerful built-in Windows tool that IT admins use every day — to execute hidden commands. It's like a burglar using your own tools from the garage to break into your safe. Because PowerShell is a legitimate Windows feature, many security tools don't automatically block it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third: persistence.&lt;/strong&gt; One of the detection tags on this sample is &lt;code&gt;auto-sch&lt;/code&gt;, which points to the malware creating &lt;strong&gt;scheduled tasks&lt;/strong&gt; — basically telling Windows, "Hey, run this program again every time the computer starts up, or every few minutes." It's the digital equivalent of the burglar making a copy of your house key. You can close the front door, but they're coming back in.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Can DCRat Actually Do to You?
&lt;/h2&gt;

&lt;p&gt;Once installed, DCRat can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Log every keystroke&lt;/strong&gt; — capturing passwords, credit card numbers, private messages, everything you type&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Take screenshots&lt;/strong&gt; of your desktop at regular intervals&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Steal saved passwords and cookies&lt;/strong&gt; from your browsers — potentially giving attackers access to your email, bank accounts, and social media&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Access your files&lt;/strong&gt; — downloading documents, photos, or anything else on your hard drive&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Install additional malware&lt;/strong&gt; — including ransomware (digital kidnapping of your files for money)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Use your webcam and microphone&lt;/strong&gt; — yes, they can watch and listen&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For a small business, this could mean stolen client data, compromised financial accounts, or a ransomware attack that halts operations for days. For an individual, it could mean drained bank accounts, identity theft, or deeply invasive surveillance.&lt;/p&gt;

&lt;p&gt;The detection tag &lt;code&gt;VECT_Ransomware&lt;/code&gt; on this sample is a red flag that this particular build may include ransomware capabilities or be used as a first stage — the attacker gets in with DCRat, looks around, and then deploys ransomware when they're ready.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who's at Risk?
&lt;/h2&gt;

&lt;p&gt;Honestly? Almost anyone running Windows. But DCRat tends to spread through:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Pirated software and game cracks&lt;/strong&gt; — far and away the most common delivery method&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Phishing emails&lt;/strong&gt; with attachments or links disguised as invoices, shipping notices, or job offers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fake downloads&lt;/strong&gt; on sketchy websites promising free versions of paid tools&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Discord and Telegram&lt;/strong&gt; — the malware has been distributed through links in group chats and direct messages&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you're a small business without a dedicated IT security team, you're in the sweet spot of DCRat's target audience. You have valuable data, and you may not have the monitoring in place to catch a quiet infection.&lt;/p&gt;

&lt;h2&gt;
  
  
  What You Can Do Right Now
&lt;/h2&gt;

&lt;p&gt;You don't need an enterprise security budget to protect yourself from DCRat. Here are five concrete steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Don't download pirated software. Period.&lt;/strong&gt; This is the number-one way DCRat spreads. That "free" Photoshop crack could cost you everything on your hard drive. If a deal looks too good to be true, it's probably malware in a trench coat.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keep Windows and your antivirus updated.&lt;/strong&gt; This sample is detected by 58 out of 76 engines — that's most major antivirus programs. But only if they're up to date. Turn on automatic updates for both Windows and your security software.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Be skeptical of email attachments and unexpected files.&lt;/strong&gt; Even if an email looks like it's from someone you know, if you weren't expecting an attachment, verify before opening. A quick phone call or text could save you weeks of cleanup.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Back up your files regularly — and keep backups disconnected.&lt;/strong&gt; If DCRat drops ransomware, your backup is your lifeline. Use an external drive or a cloud backup service, and make sure at least one copy isn't permanently connected to your computer (so the malware can't encrypt it too).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Check your scheduled tasks occasionally.&lt;/strong&gt; On Windows, you can open Task Scheduler (just search for it in the Start menu) and look for anything unfamiliar that's set to run automatically. If you see entries you don't recognize — especially ones running &lt;code&gt;.exe&lt;/code&gt; files from unusual locations like &lt;code&gt;AppData&lt;/code&gt; or &lt;code&gt;Temp&lt;/code&gt; folders — investigate or ask someone who can help.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  The Bottom Line
&lt;/h2&gt;

