Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Printer Company Procolored Served Infected Software for Months

Posted on May 19, 2025May 19, 2025 By CWS

For half a yr, the web site of printer firm Procolored served software program downloads that contained malware, cybersecurity agency GData studies.

After being tipped off by a tech author that the USB drive containing the system’s software program was contaminated with malware, GData analyzed the software program downloads obtainable by means of the corporate’s web site, solely to find that they have been contaminated as nicely.

The tech author, Cameron Coward, had notified the printer agency of the difficulty, solely to be instructed that the malware detection was probably a false constructive and that there was nothing incorrect with the flash drive.

GData, nonetheless, found that 39 software program downloads, hosted on mega.nz and final up to date in October 2024, had been contaminated with two malware households, specifically an info stealer and a backdoor.

The backdoor, dubbed XRed, is written in Delphi and has worm-like conduct. The pattern present in Procolored’s downloads may log keystrokes, obtain further payloads, take screenshots, tamper with recordsdata, and supply a shell if requested.

The stealer, named CoinStealer, targets cryptocurrency wallets however may also change cryptocurrency addresses within the clipboard with an attacker’s handle, to divert funds to the attacker throughout transfers.

Nonetheless, GData found that the stealer can be a virus that targets executable recordsdata, prepending itself to them, after which strikes the contaminated recordsdata to the host’s authentic location.

In accordance with the cybersecurity agency, XRed bundles the virus, dubbed SnipVex, which results in a “superinfection”, because the goal system finally ends up internet hosting a number of self-replicating malware households.Commercial. Scroll to proceed studying.

“The virus an infection additionally explains why a complete of 39 recordsdata within the downloads part of Procolored have been contaminated. SnipVex probably replicated itself on a developer’s system or the construct servers,” GData explains.

A have a look at the cryptocurrency handle the stealer would change a sufferer’s handle with within the clipboard reveals that it acquired over 9 Bitcoin (valued at greater than $900,000).

Though it initially denied a attainable malware an infection, Procolored eliminated the software program downloads from its web site, saying it was investigating them and that it could repost them if discovered clear.

The corporate instructed GData that the software program hosted on its web site was initially transferred utilizing a flash drive, and that the virus may have been launched throughout the course of.

SecurityWeek has contacted Procolored for a press release on the matter and can replace this text if a reply arrives.

Associated: Infostealer Infections Result in Telefonica Ticketing System Breach

Associated: Snowflake Assaults: Mandiant Hyperlinks Information Breaches to Infostealer Infections

Associated: Police Warn A whole lot of On-line Retailers of Skimmer Infections

Associated: NSA Points Steerage on Mitigating BlackLotus Bootkit Infections

Security Week News Tags:Company, Infected, Months, Printer, Procolored, Served, Software

Post navigation

Previous Post: RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
Next Post: BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

Related Posts

Critical OpenPGP.js Vulnerability Allows Spoofing Security Week News
Critical Microsens Product Flaws Allow Hackers to Go ‘From Zero to Hero’ Security Week News
Hackers Weaponize Trust with AI-Crafted Emails to Deploy ScreenConnect Security Week News
$1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025 Security Week News
Two Exploited Vulnerabilities Patched in Android Security Week News
Harvard Is First Confirmed Victim of Oracle EBS Zero-Day Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark