<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Bitdefender Labs</title><description>Daily source of cyber-threat information. Established 2001.</description><link>https://www.bitdefender.com/en-us/blog/labs/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Bitdefender Labs</title><link>https://www.bitdefender.com/en-us/blog/labs/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Fri, 03 Apr 2026 21:19:48 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-us/rss/labs/hash-import-2024-09-02-13-55" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States</title><description><![CDATA[The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity - is by far the largest structure humanity ever built. It’s so big, in fact, that few people even notice it, like a fish can’t see the ocean.

Until the grid goes down, that is. Then, like the fish dangling from the angler’s hook, we see our vulnerability. Modernity dissolves into a sudden silence, followed by the repeated flick of a light switch, and a howl of panic at the prospect of missed appointmen]]></description><link>https://www.bitdefender.com/en-us/blog/labs/60-hurts-per-second-how-we-got-access-to-enough-solar-power-to-run-the-united-states</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722d2</guid><category><![CDATA[IoT Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Ioan Alexandru MELNICIUC</dc:creator><pubDate>Wed, 07 Aug 2024 13:16:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/08/1ZZ96uESRJQ.jpg" medium="image"/><content:encoded><![CDATA[The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity - is by far the largest structure humanity ever built. It’s so big, in fact, that few people even notice it, like a fish can’t see the ocean.

Until the grid goes down, that is. Then, like the fish dangling from the angler’s hook, we see our vulnerability. Modernity dissolves into a sudden silence, followed by the repeated flick of a light switch, and a howl of panic at the prospect of missed appointmen]]></content:encoded></item><item><title>Deep Dive on Supplement Scams: How AI Drives ‘Miracle Cures’ and Sponsored Health-Related Scams on Social Media</title><description><![CDATA[Sponsored social media content has become increasingly present on feeds. Sponsored ads can often be beneficial as they are customized to suit online personas, offering relevant content tailored specifically for you. While personalized ads can help enhance your online experience, not all are legitimate. In fact, scams originating from phony ads on social media have increased dramatically, with potentially severe consequences for consumers.


Sponsored supplement scams on social media platforms


]]></description><link>https://www.bitdefender.com/en-us/blog/labs/deep-dive-on-supplement-scams-how-ai-drives-miracle-cures-and-sponsored-health-related-scams-on-social-media</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722d1</guid><category><![CDATA[Scam Research]]></category><dc:creator>Ionut Alexandru BALTARIU</dc:creator><pubDate>Wed, 10 Jul 2024 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/07/pexels-pixabay-161688.jpg" medium="image"/><content:encoded><![CDATA[Sponsored social media content has become increasingly present on feeds. Sponsored ads can often be beneficial as they are customized to suit online personas, offering relevant content tailored specifically for you. While personalized ads can help enhance your online experience, not all are legitimate. In fact, scams originating from phony ads on social media have increased dramatically, with potentially severe consequences for consumers.


Sponsored supplement scams on social media platforms


]]></content:encoded></item><item><title>Unfading Sea Haze: New Espionage Campaign in the South China Sea</title><description><![CDATA[Bitdefender researchers investigated a series of incidents at high-level organizations in countries of the South China Sea region, all performed by the same  threat actor we track as Unfading Sea Haze. Based on the victimology and the cyber-attack’s aim, we believe the threat actor is aligned with China’s interests.
As tensions in the region rise, they are reflected in the intensification of activity on behalf of the Unfading Sea Haze actor, which uses new and improved tools and TTPs.

We notice]]></description><link>https://www.bitdefender.com/en-us/blog/labs/unfading-sea-haze-new-espionage-campaign-in-the-south-china-sea</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722d0</guid><category><![CDATA[Anti-Malware Research]]></category><category><![CDATA[Whitepapers]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Wed, 22 May 2024 14:45:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/05/diver-1850255_1920.jpg" medium="image"/><content:encoded><![CDATA[Bitdefender researchers investigated a series of incidents at high-level organizations in countries of the South China Sea region, all performed by the same  threat actor we track as Unfading Sea Haze. Based on the victimology and the cyber-attack’s aim, we believe the threat actor is aligned with China’s interests.
As tensions in the region rise, they are reflected in the intensification of activity on behalf of the Unfading Sea Haze actor, which uses new and improved tools and TTPs.