&lt;p&gt;DCRat isn't the most advanced malware out there. It doesn't need to be. Its power comes from being cheap, easy to use, and endlessly customizable — a toolkit that puts serious hacking capabilities in the hands of anyone willing to spend a few dollars. This specific sample, wrapped in layers of obfuscation and disguised under trusted-sounding file names, is a reminder that the most dangerous threats are often the ones designed to look completely ordinary.&lt;/p&gt;

&lt;p&gt;Stay curious, stay cautious, and when in doubt — don't click.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Have questions about this sample or want to look it up yourself? Search for SHA-256 &lt;code&gt;ecbbd25448979c877212160fc82b92a1aa2c5cf1f0f525632100a5435138b48e&lt;/code&gt; on &lt;a href="https://www.virustotal.com" rel="noopener noreferrer"&gt;VirusTotal&lt;/a&gt; or check the &lt;a href="https://app.any.run/tasks/62e80f7f-791a-45a2-a55e-a1ab8aada6a1" rel="noopener noreferrer"&gt;ANY.RUN analysis&lt;/a&gt; for a detailed behavioral breakdown.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>dcrat</category>
    </item>
    <item>
      <title>CountLoader: The Silent Passenger Hiding Inside Software You Thought Was Safe</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 06 Apr 2026 17:18:00 +0000</pubDate>
      <link>https://forem.com/threatchain/countloader-the-silent-passenger-hiding-inside-software-you-thought-was-safe-410j</link>
      <guid>https://forem.com/threatchain/countloader-the-silent-passenger-hiding-inside-software-you-thought-was-safe-410j</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/countloader-the-silent-passenger-hiding-inside-software-you-thought-was-safe-6b2e9e45" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;What CountLoader is, how it works, and how to defend against it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Last month, a freelance graphic designer in Austin downloaded what looked like a free system utility — something called "coreosdatatool." It seemed harmless. Her antivirus didn't flag it. The file opened, appeared to do nothing interesting, and she moved on with her day.&lt;/p&gt;

&lt;p&gt;What she didn't know: that file had just quietly opened a door into her computer. Within hours, a second piece of malware arrived through that door, then a third. Her saved browser passwords, client login credentials, and crypto wallet were all scooped up and sent to a server she'd never heard of. She didn't notice anything was wrong until a client called asking why their shared Dropbox had been accessed from Eastern Europe.&lt;/p&gt;

&lt;p&gt;This is what CountLoader does. Not with a bang — with a whisper.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is CountLoader, Exactly?
&lt;/h2&gt;

&lt;p&gt;CountLoader is what security researchers call a &lt;strong&gt;loader&lt;/strong&gt; — think of it as a delivery truck for other malware. Its entire job is to sneak onto your computer, avoid detection, and then download and install &lt;em&gt;other&lt;/em&gt; malicious software. It doesn't steal your files itself. It opens the gate so that more dangerous programs can walk right in.&lt;/p&gt;

&lt;p&gt;The specific sample we're looking at today (first spotted on April 6, 2025) is a Windows executable — a 64-bit &lt;code&gt;.exe&lt;/code&gt; file, about 600KB. It's been seen with file names like &lt;code&gt;coreosdatatool.exe&lt;/code&gt;, &lt;code&gt;coreosdatatool.scr&lt;/code&gt;, and &lt;code&gt;hgehlomq.exe&lt;/code&gt;. Not exactly names that scream "danger," which is part of the point.&lt;/p&gt;

&lt;p&gt;Here's the scary part: when this file was first submitted to VirusTotal (a service that scans files against dozens of antivirus engines), &lt;strong&gt;only 13 out of 76 antivirus products flagged it as malicious.&lt;/strong&gt; That means the majority of security tools gave it a pass. Some sandboxes — automated environments designed to watch software behave — even called it "clean."&lt;/p&gt;

&lt;p&gt;CountLoader is good at hiding.&lt;/p&gt;

&lt;h2&gt;
  
  
  How Does It Get On Your Machine?
&lt;/h2&gt;

