Author: Mark

  • New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

    New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

    Cybersecurity researchers have flagged a previously undocumented Android banking trojan called Datzbro that can conduct device takeover (DTO) attacks and perform fraudulent transactions by preying on the elderly.

    Dutch mobile security company ThreatFabric said it discovered the campaign in August 2025 after users in Australia reported scammers managing Facebook groups promoting “active senior trips.” Some of the other territories targeted by the threat actors include Singapore, Malaysia, Canada, South Africa, and the U.K.

    The campaigns, it added, specifically focused on elderly people looking for social activities, trips, in-person meetings, and similar events. These Facebook groups have been found to share artificial intelligence (AI)-generated content, claiming to organize various activities for seniors.

    Should prospective targets express willingness to participate in these events, they are subsequently approached via Facebook Messenger or WhatsApp, where they are asked to download an APK file from a fraudulent link (e.g., “download.seniorgroupapps[.]com”).

    “The fake websites prompted visitors to install a so-called community application, claiming it would allow them to register for events, connect with members, and track scheduled activities,” ThreatFabric said in a report shared with The Hacker News.

    Interestingly, the websites have also been found to contain placeholder links to download an iOS application, indicating that the attackers are looking to target both the mobile operating systems, distributing TestFlight apps for iOS and trick victims into downloading them.

    DFIR Retainer Services

    Should the victim click on the button to download the Android application, it either leads to the direct deployment of the malware on their devices, or that of a dropper that’s built using an APK binding service dubbed Zombinder to bypass security restrictions on Android 13 and later.

    Some of the Android apps that have been found distributing Datzbro are listed below –

    • Senior Group (twzlibwr.rlrkvsdw.bcfwgozi)
    • Lively Years (orgLivelyYears.browses646)
    • ActiveSenior (com.forest481.security)
    • DanceWave (inedpnok.kfxuvnie.mggfqzhl)
    • 作业帮 (io.mobile.Itool)
    • 麻豆传媒 (fsxhibqhbh.hlyzqkd.aois
    • 麻豆传媒 (mobi.audio.aassistant)
    • 谷歌浏览器 (tvmhnrvsp.zltixkpp.mdok)
    • MT管理器 (varuhphk.vadneozj.tltldo)
    • MT管理器 (spvojpr.bkkhxobj.twfwf)
    • 大麦 (mnamrdrefa.edldylo.zish)
    • MT管理器 (io.red.studio.tracker)

    The malware, like other Android banking trojans, has a wide range of capabilities to record audio, capture photos, access files and photos, and conduct financial fraud through remote control, overlay attacks, and keylogging. It also relies on Android’s accessibility services to perform remote actions on the victim’s behalf.

    A notable feature of Datzbro is the schematic remote control mode, which allows the malware to send information about all the elements displayed on the screen, their position, and content, so as to allow the operators to re-create the layout at their end and effectively commandeer the device.

    The banking trojan can also serve as a semi-transparent black overlay with custom text so as to hide the malicious activity from a victim, as well as steal the device lock screen PIN and passwords associated with Alipay and WeChat. Furthermore, it scans accessibility event logs for package names related to banks or cryptocurrency wallets, and for text containing passwords, PINs, or other codes.

    “Such a filter clearly shows the focus of the developers behind Datzbro, not only using its Spyware capabilities, but also turning it into a financial threat,” ThreatFabric said. “With the help of keylogging capabilities, Datzbro can successfully capture login credentials for mobile banking applications entered by unsuspecting victims.”

    It’s believed that Datzbro is the work of a Chinese-speaking threat group, given the presence of Chinese debug and logging strings in the malware source code. The malicious apps have been found to be connected to a command-and-control (C2) backend that’s a Chinese-language desktop application, making it stand apart from other malware families that rely on web-based C2 panels.

    ThreatFabric said a compiled version of the C2 app has been leaked to a public virus share, suggesting that the malware may have been leaked and is being distributed freely among cybercriminals.

    CIS Build Kits

    “The discovery of Datzbro highlights the evolution of mobile threats targeting unsuspecting users through social engineering campaigns,” the company said. “By focusing on seniors, fraudsters exploit trust and community-oriented activities to lure victims into installing malware. What begins as a seemingly harmless event promotion on Facebook can escalate into device takeover, credential theft, and financial fraud.”

