- Cyber Safety
- Posts
- ChoiceJacking, NetBird Malware & Adversarial AI
ChoiceJacking, NetBird Malware & Adversarial AI

Attackers are finding new ways to exploit collaboration platforms. Key indicators include:
Attackers exploit the inherent trust in Microsoft Teams by impersonating IT support or coworkers
Malicious links or attachments deliver credential-stealing payloads or deploy malware
Tactics include deceptive display names, urgent language, and carefully crafted content
Indicators of compromise often hide in subtle anomalies—timing, tone, or unexpected requests
Start learning AI in 2025
Keeping up with AI is hard – we get it!
That’s why over 1M professionals read Superhuman AI to stay ahead.
Get daily AI news, tools, and tutorials
Learn new AI skills you can use at work in 3 mins a day
Become 10X more productive

Supply Chain Vulnerabilities: The New Enterprise Battleground
Modern supply chains introduce hidden risk factors that attackers eagerly exploit. Watch for:
Third-party vendors and software updates as prime entry points for Advanced Persistent Threats (APTs)
Compromised vendor credentials and trojanized packages that enable stealthy network infiltration
Ripple effects causing widespread operational outages and significant financial impact
Continuous monitoring and automated validation as cornerstones of vendor risk management

Financial Executives Targeted by Sneaky NetBird Malware
High-profile spear-phishing campaigns are increasingly tailored to C-level workflows. This one:
Launched May 15, 2025, masquerades as a Rothschild & Co recruitment drive
Triggers malicious NetBird backdoor installs via crafted email links
Leverages social engineering specifically aimed at finance leaders’ routines
Demonstrates the urgent need for executive-level awareness and hardened email defenses
Learn how to make AI work for you
AI won’t take your job, but a person using AI might. That’s why 1,000,000+ professionals read The Rundown AI – the free newsletter that keeps you updated on the latest AI news and teaches you how to use it in just 5 minutes a day.

Beware: "ChoiceJacking" Turns Chargers into Device Hackers
Even public charging stations can become attack vectors in seconds. Observe:
“ChoiceJacking” exploits USB ports to push malicious payloads without consent
Automates data-only connections in milliseconds, bypassing user prompts
Infected chargers siphon credentials, session tokens, and private files undetected
Airports, cafes, and high-traffic public areas are the highest-risk locations

Adversarial AI: The Unseen Enemy in Financial Cybersecurity
AI systems themselves are being weaponized to manipulate outcomes. Key tactics include:
Data poisoning and model evasion to skew market forecasts or authorize fraudulent transactions
Crafted adversarial inputs that slip past traditional anomaly detection
Lack of transparency in AI decision pipelines hinders conventional security controls
Defense strategies demand continuous model monitoring, robust validation, and threat-aware governance