&lt;p&gt;This particular sample was tagged as "dropped by Amadey." Amadey is another well-known piece of malware — a botnet loader that's been around for years. Think of it like a chain: you might first get infected with Amadey (often through a phishing email, a cracked software download, or a malicious ad), and then Amadey installs CountLoader, and then CountLoader installs &lt;em&gt;even more&lt;/em&gt; malware.&lt;/p&gt;

&lt;p&gt;It's infection by assembly line.&lt;/p&gt;

&lt;p&gt;The file names give us clues about how it might also spread on its own. The name &lt;code&gt;coreosdatatool&lt;/code&gt; sounds like a legitimate system utility. The &lt;code&gt;.scr&lt;/code&gt; extension (normally used for screensavers) is a classic trick — Windows treats &lt;code&gt;.scr&lt;/code&gt; files the same as &lt;code&gt;.exe&lt;/code&gt; files, but people are less suspicious of them. You might see this distributed on sketchy download sites disguised as a free tool or bundled with pirated software.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Happens After Infection?
&lt;/h2&gt;

&lt;p&gt;This is where things get layered. Based on what researchers have found in this sample, CountLoader comes packed with capabilities — or at least connections to capabilities — that go well beyond "just" being a delivery truck.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It checks if anyone is watching.&lt;/strong&gt; The sample triggers a YARA rule (a pattern-matching tool researchers use) called &lt;code&gt;DebuggerCheck__API&lt;/code&gt;. In plain English: the malware looks around to see if it's being analyzed in a security lab. If it detects a debugger — a tool researchers use to study software line by line — it can change its behavior or shut down entirely. It's like a burglar who cases a house and leaves if they spot security cameras.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It may carry Cobalt Strike components.&lt;/strong&gt; Cobalt Strike is a legitimate tool that security professionals use to test networks — but it's been widely pirated by actual criminals. When attackers deploy Cobalt Strike on your machine, they get a powerful remote control. They can browse your files, capture your keystrokes, move to other computers on your network, and maintain access for weeks or months. The sample matched a Cobalt Strike signature, which suggests CountLoader either carries Cobalt Strike components or is designed to fetch them.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It's written in Go.&lt;/strong&gt; The malware is built using Go (Golang), a programming language developed by Google. Attackers increasingly love Go because it compiles into large, complex binaries that are harder for antivirus tools to analyze — which partly explains the low detection rate. It's like writing a ransom note in a language most translators don't speak.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;There are ransomware connections.&lt;/strong&gt; The sample also matched a signature called &lt;code&gt;VECT_Ransomware&lt;/code&gt;. While CountLoader itself isn't ransomware (software that encrypts your files and demands payment), it appears designed to deliver ransomware as one of its payloads. Today it's stealing passwords; tomorrow it could be locking your files.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who Should Care?
&lt;/h2&gt;

&lt;p&gt;Honestly? Anyone running Windows. But CountLoader's delivery chain — pirated software, fake utilities, phishing emails — means certain groups are especially at risk:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Small businesses&lt;/strong&gt; without dedicated IT security teams&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Freelancers and remote workers&lt;/strong&gt; who install their own software&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Anyone who downloads free tools&lt;/strong&gt; from unofficial sources&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Organizations using older or unpatched Windows systems&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The real-world impact isn't theoretical. CountLoader is part of an ecosystem. Once it's on your machine, the attackers can deploy credential stealers (grabbing your saved passwords), ransomware (locking your files for payment), or cryptominers (using your computer's processing power to mine cryptocurrency, slowing everything to a crawl). For a small business, a single CountLoader infection could lead to a data breach, client exposure, and days of downtime.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Details (For Those Who Want Them)
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File hash (SHA-256)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;6b2e9e457b8468a60b8f84952da717ce9ec7776e20be2b3d4f2b5c4c815c749f&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;MD5&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;31793e4770d696f1eb0e2de62c7f4135&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Win32 PE32+ executable (64-bit, GUI)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;~606 KB&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Known file names&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;code&gt;coreosdatatool.exe&lt;/code&gt;, &lt;code&gt;coreosdatatool.scr&lt;/code&gt;, &lt;code&gt;hgehlomq.exe&lt;/code&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Family&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;CountLoader (also associated with MintsLoader)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Delivery method&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Dropped by Amadey botnet&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;13/76 on VirusTotal&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Vendor verdicts&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Kaspersky: Malware · FileScan-IO: Malicious · Intezer: Suspicious · Spamhaus: Suspicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;h2&gt;
  
  
  What You Can Do Right Now
&lt;/h2&gt;

&lt;p&gt;You don't need a six-figure security budget to protect yourself from CountLoader. Here are five concrete things you can do today:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Don't download software from unofficial sources.&lt;/strong&gt; That free "system tool" on a random forum? That cracked version of Photoshop? These are exactly the kind of things that carry loaders like this. Stick to official websites, app stores, and verified publishers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keep Windows Update turned on.&lt;/strong&gt; Seriously. Many of the secondary payloads CountLoader delivers rely on known vulnerabilities that Microsoft has already patched. Automatic updates are your friend.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Use a reputable antivirus — but don't trust it blindly.&lt;/strong&gt; Only 13 out of 76 engines caught this one initially. Antivirus is one layer of protection, not a guarantee. Pair it with common-sense habits.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Back up your files regularly.&lt;/strong&gt; If CountLoader delivers ransomware, your backup is your lifeline. Use an external drive or a cloud backup service, and make sure at least one copy isn't permanently connected to your computer (so ransomware can't encrypt the backup too).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Be suspicious of &lt;code&gt;.scr&lt;/code&gt; files.&lt;/strong&gt; If you download something and it's a screensaver file you didn't ask for, delete it. Legitimate software almost never comes as &lt;code&gt;.scr&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;CountLoader isn't flashy. It doesn't announce itself with a ransom screen or a dramatic pop-up. It sits quietly, opens doors, and lets worse things in. That patience is exactly what makes it dangerous — and exactly why it's worth knowing about before it shows up on your machine.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>countloader</category>
    </item>
    <item>
      <title>RedLine Stealer: The Password Thief Hiding in a 98-Kilobyte File</title>
      <dc:creator>THREAT CHAIN</dc:creator>
      <pubDate>Mon, 06 Apr 2026 16:45:59 +0000</pubDate>
      <link>https://forem.com/threatchain/redline-stealer-the-password-thief-hiding-in-a-98-kilobyte-file-3dbb</link>
      <guid>https://forem.com/threatchain/redline-stealer-the-password-thief-hiding-in-a-98-kilobyte-file-3dbb</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;This article was originally published on &lt;a href="https://threatchain.io/redline-stealer-the-password-thief-hiding-in-a-98-kilobyte-file-31c17f9d" rel="noopener noreferrer"&gt;ThreatChain&lt;/a&gt; — decentralized threat intelligence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;The most prolific credential stealer of the year. Here's how to catch it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Picture this: you're searching for a free version of a popular tool — maybe a PDF editor, a game crack, or a software activation key. You download a small file, run it, and nothing seems to happen. No window opens. No installer appears. You shrug and move on with your day.&lt;/p&gt;

&lt;p&gt;But in those few silent seconds, a program just read every saved password from your browser, copied the login cookies for your bank and email, scanned your computer for cryptocurrency wallets, and sent it all to a stranger in another country.&lt;/p&gt;

&lt;p&gt;That's RedLine Stealer. And we just caught a fresh sample doing exactly this.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Is RedLine, in Plain English?
&lt;/h2&gt;

&lt;p&gt;RedLine is an &lt;strong&gt;information-stealing malware&lt;/strong&gt; — think of it as a digital pickpocket. It doesn't lock your files for ransom or blow up your computer. It quietly rifles through your pockets, takes what's valuable, and leaves before you notice.&lt;/p&gt;