    The disclosure comes as IBM X-Force detailed an AntiDot Android banking malware campaign codenamed PhantomCall that has targeted users of major financial institutions globally, spanning Spain, Italy, France, the U.S., Canada, the U.A.E., and India, using fake Google Chrome dropper apps that can get around Android 13’s controls that prevent sideloaded apps from exploiting accessibility APIs.

    According to an analysis published by PRODAFT in June 2025, AntiDot is attributed to a financially motivated threat actor called LARVA-398 and is available to others under a Malware-as-a-Service (MaaS) model on underground forums.

    The latest campaign is designed to make use of the CallScreeningService API to monitor incoming calls and selectively block them based on a dynamically generated list of phone numbers stored in the phone’s shared preferences, effectively allowing the attackers to prolong unauthorized access, complete fraudulent transactions, or delay detection.

    “PhantomCall also enables attackers to initiate fraudulent activity by silently sending USSD codes to redirect calls, while abusing Android’s CallScreeningService to block legitimate incoming calls, effectively isolating victims and enabling impersonation,” security researcher Ruby Cohen said.

    “These capabilities play a critical role in orchestrating high-impact financial fraud by cutting off victims from real communication channels and enabling attackers to act on their behalf without raising suspicion.”


    Source: thehackernews.com…

  • U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust

    U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust

    £5.5 Billion in Bitcoin

    A Chinese national has been convicted for her role in a fraudulent cryptocurrency scheme after law enforcement authorities in the U.K. confiscated £5.5 billion (about $7.39 billion) during a raid of her home in London.

    The cryptocurrency seizure, amounting to 61,000 Bitcoin, is believed to be the single largest such effort in the world, the Metropolitan Police said.

    Zhimin Qian (aka Yadi Zhang), 47, pleaded guilty at Southwark Crown Court on Monday to offenses related to acquiring and possessing criminal property (i.e., cryptocurrency). She is expected to be sentenced at a later date.

    The Met Police said the seizure was the result of a probe launched in 2018 after it received a tip-off about the transfer of criminal assets, with the agency accusing Zhang of orchestrating a large-scale fraud in China between 2014 and 2017 that defrauded more than 128,000 victims. According to Sky News, Zhang was arrested in April 2024.

    DFIR Retainer Services

    The scheme essentially duping victims, mostly between 50 and 75 years old, into investing their funds with false promises of daily dividends and guaranteed profits, after which the proceeds are converted into Bitcoin.

    “She then fled China using false documents and entered the U.K., where in September 2018 she attempted to launder the proceeds via purchasing property, with the assistance of an assailant, Jian Wen,” the agency noted.

    Wen was also jailed for six years and eight months last May for her role in the operation, which involved facilitating the movement of a cryptocurrency wallet that contained 150 Bitcoin, then valued at £1.7 million ($2.28 million). Earlier this January, Wen was ordered to pay back more than £3.1 million ($4.16 million) or face extra time in jail.

    Operation Contender 3.0 Targets Romance Scams and Sextortion in 14 African Countries

    The development comes as INTERPOL said authorities in 14 African countries arrested 260 suspects and seized 1,235 electronic devices as part of a coordinated international operation dubbed Contender 3.0 that took place between July 28 and August 11, 2025, to tackle cyber-enabled crime.

    Countries that participated in the activity included Angola, Benin, Burkina Faso, Cote d’Ivoire, Gambia, Ghana, Guinea, Kenya, Nigeria, Rwanda, Senegal, South Africa, Uganda, and Zambia.

    “The crackdown targeted transnational criminal networks exploiting digital platforms, particularly social media, to manipulate victims and defraud them financially,” it said. “Specifically, the operation focused on romance scams, where perpetrators build online relationships to extract money from victims, and sextortion, in which victims are blackmailed with explicit images or videos.”

    The illicit activities have claimed 1,463 victims, resulting in losses of $2.8 million. The arrests were carried out in Ghana, Senegal, Cote d’Ivoire, and Angola. The suspects were found to use fake profiles, forged identities, and stolen images to deceive victims and pull off the scams and, in some cases, trick individuals into sharing intimate images.

