A newly discovered Brazilian banking trojan called TCLBANKER is actively targeting users through phishing campaigns and trojanized software installers. Researchers identified the malware being distributed through a fake Logitech installer packed inside a ZIP archive. The campaign uses DLL sideloading to load a malicious file that deploys both a banking trojan and a worm module. Once installed the malware monitors browser activity and checks whether victims are visiting Brazilian banking fintech or cryptocurrency websites. If a match is found attackers gain remote access to the infected device and can display convincing fake overlays such as Windows Update screens banking prompts and phone verification pages to steal credentials and financial information. The malware was designed to evade security tools and improve infection success rates. TCLBANKER performs anti debugging and anti analysis checks before decrypting its payload ensuring that it avoids execution in sandbox or research environments. It also disables telemetry monitoring and scans for popular security analysis applications such as IDA Pro Ghidra and x64dbg. Another major objective of the malware is rapid propagation. The WhatsApp module hijacks active WhatsApp Web sessions to send phishing links and malicious installers to the victims contacts while the Outlook module sends phishing emails directly from trusted accounts making detection more difficult. Researchers believe the campaign is still evolving because several developer artifacts testing files and unfinished phishing pages were discovered during the investigation. The malware infrastructure is hosted through Cloudflare Workers allowing operators to rotate domains and infrastructure quickly. Security experts linked TCLBANKER to the previously known MAVERICK and SORVEPOTEL malware families due to similarities in infrastructure and code behavior.
There has been a critical security hole in NGINX, which has been widely reported since the publication of an exploit to demonstrate the potential for remote code execution. The vul...
Security analysts uncovered a sophisticated intrusion campaign centered on TencShell, a modified variant of the open source Rshell command and control framework. The malware target...
Microsoft has introduced a new AI-powered cybersecurity platform called MDASH, short for Multi-Model Agentic Scanning Harness, to enhance vulnerability identification and remediati...