XStore Documentation

June 04, 2025 – Cyber Briefing

👉 What’s trending in cybersecurity today?

Crocodilus targets crypto users via fake apps, bogus CAPTCHAs drop NetSupport RAT, and rogue RubyGems steal Telegram bot tokens. BitoPro loses $11.5M in a DeFi hack, MainStreet Bank suffers a vendor breach, and Malaysia’s Home Minister’s WhatsApp is hijacked. A Romanian swatter pleads guilty, Vodafone is fined $51M for GDPR violations, and Chrome drops trust in Chunghwa Telecom and Netlock CA certificates.

Listen to the full podcast


🚨 Cyber Alerts

1. Crocodilus Trojan Steals Crypto Globally

A recently discovered Android banking trojan named Crocodilus is rapidly expanding its global reach, now targeting users in Europe and South America with improved obfuscation techniques and new features. Initially documented in March 2025, the malware employs overlay attacks to steal financial credentials and abuses accessibility services to capture cryptocurrency wallet seed phrases. Recent campaigns use fake Facebook ads and disguise the malware as legitimate apps, while new variants can add fake contacts to victims’ devices to bypass security alerts and automate seed phrase collection.

2. Bogus CAPTCHA Lures Install NetSupport RAT

Cybercriminals are exploiting fake “Prove You Are Human” CAPTCHA pages on spoofed websites mimicking platforms like Gitcodes and DocuSign to distribute the NetSupport Remote Access Trojan. This sophisticated campaign tricks users into copying and executing malicious PowerShell scripts via the Windows Run prompt, which initiates a multi-stage attack to install the RAT and achieve persistence. Tactics include clipboard poisoning on fake DocuSign pages and a multi-layered approach with repeated script executions to evade detection while communicating with command-and-control servers. While attribution is unclear, patterns suggest links to known threat groups, highlighting the need for user vigilance as legitimate sites rarely demand script execution from users.

3. Fake RubyGems Steal Telegram Bot Tokens

Cybersecurity researchers have discovered two malicious RubyGems packages, typosquatting legitimate Fastlane CI/CD plugins, designed to redirect Telegram API requests and steal sensitive data. These packages, still live on RubyGems under names like fastlane-plugin-telegram-proxy, appear nearly identical to the genuine plugin but reroute traffic through an attacker-controlled proxy to intercept bot tokens, chat IDs, messages, and files. This supply chain attack leverages trust in popular developer tools, as Fastlane is widely used for mobile app automation, and its Telegram integration provides real-time CI/CD updates. Developers who installed these malicious gems are urged to remove them immediately, rebuild any affected mobile binaries, rotate all compromised Telegram bot tokens, and consider blocking traffic to the attacker’s proxy domain.

For more alerts, click here!

💥 Cyber Incidents

For more incidents, click here!

Click to See Tools

📢 Cyber News

For more news, click here

📈Cyber Stocks

💡 Cyber Tip

📚 Cyber Book

The Small Business Social Media Cyber Security Guide by Jay Parisi

Click to Check Events

Copyright © 2025 CyberMaterial. All Rights Reserved.

Follow CyberMaterial on:

SubstackLinkedInTwitterRedditInstagramFacebookYouTube, and Medium.

Get Help

Online Scam Prevention & Recovery

Schedule a free consultation

A free 15-min cybersecurity consultation