Security researchers have uncovered a search engine poisoning campaign targeting users searching for TestDisk, a popular open-source data recovery tool. Attackers lure victims to a fake website mimicking the legitimate CGSecurity TestDisk page, offering a free download of TestDisk 7.2/7.3. Instead of the genuine installer, users receive a trojanized executable disguised as a legitimate setup file. This file is actually a renamed Microsoft-signed binary abused to sideload a malicious DLL (autorun.dll). Once executed, it deploys both a legitimate version of TestDisk and a malicious ScreenConnect client, giving attackers persistent remote access to compromised systems. The attack succeeds by combining multiple evasion techniques. Obfuscated JavaScript generates one-time download URLs to bypass static detection, while the use of a trusted Microsoft-signed binary helps evade security controls. DLL sideloading allows malicious code to execute under the guise of a legitimate process. Additionally, the use of ScreenConnect—a widely trusted remote monitoring and management (RMM) tool—enables attackers to blend malicious activity with normal administrative behavior, making detection difficult. This technique reflects a growing trend of abusing legitimate tools for stealthy post-exploitation access. Security teams should monitor for suspicious domains such as testdisk[.]dev and related infrastructure and detect unusual DLL loading by trusted binaries. Organizations should maintain strict allow-lists for authorized ScreenConnect instances and alert on unauthorized installations. Users should be trained to download software only from official sources like the CGSecurity website. Implementing endpoint monitoring, restricting unknown RMM tools, and maintaining updated security defenses can significantly reduce the risk of such attacks.
A major surge in email-borne worms targeting industrial control systems (ICS) emerged in Q4 2025, signaling a serious shift in threats to operational technology (OT) environments. ...
A critical security issue affecting Fortinet’s FortiSandbox has gained significant attention following the public release of a proof-of-concept exploit. Identified as CVE-2026-39...
A targeted cyber campaign has been uncovered in which attackers exploit the legitimate Obsidian note-taking application to distribute a stealthy remote access trojan known as PHANT...