Windows and macOS systems have been subjected to attacks leveraging the novel Go-based information-stealing malware JaskaGO, reports The Hacker News. Threat actors have concealed JaskaGO within fraudulent versions of CapCut, AnyConnect, and other legitimate software, which when installed do not harm virtual machines but facilitate data exfiltration, cryptocurrency theft, shell command execution, running process enumeration, and further payload deployment in other systems, according to a report from AT&T Alien Labs. Moreover, system persistence is achieved by JaskaGO on macOS through a multi-step process that includes self-execution through root permissions, Gatekeeper protection deactivation, and custom launch daemon creation. Details regarding the attack vector for JaskaGO or the extent of the campaign remains unclear but the payload represents the increasing prevalence of Go-based malware, said researcher Ofer Caspi. “Go, also known as Golang, is recognized for its simplicity, efficiency, and cross-platform capabilities. Its ease of use has made it an attractive choice for malware authors seeking to create versatile and sophisticated threats,” Caspi added.

HELLCAT Ransomware Group Strikes Again: Four New Victims Breached via Jira Credentials from Infostealer Logs
By [Alon Gal] | April 2025 The HellCat ransomware group has once again demonstrated their relentless focus on exploiting Jira credentials stolen through infostealer malware, targeting