    CIS Build Kits

    Alongside the arrests, USB drives, SIM cards, and forged documents used by the suspects to support their criminal activities were seized by officials. It also resulted in the dismantling of 81 cybercrime infrastructures across the continent.

    Group-IB, which was one of the private sector entities to support the operation along with Trend Micro, said it provided intelligence on the perpetrators who targeted and interacted with victims of romance scams and digital sextortion. It also said it shared details regarding the payment data used by these criminals in their extortion attempts.

    “Cybercrime units across Africa are reporting a sharp rise in digital-enabled crimes such as sextortion and romance scams,” Cyril Gout, acting executive director of Police Services at INTERPOL, said. “The growth of online platforms has opened new opportunities for criminal networks to exploit victims, causing both financial loss and psychological harm.”


    Source: thehackernews.com…

  • Evolving Enterprise Defense to Secure the Modern AI Supply Chain

    Evolving Enterprise Defense to Secure the Modern AI Supply Chain

    Sep 30, 2025The Hacker NewsArtificial Intelligence / Data Protection

    The world of enterprise technology is undergoing a dramatic shift. Gen-AI adoption is accelerating at an unprecedented pace, and SaaS vendors are embedding powerful LLMs directly into their platforms. Organizations are embracing AI-powered applications across every function, from marketing and development to finance and HR. This transformation unlocks innovation and efficiency, but it also introduces new risks. Enterprises must balance the promise of AI with the responsibility to protect their data, maintain compliance, and secure their expanding application supply chain.

    The New Risk Landscape

    With AI adoption comes a new set of challenges:

    • AI Sprawl: Employees adopt AI tools independently, often without security oversight, creating blind spots and unmanaged risks.
    • Supply Chain Vulnerabilities: interapplication integrations between AI tools and enterprise resources expand the attack surface and introduce dependencies and access paths enterprises can’t easily control.
    • Data Exposure Risks: Sensitive information is increasingly shared with external AI services, raising concerns about leakage, misuse, or unintentional data retention.

    This evolving risk landscape makes clear that AI security requires more than traditional defenses.

    AI Demands a New Security Paradigm

    AI is transforming the enterprise landscape at an unprecedented pace, bringing both opportunity and risk. As organizations adopt AI-powered applications across departments, the uncontrolled spread of these tools creates blind spots, increases supply chain vulnerabilities, and raises the likelihood of data exposure. Traditional defenses were not designed to handle the speed, scale, and complexity of this new reality, leaving enterprises exposed. To address these challenges, a new security paradigm is essential, one grounded in continuous discovery, real-time monitoring, adaptive risk assessment, and governance. This approach provides the visibility needed to understand AI usage, the controls to mitigate risk, and the resilience to secure the entire AI application supply chain in today’s fast-changing enterprise environment.

    Securing the AI supply chain with Wing Security

    Wing Security delivers the visibility and control needed to manage sprawl, mitigate threats, and secure the AI supply chain. By extending its proven SaaS Security Posture Management (SSPM) foundation to address the unique risks of AI adoption, its broad integrations and continuous discovery, Wing identifies every AI application in use across the enterprise. Advanced analytics over vendor data and audit logs provide real-time insights into application misuse, risks of data exposure, and which third-party dependencies expand the attack surface. Wing then applies adaptive risk assessments and governance controls to ensure safe, compliant usage. This approach enables enterprises to innovate confidently with AI while reducing exposure to supply chain attacks, breaches, and regulatory violations.

    Seizing the benefits of AI without sacrificing control or security

    Wing Security empowers organizations to capture AI’s full potential without compromising safety. With continuous discovery, Wing identifies both sanctioned and unsanctioned applications and AI tools, shining a light on hidden usage across the enterprise. Advanced analytics provide clear assessments of vendor security and data practices, while governance controls ensure responsible adoption. Real-time monitoring and adaptive risk management protect sensitive information, mitigate threats, and reduce exposure to breaches. By addressing the challenges of Shadow IT and Shadow AI head-on, Wing transforms security into a business enabler, giving enterprises visibility, control, and confidence to innovate at the speed of AI while staying secure and compliant.

