KadNap malware ensnares over 14K routers in massive botnet
The malware’s operators mainly exploit home and small-office networking equipment.
The malware’s operators mainly exploit home and small-office networking equipment.
Attackers are exploiting recently disclosed vulnerabilities or weak credentials to gain access to FortiGate devices.
The threat actor has been using the BeardShell and Covenant custom malware implants since April 2024.
Organizations are recommended to patch the vulnerabilities as soon as possible.
Instead of relying on established off-the-shelf malware, the group is now creating disposable binaries across multiple programming languages.
The attackers are trying to obtain verification and PIN codes that protect accounts on the messaging platforms.
The extensions were modified to disable browser protections, inject malicious code, and steal data.
The CL-UNK-1068 group uses custom malware, modified open-source utilities, and legitimate system tools to maintain long-term access.
The campaign, observed in February 2026, directs users to launch Windows Terminal using the Windows + X → I shortcut.
The malware uses the Deno runtime environment to execute malicious commands on compromised systems.
Showing elements 71 - 80