CrashFix: Chrome extension that forces browser crashes to deliver ModeloRAT targets corporate networks
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Moonlock Lab: ClickFix Campaigns Leverage Fake VCs and Extension Hijack
Researchers link a coordinated ClickFix-style campaign that combines professional-identity impersonation with hijacked browser extensions to trick victims into pasting and executing clipboard payloads; the delivery chain has been observed installing a Python RAT on selected enterprise hosts and affected an estimated 7,000 extension users. The episode highlights converging supply‑chain and social‑engineering playbooks — from fake VC recruiting pages to crash‑then‑paste extension tricks — and calls for stronger extension vetting, developer-account controls and clipboard/shell telemetry.
Study finds popular Chrome add‑ons secretly harvesting clipboards, rerouting searches and mimicking trusted tools
Security researchers found several widely installed Chrome extensions performing undisclosed data collection, search redirection and brand impersonation. The findings include concrete abuse patterns — from covert clipboard siphoning to social‑engineering campaigns that push remote access trojans — underscoring gaps in vetting and the need for quicker detection and takedown.
Operation Bizarre Bazaar: Criminal Network Hijacks Exposed LLM Endpoints for Profit and Access
A coordinated criminal campaign scans for unauthenticated LLM and model-control endpoints, then validates and monetizes access—running costly inference workloads, selling API access, and probing internal networks. Some exposed targets are agentic connectors and admin interfaces that can leak tokens, credentials, or execute commands, dramatically raising the stakes beyond billable inference.
MuddyWater Breaches US Networks; Broadcom Flags Dindoor and Fakeset
The Iran-linked threat actor MuddyWater gained footholds across multiple North American and Israeli-facing networks, deploying two novel backdoors tracked as Dindoor and Fakeset . Parallel telemetry from other vendors (notably Check Point) documents a late-Feb/early-Mar 2026 wave of camera- and edge-focused intrusions that reuse commodity VPNs and automated credential-validation pipelines — reinforcing the need for identity-first hunts, management-plane isolation and rapid patching/credential rotation.
Coruna Toolkit: iPhone Zero-days Move into Criminal Markets
The Coruna exploit toolkit — a polished WebKit chain targeting iOS 13–17.2.1 — has appeared beyond government channels in a criminalized, modular form and likely reached tens of thousands of devices. Evidence suggests operators bought or re-hosted turnkey control panels and distribution builders (messaging/phishing), increasing resilience to takedown and raising urgency for emergency patches, telemetry hunts, and procurement controls for offensive tooling.
Compromised eScan Update Server Delivered Multi-Stage Malware to Users
Security researchers found that attackers pushed a malicious update through an official eScan update server on January 20, 2026, installing a multi-stage infection on both consumer and enterprise endpoints. eScan isolated affected servers, took them offline for over eight hours, and issued a manual cleanup utility while disputing aspects of the public disclosure.
ZeroDayRAT: Commercial spyware kit offers comprehensive remote control of Android and iOS devices
A commercially marketed spyware package circulating on Telegram equips buyers to fully surveil and control infected Android and iOS phones, combining continuous credential and clipboard theft with persistent device monitoring. Researchers warn operators also adopt resilient distribution tactics—including droppers, mirrored hosting and abuse of public repositories—that speed payload rotation and complicate takedown.
VS Code extensions left 128 million installs vulnerable to exploitation
A security review uncovered critical and high-severity flaws in four popular Visual Studio Code extensions, collectively reaching about 128 million installs and enabling file theft, remote code runs, and network reconnaissance. Three formal CVEs were published and researchers say multiple maintainers ignored notifications for months, forcing public disclosure and urgent mitigation guidance.