Malicious packages flood OpenClaw registry in malware campaign
Masquerading as legitimate cryptocurrency trading automation tools, the packages, known as “skills,” deliver data-stealing malware.
Masquerading as legitimate cryptocurrency trading automation tools, the packages, known as “skills,” deliver data-stealing malware.
According to CERT-UA, the flaw was weaponized within a day of Microsoft’s disclosure.
The malicious updates embedded the GlassWorm malware loader and were pushed to users through normal update mechanisms.
The attack involved an infrastructure-level breach at Notepad++’s hosting provider, not vulnerabilities in the application’s source code.
Mandiant is tracking the activity across multiple threat clusters, including UNC6661, UNC6671, and UNC6240.
Flare says it found more than 208,500 publicly exposed MongoDB servers, including 3,100 that required no authentication.
In brief: Ivanti, Microsoft and Fortinet fix zero-days, eScan hit with a supply chain attack, and more.
In a separate development, US authorities have seized the dark web and clearnet domains of the RAMP cybercrime forum.
Dragos assessed that Electrum works closely with another threat cluster Kamacite that focuses on initial access.
The flaw (CVE-2026-24858) was actively exploited in the wild by two malicious FortiCloud accounts.
Showing elements 1 - 10