Blog

Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

Actualités
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. "UNC5142 is characterized by its use of compromised WordPress websites and 'EtherHiding,' a technique used
Read More

North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts

Actualités
A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342,
Read More

Incident de sécurité F5 (16 octobre 2025) (CERT-FR)

Sécurité
Le 15 octobre 2025, F5 a publié un communiqué [1] dans lequel l'éditeur déclare avoir été affecté par un incident de sécurité qu'il attribue à un mode opératoire sophistiqué. L'éditeur a pris connaissance de l'intrusion début août 2025. L'attaquant a réussi à exfiltrer une partie du code source...
Read More

Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in « Zero Disco’ Attacks

Actualités
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS Software and IOS XE Software to deploy Linux rootkits on older, unprotected systems. The activity, codenamed Operation Zero Disco by Trend Micro, involves the weaponization of CVE-2025-20352 (CVSS score: 7.7), a stack overflow vulnerability in the Simple
Read More