We notice]]></content:encoded></item><item><title>Notes on ThroughTek Kalay Vulnerabilities and Their Impact on the IoT Ecosystem</title><description><![CDATA[Since 2014, Bitdefender IoT researchers have been looking into the world's most popular IoT devices, hunting for vulnerabilities and undocumented attack avenues. This report documents four vulnerabilities affecting devices powered by the ThroughTek Kalay Platform. Due to the platform’s massive presence in IoT integrations, these flaws have a significant downstream impact on several vendors.

In the interconnected landscape of the Internet of Things (IoT), the reliability and security of devices,]]></description><link>https://www.bitdefender.com/en-us/blog/labs/notes-on-throughtek-kalay-vulnerabilities-and-their-impact</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722cf</guid><category><![CDATA[IoT Research]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Wed, 15 May 2024 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/05/computer-8037837_1920.jpg" medium="image"/><content:encoded><![CDATA[Since 2014, Bitdefender IoT researchers have been looking into the world's most popular IoT devices, hunting for vulnerabilities and undocumented attack avenues. This report documents four vulnerabilities affecting devices powered by the ThroughTek Kalay Platform. Due to the platform’s massive presence in IoT integrations, these flaws have a significant downstream impact on several vendors.

In the interconnected landscape of the Internet of Things (IoT), the reliability and security of devices,]]></content:encoded></item><item><title>Vulnerabilities Identified in LG WebOS</title><description><![CDATA[As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT space. This report covers vulnerabilities discovered while researching the LG WebOS TV operating system.

We have found several issues affecting WebOS versions 4 through 7 running on LG TVs. These vulnerabilities let us gain root acces]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-lg-webos</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722ce</guid><category><![CDATA[IoT Research]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Tue, 09 Apr 2024 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/04/web-4869856_1920.jpg" medium="image"/><content:encoded><![CDATA[As the creator of the world’s first smart home cybersecurity hub, Bitdefender regularly audits popular IoT hardware for vulnerabilities. This research paper is part of a broader program that aims to shed light on the security of the world’s best-sellers in the IoT space. This report covers vulnerabilities discovered while researching the LG WebOS TV operating system.

We have found several issues affecting WebOS versions 4 through 7 running on LG TVs. These vulnerabilities let us gain root acces]]></content:encoded></item><item><title>AI meets next-gen info stealers in social media malvertising campaigns</title><description><![CDATA[The impact that AI has on society has steadily crept into the darkest nooks and crannies of the internet. So much so that cybercrooks are hitching free rides on the AI bandwagon by leveraging the increased demand of AI-powered software for content creators.

Cybercriminal groups constantly adapt their operating methods and tools to stay a step ahead of potential victims. Highly focused on enhancing their deceptive practices, threat actors have, unfortunately, found a most reliable and powerful a]]></description><link>https://www.bitdefender.com/en-us/blog/labs/ai-meets-next-gen-info-stealers-in-social-media-malvertising-campaigns</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722cd</guid><category><![CDATA[Anti-Malware Research]]></category><category><![CDATA[Scam Research]]></category><dc:creator>Nicolae POSTOLACHI</dc:creator><pubDate>Thu, 04 Apr 2024 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/04/malvertising-campaigns-Bitdefender-Labs.jpg" medium="image"/><content:encoded><![CDATA[The impact that AI has on society has steadily crept into the darkest nooks and crannies of the internet. So much so that cybercrooks are hitching free rides on the AI bandwagon by leveraging the increased demand of AI-powered software for content creators.

Cybercriminal groups constantly adapt their operating methods and tools to stay a step ahead of potential victims. Highly focused on enhancing their deceptive practices, threat actors have, unfortunately, found a most reliable and powerful a]]></content:encoded></item><item><title>Sponsored Ad Fraud: Mystery Box Scams Flood Social Media</title><description><![CDATA[Social media platforms are overflowing with scams.

