Fake Claude Code Installs, Arpa Phishing, Zombie ZIP Malware Evasion, and Iran/Israel Cyber Retaliation
This episode covers four major security stories: the “InstaFix” campaign using Google sponsored ads and cloned Claude Code install pages to trick developers into pasting terminal commands that deploy the TeraStealer credential-stealing malware; a phishing technique abusing the special-use .arpa domain and IPv6 reverse DNS to evade email and domain-based defenses, using attacker-controlled DNS zones, traffic distribution systems, and lures like surveys and account notices; the “Zombie ZIP” technique that manipulates ZIP headers to bypass AV/EDR scanning, tied to CVE-2026-0866 and demonstrated to evade most VirusTotal engines; and a surge in pro-Iranian and pro-Russian hacktivist retaliation targeting Israel and regional entities with DDoS, defacements, breach claims, and disinformation, alongside Israel’s humorous counter-psychological video response.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that’s built for performance and scale. You can find them at Meter.com/cst
00:00 Sponsor Message Meter
00:19 Headlines And Intro
00:51 Fake Claude Install Scam
04:25 Arpa Domain Phishing
08:30 Zombie Zip Malware Trick
10:57 Cyber Retaliation Surge
13:44 Israel’s PSYOP Video
14:25 Wrap Up And Sponsor
Read the original article: