eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

235
active users

#malware

36 posts34 participants0 posts today
Continued thread

3/3 Yes, this is #enshittification. It's deliberate obsolescence.

The Microsoft business case is that users should buy their hardware (prominently advertised at their notice of support ending), and buy into W11/services.

The counterargument is that newer hardware is required to mitigate against some types of #malware attacks.

The background is that our computing environments are spoiled because some people are 'bad actors', which creates the need for ('cyber') #security

So, a business associate's email got spoofed and I was sent an email with a link. It was something that was normal for him to send so I clicked it. It was of course as you surmised, malicious.

I did this on my iPhone. Nothing opened and I haven't seen any worrying signs. Cleared all my history and such.

Anything I need to worry about? Asking all the big brains out there.

New version of MysterySnail RAT and lightweight MysteryMonoSnail backdoor

A new version of the MysterySnail RAT, attributed to the Chinese-speaking IronHusky APT group, has been detected targeting government organizations in Mongolia and Russia. The malware, which hadn't been publicly reported since 2021, now features a modular architecture with five additional DLL modules for command execution. A lightweight version dubbed MysteryMonoSnail was also observed. The infection chain involves a malicious MMC script, an intermediary backdoor, and the main MysterySnail RAT payload. The attackers use public file storage and the piping-server project for command and control. This case highlights the importance of maintaining vigilance against seemingly obsolete malware families, as they may continue operating undetected for extended periods.

Pulse ID: 6800fcd0995e011520970651
Pulse Link: otx.alienvault.com/pulse/6800f
Pulse Author: AlienVault
Created: 2025-04-17 13:06:24

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Benutzer von Outlook müssen wirklich seeehr geduldig sein.

Meiner Meinung nach einer der miesesten #EMail-Clients (aber leider der beste #Groupware-Client) und dann noch die ständigen #Cloud-Zwänge, das Abschnorcheln der Passwörter durch #Microsoft (iOS/Android/neues #Outlook), quasi optimiert als Einfallstor für #Phishing und #Malware und dann noch solche Kleinigkeiten:

Fehler in Microsoft Outlook kann das System massiv verlangsamen
derstandard.at/story/300000026

Leute, ich frage mich ernsthaft, warum die Menschen nicht scharenweise zu zumindest #Thunderbird wechseln, wo man fast alle Outlook-Nachteile mit einem Schlag verliert. Auch bei Benutzung via #Exchange.

DER STANDARD · Fehler in Microsoft Outlook kann das System massiv verlangsamenUnter bestimmten Umständen kann der E-Mail-Client die Hälfte der CPU-Ressourcen beanspruchen – behelfen kann man sich derzeit nur mit einem Workaround

Aunque el uso de aplicaciones infectadas con malware para robar información financiera no es algo nuevo, los últimos hallazgos de la empresa rusa de antivirus Doctor Web apuntan a una escalada significativa, ya que los atacantes están atacando directamente la cadena de suministro de varios fabricantes chinos para cargar aplicaciones maliciosas en dispositivos completamente nuevos.
thehackernews.com/2025/04/chin
#Ciberseguridad #Seguridad #Privacidad #Aplicaciones #Malware

cannot believe it is occurring to people that #DOGE IS NOT ABOUT EFFICIENCY BUT #SURVEILLANCE. just like #creditCards #Paypal #Uber #Tesla #Doordash #Amazon #Netflix #GMail #Instagram and every fin/techbro business.

the apartheid clown’s #malware is a ruse to give techbros the power to spy on all Americans.

these are the consequences of your silence while many of your friends & relations vilified us for saying, DEFUND THE POLICE. we didn’t just mean PDs. we meant the whole police state.

Article: What is Incident Response? Process, Plan, and Complete Guide (2025) - Sygnia

Learn what Incident Response is, its process, and planning strategies. Explore this complete guide (2025) to effectively manage security incidents.

sygnia.co/blog/what-is-inciden

Sygnia · Incident Response? Process, Plan & Complete GuideLearn what Incident Response is, its process, and planning strategies. Explore this complete guide (2025) to effectively manage security incidents.

Newly Registered Domains Distributing SpyNote Malware

Cybercriminals are employing deceptive websites on newly registered domains to distribute AndroidOS SpyNote malware. These sites imitate the Google Chrome install page on the Google Play Store, tricking users into downloading SpyNote, a powerful Android remote access trojan. SpyNote is used for surveillance, data exfiltration, and remote control of infected devices. The investigation uncovered multiple domains, IP addresses, and APK files associated with this campaign. The malware utilizes various C2 endpoints for communication and data exfiltration, with functions designed to retrieve and manipulate device information, contacts, SMS, and applications.

Pulse ID: 67feb504b76dd387be73309b
Pulse Link: otx.alienvault.com/pulse/67feb
Pulse Author: AlienVault
Created: 2025-04-15 19:35:32

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.
#APK#Android#Chrome