In the past couple of months, Bitdefender Labs has been monitoring a steep increase in fraudulent social media ads on Facebook promoting various swindles ranging from crypto-doubling to AI-generated celebrity-endorsed giveaways.

Our latest analysis has spotted a consistent trend, with fraudsters continuing to exploit Meta’s ad system to deceive consumers.

The hustle? A long-established ruse that involves peddling so-called mystery boxes from ]]></description><link>https://www.bitdefender.com/en-us/blog/labs/sponsored-ad-fraud-mystery-box-scams-flood-social-media</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722cc</guid><category><![CDATA[Scam Research]]></category><dc:creator>Andrei ANTON-AANEI</dc:creator><pubDate>Thu, 29 Feb 2024 14:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/02/Sponsored-Ad-Fraud-Mystery-Box-Scams-Flood-Social-Media.png" medium="image"/><content:encoded><![CDATA[Social media platforms are overflowing with scams.

In the past couple of months, Bitdefender Labs has been monitoring a steep increase in fraudulent social media ads on Facebook promoting various swindles ranging from crypto-doubling to AI-generated celebrity-endorsed giveaways.

Our latest analysis has spotted a consistent trend, with fraudsters continuing to exploit Meta’s ad system to deceive consumers.

The hustle? A long-established ruse that involves peddling so-called mystery boxes from ]]></content:encoded></item><item><title>When Stealers Converge: New Variant of Atomic Stealer in the Wild</title><description><![CDATA[Here at Bitdefender, we're constantly working on improving detection capabilities for our macOS cyber-security products; part of this effort involves revisiting old (or digging up new) samples from our malware zoo. During routine verifications, we were able to isolate multiple suspicious and undetected macOS disk image files surprisingly small for files of this kind (1.3 MB per file).

A short look into the code revealed that these files are significantly similar to other samples analysed in the]]></description><link>https://www.bitdefender.com/en-us/blog/labs/when-stealers-converge-new-variant-of-atomic-stealer-in-the-wild</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722cb</guid><category><![CDATA[Anti-Malware Research]]></category><dc:creator>Andrei LAPUSNEANU</dc:creator><pubDate>Tue, 27 Feb 2024 14:01:58 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/02/security-5043368_1920.jpg" medium="image"/><content:encoded><![CDATA[Here at Bitdefender, we're constantly working on improving detection capabilities for our macOS cyber-security products; part of this effort involves revisiting old (or digging up new) samples from our malware zoo. During routine verifications, we were able to isolate multiple suspicious and undetected macOS disk image files surprisingly small for files of this kind (1.3 MB per file).

A short look into the code revealed that these files are significantly similar to other samples analysed in the]]></content:encoded></item><item><title>Details on Apple’s Shortcuts Vulnerability: A Deep Dive into CVE-2024-23204</title><description><![CDATA[CVE-2024-23204 sheds light on the critical importance of continuous security vigilance. Apple's Shortcuts application, designed to enhance user automation, can inadvertently become a potential vector for privacy breaches. This analysis aims to provide users, developers, and security professionals with insights into the nature of the vulnerability, its potential impact, and recommended mitigation measures.


At a glance:

 * We have discovered a vulnerability in Apple Shortcuts that lets a potent]]></description><link>https://www.bitdefender.com/en-us/blog/labs/details-on-apples-shortcuts-vulnerability-a-deep-dive-into-cve-2024-23204</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722ca</guid><category><![CDATA[Anti-Malware Research]]></category><dc:creator>Jubaer Alnazi JABIN</dc:creator><pubDate>Thu, 22 Feb 2024 14:00:10 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/02/cyber-4084979_1920.jpg" medium="image"/><content:encoded><![CDATA[CVE-2024-23204 sheds light on the critical importance of continuous security vigilance. Apple's Shortcuts application, designed to enhance user automation, can inadvertently become a potential vector for privacy breaches. This analysis aims to provide users, developers, and security professionals with insights into the nature of the vulnerability, its potential impact, and recommended mitigation measures.


