WhisperX tag archive

#Infostealer

This page collects WhisperX intelligence signals tagged #Infostealer. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (7)

The Lab · 2026-05-09 16:01:44 · BleepingComputer Echo RSS

1. Fake OpenAI Repository on Hugging Face Trending List Delivers Infostealer Malware

A malicious repository impersonating OpenAI's "Privacy Filter" project infiltrated Hugging Face's trending list, distributing information-stealing malware to Windows users who downloaded what appeared to be a legitimate AI tool. The campaign exploited the trust associated with OpenAI's brand and the visibility of trend...

The Lab · 2026-05-11 21:18:30 · Mastodon:mastodon.social:#infosec

2. AutoIt Loader Linked to Vidar Stealer C2 Infrastructure in Multi-Stage Evasion Attack

Security researchers have uncovered a sophisticated multi-stage infection chain leveraging AutoIt-compiled loaders to establish command-and-control communication with infrastructure tied to Vidar Stealer, a known credential-harvesting malware. The attack chain, identified through proactive threat hunting, began with th...

The Lab · 2026-05-12 00:48:21 · BleepingComputer Echo RSS

3. Checkmarx Jenkins Plugin Spoofed on Marketplace, Infostealer Variant Distributed to Developers

Checkmarx has confirmed that a malicious version of its Jenkins Application Security Testing (AST) plugin was published on the official Jenkins Marketplace, exposing software developers who downloaded the rogue package to infostealer malware. The company issued a warning over the weekend after identifying the fraudulen...

The Lab · 2026-05-12 05:18:21 · Mastodon:mastodon.social:#cybersecurity

4. Checkmarx Jenkins Plugin Infostealer Breach: TeamPCP Maintained Access for Over a Month

Checkmarx, a widely used code-security platform, confirmed that its official Jenkins plugin was compromised with an infostealer, in an attack the company attributed to the threat actor TeamPCP. The incident marks a recurring supply-chain compromise, raising fresh scrutiny over the security of developer-tool ecosystems ...

The Lab · 2026-05-12 17:18:29 · Mastodon:mastodon.social:#cybersecurity

5. IPL Cricket Season Becomes Hunting Ground: Cloned Ticketing Sites and macOS Infostealers Target Fans

As the Indian Premier League draws millions of viewers online, cybercriminals have launched a coordinated surge in IPL-themed fraud, exploiting fan excitement through two distinct threat vectors: counterfeit ticketing platforms and malware-laden free streaming sites. CloudSEK researchers have documented how threat acto...

The Lab · 2026-05-13 12:48:26 · Mastodon:hachyderm.io:#infosec

6. TeamPCP Releases Shai-Hulud Infostealer Source Code on GitHub, Lowering Barrier for Developer-Tool Attacks

TeamPCP has publicly released the source code for the Shai-Hulud infostealer on GitHub, creating immediate concerns within the security community about a potential surge in supply chain attacks targeting developer workstations and npm packages. The malware is specifically engineered to target development environments, ...

The Lab · 2026-05-14 13:18:30 · Mastodon:mastodon.social:#cybersecurity

7. Agent Tesla Sustains 18-Month Credential Theft Campaign Against LATAM Enterprises via Procurement-Themed Phishing

A sophisticated malware campaign leveraging the Agent Tesla infostealer has been targeting enterprises across Latin America for over 18 months, with particular focus on financial and procurement teams, according to threat analysis published on the any.run platform. The campaign employs procurement-themed phishing lures...