TrendAIโข Research has identified two emerging threat campaignsโSHADOW-AETHER-040 and SHADOW-AETHER-064โthat use agentic AI to drive intrusion operations against government and financial organizations in Latin America, marking these among the first cases we have observed of AI agents executing attacks from initial access to data exfiltration.
A China-aligned threat group is exploiting unpatched Microsoft Exchange vulnerabilities to conduct cyberespionage against government and critical infrastructure targets across Asia and beyond.
Targeting multiple industries worldwide, the InstallFix campaign uses fake Claude AI installer pages to trick users into running malware that collects system information, disables security features, achieves persistence, and connects to attacker-controlled C&C servers for additional payloads.
TrendAIโข Research breaks down Quasar Linux (QLNX), a previously undocumented sophisticated Linux RAT with low detection rates. In this blog, we examine a full-featured Linux threat incorporating a rootkit, a PAM backdoor, credential harvesting, and more, revealing how this malware enables stealthy access, persistence, and potential supply-chain attacks.
An OAuth supply chain compromise at Vercel exposed how trusted third party apps and platform environment variables can bypass traditional defenses and amplify blast radius. This article examines the attack chain, underlying design tradeoffs, and what it reveals about modern PaaS and software supply chain risk.
Bad actors took advantage of the legitimate name and services of Kuse, a popular AI-based app designed for workplaces. The attackers exploited the usersโ trust in Kuse to carry out a phishing attack.
Our research on Void Dokkaebiโs operations uncovered a campaign that turns infected developer repositories into malware delivery channels. By spreading through trusted workflows, organizational codebases, and open-source projects, the threat can scale from a single compromise to a broader supply chain risk.
A packaging error in Anthropicโs Claude Code npm release briefly exposed internal source code. This entry examines how threat actors rapidly weaponized the resulting attention, pivoting an existing AI-themed campaign to spread Vidar and GhostSocks.
Threat actors leveraged Anthropicโs Claude Code npm release packaging error to distribute Vidar, GhostSocks,โฏand PureLogโฏStealer. This blog details immediate steps organizations can take and best practices to prevent further risk.
A packaging error in Anthropicโs Claude Code npm release briefly exposed internal source code. This entry examines how threat actors rapidly weaponized the resulting attention, pivoting an existing AI-themed campaign to spread Vidar and GhostSocks.
TeamPCP orchestrated one of the most sophisticated multi-ecosystem supply chain campaigns publicly documented to date. It cascaded through developer tooling and compromised LiteLLM and exposed how AI proxy services that concentrate API keys and cloud credentials become high-value collateral when supply chain attacks compromise upstream dependencies.
Moving beyond their LiteLLM campaign, TeamPCP weaponizes the Telnyx Python SDK with stealthy WAVโbased payloads to steal credentials across Linux, macOS, and Windows.
This blog discusses the steganography, cloud abuse, and email-based backdoorsโฏused against theโฏUkrainianโฏdefense supply chainโฏin the latest Pawn Storm campaign that TrendAIโข Research observed and analyzed.
Tycoon 2FA was dismantled this week by law enforcement and industry partners including TrendAIโข. The phishing-as-a-service platform offered MFA bypass services using adversary-in-the-middle (AitM) proxying.
Not every cloud breach starts with malware or a zero-day. In this incident, attackers discovered an exposed Spring Boot Actuator endpoint, harvested credentials from leaked configuration data, then used the OAuth2 Resource Owner Password Credentials (ROPC) flow to authenticate without MFA.
Warlock continues to enhance its attack chain with new tactics to improve persistence, lateral movement, and defense evasion using an expanded toolset: TightVNC Yuze, and a persistent BYOVD technique leveraging the NSec driver.
Our analysis of an active KongTuke campaign deploying modeloRAT โ malware capable of reconnaissance, command execution, and persistent access โ through compromised WordPress sites and fake CAPTCHA lures shows that the group still operates this delivery chain in parallel with the newer CrashFix technique.
The BoryptGrab campaign uses fake SEOโoptimized GitHub repositories and deceptive download pages to distribute a dataโstealing malware family that delivers multiple payloads, including a reverse SSH backdoor, to Windows users.
OpenClaw (aka Clawdbot or Moltbot) represents a new frontier in agentic AI: powerful, highly autonomous, and surprisingly easy to use. In this research, we examine how its capabilities compare to its predecessorsโ and highlight the security risks inherent to the agentic AI paradigm.