A financial institution in South Asia was recently targeted in a coordinated cyberattack involving two custom malware strains, BRUSHWORM and BRUSHLOGGER. These tools were deployed as separate binaries, suggesting a deliberate and structured intrusion. BRUSHWORM operated as a backdoor disguised as a legitimate file, enabling persistent system access, communication with a remote command-and-control server, and theft of sensitive data. At the same time, BRUSHLOGGER acted as a covert keylogger by impersonating a trusted system library through DLL side-loading, allowing it to capture keystrokes and track user activity without detection. Security researchers identified the threat during an investigation, although limited logging visibility made full forensic analysis difficult. Evidence indicates the attacker had developed multiple earlier versions, showing ongoing refinement despite relatively weak coding practices. The attack emphasized persistence and data exfiltration through multiple channels. BRUSHWORM established long-term access by creating hidden directories and configuring scheduled tasks that executed automatically at user login. It also downloaded additional payloads from a remote server and executed them using legitimate system utilities. When internet connectivity was unavailable, the malware adapted by copying stolen data onto connected USB drives, enabling exfiltration from restricted environments. It further spread by placing disguised copies of itself on removable media using deceptive filenames aimed at tricking users. Meanwhile, BRUSHLOGGER silently recorded keystrokes and active window data, allowing attackers to gather credentials, financial inputs, and internal communications over time without raising suspicion. Despite its targeted deployment, the malware showed several technical weaknesses, including poor handling of sensitive data and minimal use of advanced evasion techniques. This suggests the threat actor may have limited expertise or relied on automated code generation tools without thorough validation. However, the combined capabilities still pose a serious risk. Organizations should strengthen endpoint monitoring, restrict execution of unknown binaries, and watch for suspicious scheduled tasks or abnormal DLL behavior to reduce exposure.
A surge in cyberattacks targeting financial institutions has been linked to the rapid rise of PXA Stealer, a sophisticated information-stealing malware. Its emergence follows the t...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical supply chain vulnerability (CVE-2026-33634) in Aqua Security’s Trivy scanner, adding it to...
The official Telnyx Python SDK on PyPI was compromised as part of a broader supply chain campaign conducted by the threat group TeamPCP. Malicious versions 4.87.1 and 4.87.2 were u...