A new version of JSOutProx has been detected by Resecurity. This version is targeting financial services and organizations in the APAC and MENA regions. JSOutProx is a sophisticated attack framework that uses both JavaScript and .NET to carry out its attacks.
The malware allows for the loading of various plugins that carry out additional malicious activities once executed. This malware was first identified in 2019 and was linked to SOLAR SPIDER’s phishing campaigns, distributing the JSOutProx RAT to financial institutions in Africa, the Middle East, South Asia, and Southeast Asia.
Apple has issued an urgent security advisory about 3 critical zero-day vulnerabilities—CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085—that are being actively exploited in...
Canon has announced a critical security vulnerability, CVE-2025-1268, in printer drivers for its production printers, multifunction printers, and laser printers....
Cybersecurity researcher Jeremiah Fowler recently revealed a sensitive data exposure involving the Australian fintech company Vroom by YouX, previously known...
On February 8, 2024, a system integration company based in Saudi Arabia reported an incident where customers of a major bank in the region were targeted. Resecurity helped victims by obtaining the malicious code and recovering the payload. On April 2, 2024, there was another attack, where banking customers were tricked with fake notifications and malicious code.
The new version of JSOutProx, along with the use of platforms like GitHub and GitLab, shows that malicious actors are working hard and smart. JSOutProx has been a threat for five years and continues to evolve, especially for financial institutions’ customers. This year, the threat has expanded to the MENA region, increasing their cybercriminal activity. Resecurity is committed to tracking JSOutProx and protecting financial institutions and their customers worldwide from these harmful activities. To read out the full report click here.