Google Product Security Update Advisory

Google Product Security Update Advisory

Overview   We have released security updates to fix vulnerabilities in Google products. Users of affected products are advised to update to the latest version.    Affected Products   CVE-2025-6558, CVE-2025-7656, CVE-2025-7657   Chrome (Linux) Version: 138.0.7204.157 and earlierChrome (Windows, Mac) version: below 138.0.7204.157/.158     Resolved Vulnerabilities   Improper

July 21, 2025

July 21, 2025 Hash 1ff83fd5658b6f9d9a14e5bbb9b5bd267 2f90e2c905462cb958f06af9bfbf1ad26 379fe9dce2b13db1d5b8e62f1c1083a2c URL 1http[:]//www[.]aegtecnoservice[.]it/ 2http[:]//176[.]46[.]157[.]60/d8tr4u9k/index[.]php 3https[:]//fasrdj863[.]weebly[.]com/ IP 1115[.]190[.]93[.]31 243[.]225[.]158[.]4 3154[.]210[.]129[.]174...

Mobile Security & Malware Issue 3st Week of July, 2025

Mobile Security & Malware Issue 3st Week of July, 2025

ASEC Blog publishes “Mobile Security & Malware Issue 3st Week of July, 2025”

New Variant of ACRStealer Actively Distributed with Modifications

New Variant of ACRStealer Actively Distributed with Modifications

ACRStealer is an Infostealer that has been distributed since last year. It began to be actively distributed from early this year. AhnLab SEcurity intelligence Center (ASEC) has previously covered ACRStealer, which utilizes Google Docs and Steam as a C2 via a Dead Drop Resolver (DDR) technique.   [AhnLab SEcurity intelligence

RokRAT Malware Using Malicious Hangul (.HWP) Documents

RokRAT Malware Using Malicious Hangul (.HWP) Documents

AhnLab SEcurity intelligence Center (ASEC) recently discovered the distribution of RokRAT malware using a Hangul Word Processor document (.hwp). RokRAT is typically distributed by including a decoy file and malicious script inside a shortcut (LNK) file. However, ASEC found a case where the malware was distributed through HWP documents instead