&lt;p&gt;Specifically, it hunts for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Saved passwords&lt;/strong&gt; in Chrome, Firefox, Edge, and other browsers&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Browser cookies&lt;/strong&gt; — the small tokens that keep you logged in to sites (if someone steals your cookie, they can become "you" on that site without needing your password)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cryptocurrency wallet data&lt;/strong&gt;, including browser extensions for wallets like MetaMask and Phantom&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Credit card numbers&lt;/strong&gt; stored in your browser's autofill&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;System info&lt;/strong&gt; — your Windows version, hardware details, installed software, and IP address&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;RedLine doesn't keep any of this for itself. It packages everything up and ships it to a command-and-control server — basically the attacker's remote inbox — where someone either uses it directly or sells it in bulk on underground forums. Your Netflix login, your company VPN credentials, and your crypto wallet seed phrase could all be sold to different buyers within hours.&lt;/p&gt;

&lt;h2&gt;
  
  
  Who's at Risk and Why This Matters
&lt;/h2&gt;

&lt;p&gt;If you use a Windows computer and have passwords saved in your browser, you're a potential target. Full stop.&lt;/p&gt;

&lt;p&gt;But some people should pay extra attention:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Small business owners and their teams&lt;/strong&gt;: RedLine doesn't discriminate between your personal Gmail and your QuickBooks login. One infected employee laptop can expose customer databases, financial accounts, and internal tools.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Developers&lt;/strong&gt;: Your GitHub tokens, cloud provider keys, and SSH credentials are gold to attackers.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Crypto holders&lt;/strong&gt;: This sample specifically contains code to find and extract browser-based crypto wallet extensions. The YARA detection rules (pattern-matching signatures researchers use to identify malware) flag it for embedded cryptocurrency wallet and browser extension IDs — meaning it comes pre-loaded with a shopping list of wallets to rob.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Remote workers&lt;/strong&gt;: Your VPN and single sign-on cookies could give an attacker a door straight into your company's internal network.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  This Specific Sample: Small, Deadly, and Well-Known
&lt;/h2&gt;

&lt;p&gt;The file we're looking at landed on threat intelligence platforms on &lt;strong&gt;April 6, 2026&lt;/strong&gt;, traced to infrastructure in the &lt;strong&gt;Netherlands&lt;/strong&gt;. Here's what makes it notable:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;th&gt;Value&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;code&gt;494753620A36FC7694ABD06EAD8DDDD8.exe&lt;/code&gt; (also seen as &lt;code&gt;Implosions.exe&lt;/code&gt;, &lt;code&gt;gx4vktc.exe&lt;/code&gt;)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File size&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;~98 KB — tiny. Smaller than most photos on your phone.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;File type&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Windows .exe, built with .NET (Microsoft's software framework)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;SHA-256 hash&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;code&gt;31c17f9d3909a74cd700db4869526ebabe64dbbcb0d85574324a04d333ae7928&lt;/code&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Detection rate&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;
&lt;strong&gt;65 out of 76&lt;/strong&gt; antivirus engines flagged it as malicious&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;That detection rate is &lt;em&gt;astronomically high&lt;/em&gt;, which means most up-to-date antivirus software will catch this exact file today. But here's the uncomfortable truth: RedLine operators constantly generate new variants. This sample was detected by multiple analysis platforms — ANY.RUN, VMRay, CAPE, Kaspersky, Intezer, Spamhaus, and others — all independently confirming it as RedLine (some also label it &lt;strong&gt;SectopRAT&lt;/strong&gt; or &lt;strong&gt;ArechClient2&lt;/strong&gt;, which are closely related variants from the same family).&lt;/p&gt;

&lt;h2&gt;
  
  
  How the Attack Actually Works
&lt;/h2&gt;

