Ransomware operators are increasingly misusing legitimate tools like Kickidler, an employee monitoring software, to advance their attacks. Cybersecurity firms Varonis and Synacktiv have observed ransomware affiliates from groups such as Qilin and Hunters International deploying Kickidler to conduct surveillance, record keystrokes, capture screenshots, and log administrator activity after breaching corporate networks. The attackers exploit these capabilities to harvest credentials and monitor victim behavior discreetly. Initial access in these campaigns was often achieved through malicious Google Ads impersonating legitimate software sites, including a fake RVTools website. Victims who downloaded the trojanized version of the program inadvertently launched a malware loader that delivered the SMOKEDHAM PowerShell backdoor. This backdoor facilitated the covert installation of Kickidler, enabling long-term monitoring to collect login credentials—particularly for off-site cloud backups, which are increasingly targeted by ransomware actors. Once reconnaissance was complete, attackers resumed malicious actions, launching ransomware payloads aimed at encrypting VMware ESXi virtual machines. Hunters International, for instance, used a PowerCLI script along with WinSCP to activate SSH and deploy ransomware on ESXi servers, causing significant operational disruption. These attacks demonstrate the advanced planning and persistence behind modern ransomware campaigns. While remote monitoring software like Kickidler is not commonly associated with ransomware, threat actors have long abused RMM tools to bypass system protections. Security agencies recommend regularly auditing installed remote access software, limiting use to authorized tools, enforcing strict application control policies, and blocking unused RMM ports. These steps can help reduce the risk of similar intrusions and protect critical infrastructure from exploitation.
A vulnerability in authentication bypass (CVE-2025-61928) had existed in the popular TypeScript auth library Better Auth. The flaw permitted unauthenticated actors to set or genera...
MediaTek's October 2025 Product Security Bulletin discloses several high and medium priority vulnerabilities on its WLAN (Wi-Fi), GNSS (Global Navigation Satellite System), and...
A severe security vulnerability, tracked as CVE-2025-61929 and rated CVSS 9.7, has been discovered in Cherry Studio a cross-platform desktop client supporting multiple large langua...