At a glance:

 * We have discovered a vulnerability in Apple Shortcuts that lets a potent]]></content:encoded></item><item><title>Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms</title><description><![CDATA[Bitdefender Labs has been keeping up with the latest modus operandi of cybercrooks who adapt emerging technologies to siphon money from consumers.

Artificial intelligence is just one of the many tools that help in the creation and successful dissemination of online schemes to extort money and sensitive information.

This paper focuses on voice cloning (audio deepfakes) schemes and how they are proliferated via social media to trick unsuspecting victims.

Before delving deeper into the main subj]]></description><link>https://www.bitdefender.com/en-us/blog/labs/audio-deepfakes-celebrity-endorsed-giveaway-scams-and-fraudulent-investment-opportunities-flood-social-media-platforms</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722c9</guid><category><![CDATA[Anti-Malware Research]]></category><dc:creator>Nicolae POSTOLACHI</dc:creator><pubDate>Wed, 14 Feb 2024 14:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/02/pexels-anna-tarazevich-5697260.jpg" medium="image"/><content:encoded><![CDATA[Bitdefender Labs has been keeping up with the latest modus operandi of cybercrooks who adapt emerging technologies to siphon money from consumers.

Artificial intelligence is just one of the many tools that help in the creation and successful dissemination of online schemes to extort money and sensitive information.

This paper focuses on voice cloning (audio deepfakes) schemes and how they are proliferated via social media to trick unsuspecting victims.

Before delving deeper into the main subj]]></content:encoded></item><item><title>New macOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group</title><description><![CDATA[UPDATE:

Following our initial release, we have been contacted by our fellow researchers at Jamf who were able to identify three more samples that act like first-stage payloads. They are responsible for downloading the backdoor:

 * e7cab6f2be47940bf36e279bbec54ec7 - Jobinfo.app.zip
 * 26d6a7e3507edf9953684d367dcd44bd - Jobinfo.zip
 * 775851f86cbde630808ff6d2cf8cedbf - Jobinfo.zip

Combined with information in our previous research, the investigation of these samples revealed new components of t]]></description><link>https://www.bitdefender.com/en-us/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722c8</guid><category><![CDATA[Anti-Malware Research]]></category><dc:creator>Andrei LAPUSNEANU</dc:creator><pubDate>Thu, 08 Feb 2024 20:18:15 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/02/home-office-5400420_1920.jpg" medium="image"/><content:encoded><![CDATA[UPDATE:

Following our initial release, we have been contacted by our fellow researchers at Jamf who were able to identify three more samples that act like first-stage payloads. They are responsible for downloading the backdoor:

 * e7cab6f2be47940bf36e279bbec54ec7 - Jobinfo.app.zip
 * 26d6a7e3507edf9953684d367dcd44bd - Jobinfo.zip
 * 775851f86cbde630808ff6d2cf8cedbf - Jobinfo.zip

Combined with information in our previous research, the investigation of these samples revealed new components of t]]></content:encoded></item><item><title>Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud</title><description><![CDATA[SMS services remain a critical part of telecommunications; they don't require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a stepping stone in their never-ending campaigns. And if you think that the new RCS messaging standard will offer any protection, you would be wrong. These types of scams will continue to spread regardless of the messaging standard used.

SMS scams are ever]]></description><link>https://www.bitdefender.com/en-us/blog/labs/investigating-worldwide-sms-scams-and-tens-of-millions-of-dollars-in-fraud</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722c7</guid><category><![CDATA[Anti-Malware Research]]></category><dc:creator>Alexandra-Svetlana Dinulica (Bocereg)</dc:creator><pubDate>Thu, 25 Jan 2024 13:10:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/01/concept-of-digital-technology-828267118_6326x3518.jpg" medium="image"/><content:encoded><![CDATA[SMS services remain a critical part of telecommunications; they don't require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a stepping stone in their never-ending campaigns. And if you think that the new RCS messaging standard will offer any protection, you would be wrong. These types of scams will continue to spread regardless of the messaging standard used.

