Threat Intelligence

AI Assistants Are the New Gold Mine for Cybercriminals

AI Assistants Are the New Gold Mine for Cybercriminals

You know how we’ve all been watching AI adoption explode across organizations? Well, the bad actors have been watching too, and they’re adapting faster than we might have expected. This week brought some sobering reminders that our shiny new AI tools are creating fresh attack surfaces we’re still learning to defend.

OpenClaw Becomes a Target

The biggest eye-opener has to be the discovery that infostealers are now specifically hunting for OpenClaw secrets. If you haven’t worked with OpenClaw yet, it’s become the go-to agentic AI assistant framework for a lot of organizations. The problem? Like most AI tools, it relies heavily on API keys and authentication tokens to function.

When Good Intentions Meet Bad Laws: Why Security Research Needs Better Legal Protection

When Good Intentions Meet Bad Laws: Why Security Research Needs Better Legal Protection

Last week’s arrest of a Dutch man who discovered police data exposed online perfectly captures one of our field’s most frustrating contradictions. While we’re telling organizations to embrace responsible disclosure and work with security researchers, the legal system keeps treating discovery as a crime.

The Dutch Data Dilemma

Here’s what happened: Dutch police accidentally made confidential documents publicly accessible online. A 40-year-old man found them, downloaded the files, and then made a critical mistake—he asked for “something in return” before agreeing to delete them. The authorities arrested him.

Password Managers Under Fire While AI Agents Become New Infostealer Targets

Password Managers Under Fire While AI Agents Become New Infostealer Targets

I’ve been digging through this week’s security news, and there are some concerning developments that hit close to home for those of us managing enterprise security. The most troubling story involves fundamental flaws in password managers - the very tools we’ve been recommending to users for years.

Password Manager Encryption Claims Fall Apart

Security researchers have been poking holes in the end-to-end encryption claims of several popular commercial password managers, according to Infosecurity Magazine. While the article doesn’t name specific vendors yet, the implications are serious enough that we need to pay attention.

AI Gets Weaponized While Zero-Days Keep Landing: What This Week's Attacks Tell Us

AI Gets Weaponized While Zero-Days Keep Landing: What This Week’s Attacks Tell Us

Coffee’s getting cold again as I dig through this week’s security news, and honestly, the patterns emerging are worth talking about. We’re seeing AI move from theoretical threat to active weapon, while the same old vulnerabilities continue to bite organizations where it hurts most.

When AI Becomes the Attack Vector

Google’s Threat Intelligence Group dropped some sobering news about their own Gemini AI being abused by hackers across all attack stages. This isn’t just script kiddies playing around – we’re talking about systematic AI model extraction attacks where threat actors use legitimate API access to probe and essentially clone the reasoning capabilities of these models.

Chrome Extension Malware Hits 300K Users While Microsoft Preps Major Security Boot Update

Chrome Extension Malware Hits 300K Users While Microsoft Preps Major Security Boot Update

I’ve been tracking some interesting developments this week that really highlight how attackers are getting creative with their delivery methods. The biggest story that caught my attention involves a massive Chrome extension campaign that managed to fool over 300,000 users – and it’s a perfect example of how threat actors are riding the AI hype wave.

AI-Themed Extensions Hide Credential Theft Operation

Here’s what happened: security researchers discovered 30 malicious Chrome extensions masquerading as AI assistants that were actively stealing credentials, email content, and browsing data from users. What makes this particularly concerning is the scale – we’re talking about more than 300,000 installations across these fake extensions.

AI Apps Become the New Malware Highway: What Mac Users Need to Know

AI Apps Become the New Malware Highway: What Mac Users Need to Know

I’ve been watching something troubling unfold over the past few weeks, and it’s time we talk about how cybercriminals are weaponizing our enthusiasm for AI tools. The latest campaigns targeting both Windows and Mac users show a sophisticated shift in attack vectors that caught my attention – and should be on your radar too.

The AI App Trojan Horse

Here’s what’s happening: The AMOS infostealer is now targeting macOS users through popular AI applications, essentially turning our excitement about AI productivity tools into a security vulnerability. This isn’t just another malware campaign – it’s a calculated exploitation of user behavior and trust.

ClickFix Attacks Hit Crypto Users While Zero-Days Target Government Infrastructure

ClickFix Attacks Hit Crypto Users While Zero-Days Target Government Infrastructure

I’ve been tracking some concerning attack patterns this week that show how creative threat actors are getting with their delivery methods. The most interesting case involves attackers using Pastebin comments to distribute what researchers are calling “ClickFix” attacks specifically targeting cryptocurrency users.

The Pastebin Problem Gets Worse

Here’s how the ClickFix attack works: threat actors are posting malicious JavaScript in Pastebin comments, disguised as helpful fixes for common crypto wallet issues. When users copy and paste this code into their browser console (thinking they’re fixing a legitimate problem), they’re actually executing malware that hijacks Bitcoin swap transactions and redirects funds to attacker-controlled wallets.

DNS Becomes the New Backdoor: ClickFix Attacks Get Creative While Google Groups Harbor Malware

DNS Becomes the New Backdoor: ClickFix Attacks Get Creative While Google Groups Harbor Malware

We’ve seen social engineering attacks get increasingly sophisticated over the years, but the latest evolution of ClickFix campaigns caught my attention this week. Microsoft disclosed that threat actors are now using DNS queries as a delivery mechanism for malware – and honestly, it’s both clever and concerning.

When nslookup Becomes a Weapon

The traditional ClickFix attack has been around for a while. You know the drill: users get tricked into copying and pasting commands that supposedly fix a fake technical issue. What’s new here is how attackers are using the humble nslookup command to pull down PowerShell payloads directly through DNS queries.

February's Patch Frenzy: Why Microsoft and Apple's Zero-Day Fixes Should Keep You Busy This Week

February’s Patch Frenzy: Why Microsoft and Apple’s Zero-Day Fixes Should Keep You Busy This Week

If you thought February was going to be a quiet month for patches, think again. Between Microsoft fixing six zero-days and Apple rushing out updates for an actively exploited memory corruption bug, it’s been one of those weeks where your patch management queue just keeps growing.

Let me walk you through what’s been happening and why some of these fixes deserve immediate attention.

When Hackers Go Old School: Physical Mail Attacks Hit Crypto Users

When Hackers Go Old School: Physical Mail Attacks Hit Crypto Users

You know we’re living in strange times when threat actors are ditching sophisticated digital attacks for good old-fashioned snail mail. But that’s exactly what’s happening right now, and honestly, it’s pretty clever from an adversarial perspective.

The Return of Physical Social Engineering

Cybercriminals have started sending physical letters to cryptocurrency hardware wallet users, specifically targeting people who own Trezor and Ledger devices. These aren’t your typical phishing emails that we’re all trained to spot – they’re actual paper letters showing up in mailboxes, designed to look like official communications from these wallet manufacturers.