• Cyber Safety
  • Posts
  • ChoiceJacking, NetBird Malware & Adversarial AI

ChoiceJacking, NetBird Malware & Adversarial AI

Attackers are finding new ways to exploit collaboration platforms. Key indicators include:

  • Attackers exploit the inherent trust in Microsoft Teams by impersonating IT support or coworkers

  • Malicious links or attachments deliver credential-stealing payloads or deploy malware

  • Tactics include deceptive display names, urgent language, and carefully crafted content

  • Indicators of compromise often hide in subtle anomalies—timing, tone, or unexpected requests

Start learning AI in 2025

Keeping up with AI is hard – we get it!

That’s why over 1M professionals read Superhuman AI to stay ahead.

  • Get daily AI news, tools, and tutorials

  • Learn new AI skills you can use at work in 3 mins a day

  • Become 10X more productive

Supply Chain Vulnerabilities: The New Enterprise Battleground

Modern supply chains introduce hidden risk factors that attackers eagerly exploit. Watch for:

  • Third-party vendors and software updates as prime entry points for Advanced Persistent Threats (APTs)

  • Compromised vendor credentials and trojanized packages that enable stealthy network infiltration

  • Ripple effects causing widespread operational outages and significant financial impact

  • Continuous monitoring and automated validation as cornerstones of vendor risk management

Financial Executives Targeted by Sneaky NetBird Malware

High-profile spear-phishing campaigns are increasingly tailored to C-level workflows. This one:

  • Launched May 15, 2025, masquerades as a Rothschild & Co recruitment drive

  • Triggers malicious NetBird backdoor installs via crafted email links

  • Leverages social engineering specifically aimed at finance leaders’ routines

  • Demonstrates the urgent need for executive-level awareness and hardened email defenses

Learn how to make AI work for you

AI won’t take your job, but a person using AI might. That’s why 1,000,000+ professionals read The Rundown AI – the free newsletter that keeps you updated on the latest AI news and teaches you how to use it in just 5 minutes a day.

Beware: "ChoiceJacking" Turns Chargers into Device Hackers

Even public charging stations can become attack vectors in seconds. Observe:

  • “ChoiceJacking” exploits USB ports to push malicious payloads without consent

  • Automates data-only connections in milliseconds, bypassing user prompts

  • Infected chargers siphon credentials, session tokens, and private files undetected

  • Airports, cafes, and high-traffic public areas are the highest-risk locations

Adversarial AI: The Unseen Enemy in Financial Cybersecurity

AI systems themselves are being weaponized to manipulate outcomes. Key tactics include:

  • Data poisoning and model evasion to skew market forecasts or authorize fraudulent transactions

  • Crafted adversarial inputs that slip past traditional anomaly detection

  • Lack of transparency in AI decision pipelines hinders conventional security controls

  • Defense strategies demand continuous model monitoring, robust validation, and threat-aware governance