DEV Community

Cover image for Security news weekly round-up - 7th March 2025
Habdul Hazeez
Habdul Hazeez

Posted on

Security news weekly round-up - 7th March 2025

I don't think a week goes by and we don't talk about phishing and malware. I apologize. It was not my intention to give away what we were about to review. Nevertheless, here we are. Those two are prevailing threats that internet users face every day, with the first sometimes serving as a precursor to the second.

Let's begin.


YouTube warns of AI-generated video of its CEO used in phishing attacks

If you're thinking about the bad side of AI-generated videos, I will not fault you. This is just one example, more is likely to follow. Reading the article shows that the phishing attack is quite convincing (I know which phishing attack is not?) and with some sense of urgency. If the potential victim falls for it, they will unknowingly send their login credentials to the attackers while everything appears as normal.

The article has more details.

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

It's been a while since I read an article about typosquatting. Well, that's what's going on here. The actors behind these published Go modules that are typosquatted versions of the original ones. And, they are designed to deploy loder malware on Linux and macOS.

From the article:

The counterfeit packages, Socket's analysis found, contain code to achieve remote code execution. This is achieved by running an obfuscated shell command to retrieve and run a script hosted on a remote server ("alturastreet[.]icu"). In a likely effort to evade detection, the remote script is not fetched until an hour has elapsed.

Malicious Chrome extensions can spoof password managers in new attack

In a recent revelation, cybersecurity experts have uncovered a sophisticated attack targeting Google Chrome users. Malicious extensions, disguised as legitimate tools, exploit Chrome's chrome.management API to detect installed extensions, including password managers. Once identified, these rogue extensions mimic the appearance and functionality of trusted ones, deceiving users into divulging sensitive information.

The article has more details.

Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

Given the popularity of WordPress, this article is a must-read. You never know, you might be managing a WordPress site in the future, and articles like this can prepare your mind on how to secure the site or respond effectively when you're targeted.

From the article:

Creating four backdoors facilitates the attackers having multiple points of re-entry should one be detected and removed. The malicious JavaScript code has been found to be served via cdn.csyndication[.]com

Credits

Cover photo by Debby Hudson on Unsplash.


That's it for this week, and I'll see you next time.

Top comments (0)