The Dark Side of the Hype: PDiddySploit Attacks Diddy Fans

Friend

Professional
Messages
2,653
Reaction score
850
Points
113
Hackers are using the rapper scandal to spread the virus.

Veriti researchers have discovered a new piece of malware called PDiddySploit, which is exploiting the public interest in the charges against famous rap artist Sean "Diddy" Combs. Attackers are trying to take advantage of users' curiosity about Combs' deleted messages on the social network X* amid accusations of racketeering, human trafficking and other forms of violence against him.

On September 13, cybercriminals began distributing infected files claiming to contain posts and replies from Diddy's deleted X account. The basis for the creation of PDiddySploit was the PySilon RAT Trojan, written in Python.

PDiddySploit is capable of stealing sensitive information, recording keystrokes, recording screen activity, and executing remote commands. Such functionality allows you to completely compromise the system and gain access to user data. According to VirusTotal, not all antivirus programs are able to detect the new Trojan, which significantly increases its threat.

Veriti experts emphasize that the growing public attention to this story creates favorable conditions for cybercriminals. They take advantage of the situation to lure unsuspecting users into downloading malicious files, exposing them to serious cyber threats. Removing content on Diddy's and other stakeholders' social media adds an element of intrigue, which further motivates users to open suspicious files in the hope of seeing the deleted information.

Since the introduction of the PySilon RAT in 2023, it has been adapted more than 300 times, and PDiddySploit has become one of the most successful examples of such modification. Experts predict that more similar attacks related to this malware will appear in the near future.

To protect against such software, it is recommended to refrain from downloading suspicious files, carefully check the sources, and scan documents with several antivirus solutions. Often, these files are distributed through emails or links.

Researchers emphasize the importance of caution when interacting with content related to high-profile news and scandals. Criminals use psychological tricks to trick users into opening infected documents. If the file seems too tempting, for example, it offers exclusive data from deleted accounts, it is most likely a trap.

It is worth noting that this is not the first time that Diddy's name has been used to carry out cyberattacks. In 2013, hackers distributed a malicious file disguised as an MP3 called "Diddy & Dirty Money – I'm Coming Home (feat. Skylar Grey).mp3.pif". This file contained the Program Information File (PIF), a format used in MS-DOS.

Source
 
Top