    For customers, this focus on AI security translates into real business value:

    • Safe innovation: Employees can adopt AI tools with confidence.
    • Reduced exposure: Lower risk of breaches, supply chain attacks, or accidental data leakage.
    • Regulatory readiness: Stronger governance to meet compliance requirements.
    • Enterprise trust: Strengthened relationships with customers, partners, and regulators.

    With Wing, organizations gain complete visibility, actionable risk insights, and stronger governance over their AI supply chain. This transforms security from a blocker into an enabler, empowering enterprises to innovate at the pace of AI while staying secure, compliant, and in control.

    Securing the Future Work Environment

    The future of our work environment is being reshaped by the rapid adoption of AI-powered applications. While these tools unlock new levels of productivity and innovation, they also create blind spots, Shadow AI risks, and complex supply chain vulnerabilities. Wing Security empowers organizations to embrace this new reality with confidence, delivering complete visibility, real-time monitoring, adaptive risk assessment, and governance across the AI supply chain. By doing so, Wing Security enables enterprises to innovate safely, stay compliant, and build trust in the modern digital workplace.

    Ready to see what’s hiding in your stack? See what Wing can show you.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems

    CISA Sounds Alarm on Critical Sudo Flaw Actively Exploited in Linux and Unix Systems

    Sep 30, 2025Ravie LakshmananVulnerability / Linux

    Critical Sudo Flaw

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting the Sudo command-line utility for Linux and Unix-like operating systems to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

    The vulnerability in question is CVE-2025-32463 (CVSS score: 9.3), which affects Sudo versions prior to 1.9.17p1. It was disclosed by Stratascale researcher Rich Mirch back in July 2025.

    “Sudo contains an inclusion of functionality from an untrusted control sphere vulnerability,” CISA said. “This vulnerability could allow a local attacker to leverage sudo’s -R (–chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.”

    DFIR Retainer Services

    It’s currently not known how the shortcoming is being exploited in real-world attacks, and who may be behind such efforts. Also added to the KEV catalog are four other flaws –

    • CVE-2021-21311 – Adminer contains a server-side request forgery vulnerability that, when exploited, allows a remote attacker to obtain potentially sensitive information. (Disclosed as exploited by Google Mandiant in May 2022 by a threat actor called UNC2903 to target AWS IMDS setups)
    • CVE-2025-20352 – Cisco IOS and IOS XE contain a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. (Disclosed as exploited by Cisco last week)
    • CVE-2025-10035 – Fortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability that allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection. (Disclosed as exploited by watchTowr Labs last week)
    • CVE-2025-59689 – Libraesva Email Security Gateway (ESG) contains a command injection vulnerability that allows command injection via a compressed email attachment. (Disclosed as exploited by Libraesva last week)

    In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies relying on the affected products are advised to apply the necessary mitigations by October 20, 2025, to secure their networks.


    Source: thehackernews.com…

  • EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

    EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations

    Threat actors have been observed using seemingly legitimate artificial intelligence (AI) tools and software to sneakily slip malware for future attacks on organizations worldwide.

    According to Trend Micro, the campaign is using productivity or AI-enhanced tools to deliver malware targeting various regions, including Europe, the Americas, and the Asia, Middle East, and Africa (AMEA) region.

    Manufacturing, government, healthcare, technology, and retail are some of the top sectors affected by the attacks, with India, the U.S., France, Italy, Brazil, Germany, the U.K., Norway, Spain, and Canada emerging as the regions with the most infections, indicating a global spread.

    “This swift, widespread distribution across multiple regions strongly indicates that EvilAI is not an isolated incident but rather an active and evolving campaign currently circulating in the wild,” security researchers Jeffrey Francis Bonaobra, Joshua Aquino, Emmanuel Panopio, Emmanuel Roll, Joshua Lijandro Tsang, Armando Nathaniel Pedragoza, Melvin Singwa, Mohammed Malubay, and Marco Dela Vega said.

