PROBABLYPWNED
JR

James Rivera

Malware Reporter

Covers ransomware operations, infostealer campaigns, and malware-as-a-service ecosystems for ProbablyPwned. James spent six years as a malware analyst at a major endpoint security vendor before transitioning to journalism, where he brings hands-on reverse engineering experience to his reporting. He tracks the evolution of threat actor toolkits, evasion techniques, and the criminal economics behind ransomware-as-a-service. James holds a GIAC Reverse Engineering Malware (GREM) certification and is a regular contributor to malware analysis communities.

malware analysisreverse engineeringransomware trackinginfostealer campaignsRaaS ecosystems

Articles by James(65)

Massiv Android Trojan Spreads via Fake IPTV Apps
Malware4 min read

Massiv Android Trojan Spreads via Fake IPTV Apps

Banking trojan disguised as IPTV streaming apps targets users in Portugal and Greece, enabling device takeover and credential theft through overlay attacks.

James RiveraFeb 22, 2026
PromptSpy: First Android Malware Using Gemini AI at Runtime
Malware4 min read

PromptSpy: First Android Malware Using Gemini AI at Runtime

ESET discovers PromptSpy, the first Android malware weaponizing Google's Gemini AI to maintain persistence by analyzing UI and generating real-time tap instructions to stay pinned in recent apps.

James RiveraFeb 21, 2026
Microsoft: macOS Infostealers Surge With ClickFix and Python
Malware4 min read

Microsoft: macOS Infostealers Surge With ClickFix and Python

Microsoft Defender Experts track expanding infostealer campaigns hitting macOS via ClickFix prompts, malicious DMG installers, and Python-based stealers. DigitStealer, MacSync, and AMOS lead the wave.

James RiveraFeb 18, 2026
SANS Analyst Tracks Malware Using Recycled PNG Payload
Malware4 min read

SANS Analyst Tracks Malware Using Recycled PNG Payload

Xavier Mertens discovers 846 images reusing the same Base64 steganography technique to deliver .NET malware via Equation Editor exploits. Here's how defenders can hunt for copycats.

James RiveraFeb 18, 2026
SSHStalker Botnet Compromises 7,000 Linux Servers via SSH
Malware4 min read

SSHStalker Botnet Compromises 7,000 Linux Servers via SSH

New Linux botnet SSHStalker infected 7,000 cloud servers using brute-force SSH attacks and 2009-era kernel exploits. Uses IRC for command-and-control while apparently staging for future operations.

James RiveraFeb 12, 2026
Rapid7 Links Notepad++ Breach to Lotus Blossom APT
Malware5 min read

Rapid7 Links Notepad++ Breach to Lotus Blossom APT

Rapid7 attributes the six-month Notepad++ supply chain compromise to Chinese APT Lotus Blossom, revealing a custom Chrysalis backdoor and three distinct infection chains.

James RiveraFeb 6, 2026