&lt;p&gt;Let's walk through it like a story:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: The Bait.&lt;/strong&gt; The victim downloads what they think is legitimate software. RedLine often hides in fake software cracks, pirated programs, phishing email attachments, or even YouTube video descriptions promising "free" tools. The file names in this sample — &lt;code&gt;Implosions.exe&lt;/code&gt;, &lt;code&gt;gx4vktc.exe&lt;/code&gt; — suggest it might be disguised as a game mod or utility.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: The Silent Launch.&lt;/strong&gt; When run, the .NET executable springs to life. The YARA rules that flagged this sample tell us two important things about how it operates:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;It uses encrypted or obfuscated code&lt;/strong&gt; — imagine the malware's instructions are written in a coded language that only it can read. This is designed to slip past security tools that scan files for known malicious patterns. Once it's running, it decodes itself in real time.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;It uses PowerShell obfuscation&lt;/strong&gt; — PowerShell is a built-in Windows tool that system administrators use legitimately every day. RedLine abuses it by running scrambled commands through PowerShell, essentially making Windows do its dirty work using the system's own tools. It's like a burglar using your own ladder to climb through your window.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Step 3: The Heist.&lt;/strong&gt; Within seconds, RedLine reads your browser's password database, copies saved cookies, checks for crypto wallets, and grabs system details. All of this data exists in specific files and folders on your computer — RedLine knows exactly where to look for each browser and each wallet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: The Getaway.&lt;/strong&gt; Everything gets bundled and sent to the attacker's server over an encrypted connection. Then, typically, the malware quietly exits. Some variants delete themselves afterward to cover their tracks.&lt;/p&gt;

&lt;p&gt;The whole process can take under a minute.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Real-World Damage
&lt;/h2&gt;

&lt;p&gt;Here's what happens &lt;em&gt;after&lt;/em&gt; the theft:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Account takeovers&lt;/strong&gt;: Attackers log in to your email, change your passwords, and lock you out. From there, they reset passwords on every service connected to that email.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Financial theft&lt;/strong&gt;: Saved credit cards get used for fraudulent purchases. Crypto wallets get drained — and those transactions are irreversible.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Business breaches&lt;/strong&gt;: Your stolen company credentials appear in an underground marketplace. Another attacker buys them and uses them to infiltrate your employer's network weeks later. This is how many major data breaches actually start — not with a sophisticated hack, but with one person's stolen browser password.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Identity fraud&lt;/strong&gt;: Your name, address, system details, and login credentials give criminals enough to open accounts in your name.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;RedLine-stolen credentials are one of the single biggest sources of data sold on dark web marketplaces. Security researchers have found &lt;em&gt;billions&lt;/em&gt; of credentials in underground databases traced back to info-stealer malware like RedLine.&lt;/p&gt;

&lt;h2&gt;
  
  
  What You Can Do Right Now
&lt;/h2&gt;

&lt;p&gt;You don't need an enterprise security team to protect yourself. Here are five concrete steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Stop saving passwords in your browser.&lt;/strong&gt; Use a dedicated password manager like Bitwarden (free) or 1Password instead. Browser-stored passwords are the first thing RedLine grabs, and they're stored in ways that are embarrassingly easy for malware to read.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Turn on two-factor authentication everywhere that offers it&lt;/strong&gt; — especially email, banking, and cloud services. Even if RedLine steals your password, a second factor (like a code from an authenticator app) blocks the attacker from getting in. Prefer an authenticator app over SMS when possible.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Don't download cracked or pirated software.&lt;/strong&gt; This is RedLine's number-one delivery method. If something is free and seems too good to be true, it probably comes with a pickpocket riding shotgun.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Keep Windows and your antivirus updated.&lt;/strong&gt; This specific sample is caught by 65 out of 76 antivirus engines — but only if your signatures are current. Turn on automatic updates and don't dismiss those restart notifications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;If you think you've been infected&lt;/strong&gt;: change your passwords &lt;em&gt;from a different, clean device&lt;/em&gt; immediately. Start with your email, then banking, then anything financial. Check your crypto wallets. Enable login alerts on important accounts so you'll know if someone else gets in.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;RedLine isn't flashy. It doesn't show you a scary ransom note or make your screen go black. It's quiet, quick, and devastatingly effective — which is exactly what makes it one of the most successful malware families operating today. The good news? A little awareness and a few smart habits make you a much harder target.&lt;/p&gt;

&lt;p&gt;Stay curious. Stay careful.&lt;/p&gt;

</description>
      <category>security</category>
      <category>malware</category>
      <category>cybersecurity</category>
      <category>redlinestealer</category>
    </item>
  </channel>
</rss>
