A new wave of malware activity is targeting South Korean users, with Remcos RAT being distributed under the guise of legitimate VeraCrypt installers and gambling-related utilities through web browsers and Telegram channels linked to underground gambling networks. In parallel, threat actors associated with the KongTuke group have rolled out a sophisticated operation dubbed CrashFix, leveraging a malicious browser extension called NexShield. Researchers have also uncovered PDFSIDER, a stealthy malware variant that abuses DLL side-loading to install a backdoor with encrypted command-and-control communications, enabling it to evade endpoint detection controls. Keep reading further for more news.