Russian hackers deploy Prismex malware framework in attacks on Ukraine and NATO allies
Prismex is a set of connected malware components designed to stay hidden and avoid detection.
In brief: a Langflow AI framework flaw exploited in the wild, the LiteLLM package compromised in a TeamPCP-linked supply-chain attack, and more
Prismex is a set of connected malware components designed to stay hidden and avoid detection.
By using WebRTC, the attackers bypass common defenses such as Content Security Policy (CSP) and HTTP-based monitoring tools.
According to reports, threat actors managed to exfiltrate data from nearly 500,000 infected devices.
The attackers reportedly bypassed two-factor authentication and, in several cases, set up automatic email forwarding.
Attackers use the ClickFix tacticts to trick candidates into running a command on their own computer.
Although there is no evidence of active exploitation, users are strongly advised to patch their instances as soon as possible.