Hackers are hiding powerful info-stealing malware in fake free VPNs downloaded from GitHub, don’t get tricked | TechRadar

Once executed, the dropper uses a multi-stage attack chain involving obfuscation, dynamic DLL loading, memory injection, and abuse of legitimate Windows tools like MSBuild.exe and aspnet_regiis.exe to maintain stealth and persistence.

Researchers unearth two previously unknown Linux backdoors – Help Net Security

These tools are designed to maintain persistent access and execute commands stealthily, enabling prolonged intelligence gathering while evading detection.

Crooks plant backdoor in software used by courtrooms around the world | Ars Technica

A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack

Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach | Ars Technica

https://arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/2/