Home » malware » Page 6
Signed MSI delivers EndClient RAT while AutoIt loader runs in memory

EndClient RAT Targets NGOs via Signed MSI Installer

EndClient RAT arrives as a signed MSI named “StressClear.msi,” which abuses code-signing trust and SmartScreen gaps. The package decoys with a VeraPort component while an obfuscated AutoIt loader executes in memory, establishes the IoKlTr task, and opens a JSON-over-TCP C2. To reduce risk, restrict MSI installs, enforce SmartScreen blocking, instrument MSI→AutoIt lineage, and remove scheduled tasks used for persistence.

Read More
malicious VS Code extensions Pokémon/Minecraft lures infect vibe coders

Pokémon & Minecraft-Branded Extensions Drop Malware on Devs

Game-themed extensions on a popular code editor pretended to add Pokémon or Minecraft flair for “vibe coders.” Instead, they executed malware on install, mined Monero, and attempted persistence. Consequently, teams should validate developer workstations, remove suspicious add-ons, rotate secrets, and harden marketplace policies before the next wave appears.

Read More