Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Printer Company Procolored Served Infected Software for Months

Posted on May 19, 2025May 19, 2025 By CWS

For half a yr, the web site of printer firm Procolored served software program downloads that contained malware, cybersecurity agency GData studies.

After being tipped off by a tech author that the USB drive containing the system’s software program was contaminated with malware, GData analyzed the software program downloads obtainable by means of the corporate’s web site, solely to find that they have been contaminated as nicely.

The tech author, Cameron Coward, had notified the printer agency of the difficulty, solely to be instructed that the malware detection was probably a false constructive and that there was nothing incorrect with the flash drive.

GData, nonetheless, found that 39 software program downloads, hosted on mega.nz and final up to date in October 2024, had been contaminated with two malware households, specifically an info stealer and a backdoor.

The backdoor, dubbed XRed, is written in Delphi and has worm-like conduct. The pattern present in Procolored’s downloads may log keystrokes, obtain further payloads, take screenshots, tamper with recordsdata, and supply a shell if requested.

The stealer, named CoinStealer, targets cryptocurrency wallets however may also change cryptocurrency addresses within the clipboard with an attacker’s handle, to divert funds to the attacker throughout transfers.

Nonetheless, GData found that the stealer can be a virus that targets executable recordsdata, prepending itself to them, after which strikes the contaminated recordsdata to the host’s authentic location.

In accordance with the cybersecurity agency, XRed bundles the virus, dubbed SnipVex, which results in a “superinfection”, because the goal system finally ends up internet hosting a number of self-replicating malware households.Commercial. Scroll to proceed studying.

“The virus an infection additionally explains why a complete of 39 recordsdata within the downloads part of Procolored have been contaminated. SnipVex probably replicated itself on a developer’s system or the construct servers,” GData explains.

A have a look at the cryptocurrency handle the stealer would change a sufferer’s handle with within the clipboard reveals that it acquired over 9 Bitcoin (valued at greater than $900,000).

Though it initially denied a attainable malware an infection, Procolored eliminated the software program downloads from its web site, saying it was investigating them and that it could repost them if discovered clear.

The corporate instructed GData that the software program hosted on its web site was initially transferred utilizing a flash drive, and that the virus may have been launched throughout the course of.

SecurityWeek has contacted Procolored for a press release on the matter and can replace this text if a reply arrives.

Associated: Infostealer Infections Result in Telefonica Ticketing System Breach

Associated: Snowflake Assaults: Mandiant Hyperlinks Information Breaches to Infostealer Infections

Associated: Police Warn A whole lot of On-line Retailers of Skimmer Infections

Associated: NSA Points Steerage on Mitigating BlackLotus Bootkit Infections

Security Week News Tags:Company, Infected, Months, Printer, Procolored, Served, Software

Post navigation

Previous Post: RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
Next Post: BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Related Posts

200,000 Harbin Clinic Patients Impacted by NRS Data Breach Security Week News
Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure Security Week News
Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam Security Week News
Masimo Manufacturing Facilities Hit by Cyberattack Security Week News
Prometei Botnet Activity Spikes – SecurityWeek Security Week News
Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News