BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Weekly Security Roundup: Banking Trojan Targets Brazil, Iranian Hackers Hit Healthcare Giants, HR Under Attack

Weekly Security Roundup: Banking Trojan Targets Brazil, Iranian Hackers Hit Healthcare Giants, HR Under Attack

March 12, 2026Data Breaches & Incidents3 min readhigh

Originally reported by Hackread

#malware#banking-trojan#iranian-threat-actors#healthcare-security#smart-home-security#social-engineering#brazil-pix#hr-targeting
Share

TL;DR

Iranian-linked Handala group claims attacks on medical device maker Stryker and payment processor Verifone, while new PixRevolution banking trojan uses live operators to steal Brazil's PIX transfers in real-time. Meanwhile, Russian-speaking attackers deploy BlackSanta malware through fake job applications targeting HR departments.

Why high?

Iran-linked threat actors targeting critical healthcare infrastructure (Stryker) combined with real-time banking fraud malware represents significant threat activity requiring immediate attention.

Weekly Security Roundup: Active Threats Across Multiple Sectors

This week's threat landscape spans financial fraud, nation-state activity targeting critical infrastructure, and social engineering attacks on recruitment processes. Each incident demonstrates evolving attack techniques requiring immediate defensive attention.

Iran-Linked Handala Group Claims Healthcare and FinTech Attacks

Iranian-affiliated threat actors operating under the Handala banner claim successful cyberattacks against medical device manufacturer Stryker and payment processing company Verifone. Stryker has confirmed experiencing network disruption, while Verifone maintains no evidence of successful breach has been identified.

The targeting of Stryker, a major medical device manufacturer, raises particular concern given the critical nature of healthcare infrastructure. Healthcare organizations should review their threat monitoring for indicators of Iranian threat actor activity and ensure medical device networks maintain appropriate segmentation.

PixRevolution Banking Trojan Deploys Live Operators for Real-Time Fraud

Security researchers have identified PixRevolution, a sophisticated Android banking trojan specifically targeting Brazil's PIX instant payment system. Unlike traditional automated banking malware, PixRevolution employs live operators who monitor victim screens in real-time to intercept and redirect financial transfers as they occur.

This represents a significant evolution in mobile banking fraud, combining technical malware capabilities with human-operated surveillance to bypass traditional fraud detection systems. Financial institutions operating in Brazil should implement additional monitoring for PIX transaction anomalies and consider enhanced authentication for high-value transfers.

BlackSanta Malware Campaign Targets HR Through Fake Job Applications

Aryaka researchers have documented a Russian-speaking threat group deploying BlackSanta malware through weaponized resume submissions targeting HR departments. The campaign leverages the recruitment workflow as an attack vector, exploiting the natural tendency for HR staff to download and review candidate materials.

This social engineering approach bypasses many traditional email security controls by using legitimate business processes as cover. Organizations should implement sandboxing for all resume downloads and provide additional security awareness training for recruitment staff on identifying malicious attachments.

Smart Home Device Security Fundamentals

As IoT adoption continues expanding, fundamental security practices for smart home devices remain critical. Key protective measures include implementing strong, unique passwords across all connected devices, maintaining current firmware through automatic updates where possible, and establishing network segmentation to isolate smart home devices from critical systems.

The expanding attack surface of connected home devices requires proactive security posture management, particularly as remote work arrangements blur the boundaries between home and corporate networks.

Sources

  • Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone
  • New PixRevolution Malware Steals Brazil's PIX Transfers in Real Time
  • BlackSanta Malware Targets HR Staff with Fake CV Downloads
  • Maintaining Security and Protecting Smart Home Devices from Hackers

Originally reported by Hackread

Tags

#malware#banking-trojan#iranian-threat-actors#healthcare-security#smart-home-security#social-engineering#brazil-pix#hr-targeting

Related Intelligence

  • Weekly Security Roundup: Teramind Phishing Campaign Targets Remote Workers

    mediumMar 2, 2026
  • Security Roundup: Certificate Abuse, Phishing Evolution, and Enterprise Defense Gaps

    highMar 5, 2026
  • Whistleblower Alleges Former DOGE Member Took Social Security Data to New Position

    highMar 12, 2026

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← Whistleblower Alleges Former DOGE Member Took Social Security Data to New Position

Next Article

Week in Malware: CISA Adds n8n to KEV, Iran-Linked Wiper Hits Medical Giant →