SMS scams are ever]]></content:encoded></item><item><title>Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximize crypto-doubling scams</title><description><![CDATA[As of October 2023, researchers at Bitdefender Labs have been actively keeping tabs on steam-jacking attacks against high-profile YouTube accounts used to conduct a myriad of crypto doubling scams.

Fast forward to 2024; our investigation into the fraudulent takeovers and usage of YouTube accounts has rendered new findings, as financially motivated threat actors meticulously evolve their attacks.

Over the past couple of months, stream-jacking attacks have steadily evolved, and our research show]]></description><link>https://www.bitdefender.com/en-us/blog/labs/stream-jacking-2-0-deep-fakes-power-account-takeovers-on-youtube-to-maximize-crypto-doubling-scams</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722c6</guid><category><![CDATA[Anti-Malware Research]]></category><dc:creator>Ionut Alexandru BALTARIU</dc:creator><pubDate>Thu, 18 Jan 2024 13:00:00 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/01/ai-deepfake.jpg" medium="image"/><content:encoded><![CDATA[As of October 2023, researchers at Bitdefender Labs have been actively keeping tabs on steam-jacking attacks against high-profile YouTube accounts used to conduct a myriad of crypto doubling scams.

Fast forward to 2024; our investigation into the fraudulent takeovers and usage of YouTube accounts has rendered new findings, as financially motivated threat actors meticulously evolve their attacks.

Over the past couple of months, stream-jacking attacks have steadily evolved, and our research show]]></content:encoded></item><item><title>Vulnerabilities identified in Bosch BCC100 Thermostat</title><description><![CDATA[Several factors underscore the importance of smart thermostats: energy efficiency, environmental sustainability, and the spread of smart home technologies. These devices have a major impact on energy conservation and its associated cost savings, while making homes noticeably more comfortable.

This combination of energy efficiency, convenience and environmental consciousness, which resonate with the current priorities of individuals, governments and societies, have led to the diversification of ]]></description><link>https://www.bitdefender.com/en-us/blog/labs/vulnerabilities-identified-in-bosch-bcc100-thermostat</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722c5</guid><category><![CDATA[IoT Research]]></category><dc:creator>Bitdefender</dc:creator><pubDate>Thu, 11 Jan 2024 14:26:30 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/01/technology-gbbc352657_1920.jpg" medium="image"/><content:encoded><![CDATA[Several factors underscore the importance of smart thermostats: energy efficiency, environmental sustainability, and the spread of smart home technologies. These devices have a major impact on energy conservation and its associated cost savings, while making homes noticeably more comfortable.

This combination of energy efficiency, convenience and environmental consciousness, which resonate with the current priorities of individuals, governments and societies, have led to the diversification of ]]></content:encoded></item><item><title>Unveiling Mobile App Secrets: A 6-Month Deep Dive into Surprising Behavior Patterns</title><description><![CDATA[Bitdefender launched in May 2023, an industry-first technology called App Anomaly Detection that gave the security solutions feature in our mobile security solution for Android the power to analyze app behavior and identify threats based on what applications do after installation. We took a closer at what this new technology found in the wild over the course of a few months.

The new technology provides us with data on current threats and a better understanding of worldwide trends. And, if we ca]]></description><link>https://www.bitdefender.com/en-us/blog/labs/unveiling-mobile-app-secrets-a-6-month-deep-dive-into-surprising-behavior-patterns</link><guid isPermaLink="false">66d5c3d2d0ec1aefc7d722c4</guid><category><![CDATA[Anti-Malware Research]]></category><dc:creator>Elena FLONDOR</dc:creator><pubDate>Mon, 08 Jan 2024 11:54:56 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/labs/content/images/2024/01/Digital-security-concept-516021379_6400x4800.jpg" medium="image"/><content:encoded><![CDATA[Bitdefender launched in May 2023, an industry-first technology called App Anomaly Detection that gave the security solutions feature in our mobile security solution for Android the power to analyze app behavior and identify threats based on what applications do after installation. We took a closer at what this new technology found in the wild over the course of a few months.

The new technology provides us with data on current threats and a better understanding of worldwide trends. And, if we ca]]></content:encoded></item></channel>
        </rss>