    The campaign has been codenamed EvilAI by Trend Micro, describing the attackers behind the operation as “highly capable” owing to their ability to blur the line between authentic and deceptive software for malware distribution and their ability to conceal its malicious features in otherwise functional applications.

    Some of the programs distributed using the method include AppSuite, Epi Browser, JustAskJacky, Manual Finder, OneStart, PDF Editor, Recipe Lister, and Tampered Chef. Some aspects of the campaign were documented in detail by Expel, G DATA, and TRUESEC last month.

    DFIR Retainer Services

    What’s significant about the campaign is the lengths to which the attackers have gone to make these apps appear authentic and ultimately carry out a slew of nefarious activities in the background once installed, without raising any red flags. The deception is further enhanced by the use of signing certificates from disposable companies, as older signatures are revoked.

    “EvilAI disguises itself as productivity or AI-enhanced tools, with professional-looking interfaces and valid digital signatures that make it difficult for users and security tools to distinguish it from legitimate software,” Trend Micro said.

    The end goal of the campaign is to conduct extensive reconnaissance, exfiltrate sensitive browser data, and maintain encrypted, real-time communication with its command-and-control (C2) servers using AES-encrypted channels to receive attacker commands and deploy additional payloads.

    It essentially makes use of several propagation methods, including using newly registered websites that mimic vendor portals, malicious ads, SEO manipulation, and promoted download links on forums and social media.

    EvilAI, per Trend Micro, is used as a stager, chiefly acting as a conduit to gain initial access, establish persistence, and prepare the infected system for additional payloads, while taking steps to enumerate installed security software and hinder analysis.

    “Rather than relying on obviously malicious files, these trojans mimic the appearance of real software to go unnoticed into both corporate and personal environments, often gaining persistent access before raising any suspicion,” the company said. “This dual-purpose approach ensures the user’s expectations are met, further lowering the chance of suspicion or investigation.”

    Further analysis by G GATA has also determined that the threat actors behind OneStart, ManualFinder, and AppSuite are the same and that the server infrastructure is shared for distributing and configuring all these programs.

    “They have been peddling malware disguised as games, print recipe, recipe finder, manual finder, and lately, adding the buzzword ‘AI’ to lure users,” security researcher Banu Ramakrishnan said.

    Expel said the developers behind AppSuite and PDF Editor campaigns have used at least 26 code-signing certificates issued for companies in Panama and Malaysia, among others, over the last seven years to make their software appear legitimate.

    The cybersecurity company is tracking the malware signed using these certificates under the name BaoLoader, adding it’s different from TamperedChef, citing differences in the behavioral differences and the certificate patterns.

    It’s worth noting that the name TamperedChef was first attributed to a malicious recipe application that’s configured to set up a stealthy communication channel with a remote server and receive commands that facilitate data theft.

    CIS Build Kits

    “TamperedChef used code-signing certificates issued to companies in Ukraine and Great Britain while BaoLoader consistently used certificates from Panama and Malaysia,” the company pointed out.

    And that’s not all. Field Effect and GuidePoint Security have since uncovered more digitally signed binaries that masquerade as calendar and image viewer tools, and make use of the NeutralinoJS desktop framework to execute arbitrary JavaScript code and siphon sensitive data.

    “The use of NeutralinoJS to execute JavaScript payloads and interact with native system APIs enabled covert file system access, process spawning, and network communication,” Field Effect said. “The malware’s use of Unicode homoglyphs to encode payloads within seemingly benign API responses allowed it to bypass string-based detection and signature matching.”

    The Canadian cybersecurity company said the presence of several code-signing publishers across multiple samples suggests either a shared malware-as-a-service provider or a code-signing marketplace that facilitates broad distribution.

    “The TamperedChef campaign illustrates how threat actors are evolving their delivery mechanisms by weaponizing potentially unwanted applications, abusing digital code signing, and deploying covert encoding techniques,” it said. “These tactics allow malware to masquerade as legitimate software, bypass endpoint defenses, and exploit user trust.”


    Source: thehackernews.com…

  • ⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More

    ⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More

    Sep 29, 2025Ravie LakshmananCybersecurity / Hacking News

    Cybersecurity never stops—and neither do hackers. While you wrapped up last week, new attacks were already underway.

    From hidden software bugs to massive DDoS attacks and new ransomware tricks, this week’s roundup gives you the biggest security moves to know. Whether you’re protecting key systems or locking down cloud apps, these are the updates you need before making your next security decision.

    Take a quick look to start your week informed and one step ahead.

    ⚡ Threat of the Week

    Cisco 0-Day Flaws Under Attack — Cybersecurity agencies warned that threat actors have exploited two security flaws affecting Cisco firewalls as part of zero-day attacks to deliver previously undocumented malware families like RayInitiator and LINE VIPER. The RayInitiator and LINE VIPER malware represent a significant evolution on that used in the previous campaign, both in sophistication and its ability to evade detection. The activity involves the exploitation of CVE-2025-20362 (CVSS score: 6.5) and CVE-2025-20333 (CVSS score: 9.9) to bypass authentication and execute malicious code on susceptible appliances. The campaign is assessed to be linked to a threat cluster dubbed ArcaneDoor, which was attributed to a suspected China-linked hacking group known as UAT4356 (aka Storm-1849).

    🔔 Top News

    • Nimbus Manticore Uses MiniJunk in Critical Infra Attacks — An Iran-linked cyber-espionage group has expanded its operations beyond its traditional Middle Eastern hunting grounds to target critical infrastructure organizations across Western Europe using constantly improving malware variants and attack tactics. Nimbus Manticore, which overlaps with UNC1549 or Smoke Sandstorm, has been observed targeting defense manufacturing, telecommunications, and aviation companies in Denmark, Portugal, and Sweden. Central to the campaign are MiniJunk, an obfuscated backdoor that gives the attacker persistent access to infected systems, and MiniBrowse, a lightweight stealer with separate versions for stealing credentials from Chrome and Edge browsers. MiniJunk is an updated version of MINIBIKE (aka SlugResin), with the emails directing victims to fake job-related login pages that appear to be associated with companies like Airbus, Boeing, Flydubai, and Rheinmetall. In a further escalation of its tactics, Nimbus Manticore has been observed using the service SSL.com starting around May 2025 to sign their code and pass off malware as legitimate software programs, leading to a “drastic decrease in detections.”
    • ShadowV2 Targets Docker for DDoS Attacks — A novel ShadowV2 bot campaign is turning distributed denial-of-service (DDoS) attacks into a full-blown for-hire business by targeting misconfigured Docker containers on AWS. Instead of relying on prebuilt malicious images, the attackers build containers on the victim’s machine itself to launch a Go-based RAT that can launch DDoS attacks. The exact rationale of the approach is unclear, though Darktrace researchers suggest it may have been a way to reduce forensic traces from importing a malicious container. Once installed, the malware sends a heartbeat signal to the C2 server every second, while also polling for new attack commands every five seconds.
    • Cloudflare Mitigates Largest DDoS Attack on Record — Web performance and security company Cloudflare said its systems blocked a record-breaking distributed denial-of-service (DDoS) attack that peaked at 22.2 terabits per second (Tbps) and 10.6 billion packets per second (Bpps), and lasted only 40 seconds. The attack was aimed at a single IP address of an unnamed European network infrastructure company. It’s believed that the attack may be powered by the AISURU botnet.
    • Vane Viper Linked to Malicious Campaigns Distributing Malware — A high-volume cybercrime operation known as Vane Viper that’s been active for more than a decade is supported by a commercial digital advertising platform with a checkered past. Vane Viper takes advantage of hundreds of thousands of compromised websites and malicious ads that redirect unsuspecting Web users to destinations such as exploit kits, malware, and sketchy websites. The findings suggest that Vane Viper is not acting as an unwitting intermediary but is a complicit enabler and active participant in malicious operations. It also shares parallels with VexTrio Viper in that both emerged from Eastern Europe around 2015 and are controlled by the Russian diaspora in Europe and Cyprus. “URL Solutions, Webzilla, and AdTech Holding form a closely connected trio of firms: domains registered en masse via a registrar steeped in cybercrime, hosted on infrastructure operated by a company that’s hosted everything from Methbot to state-sponsored disinformation, and payloads delivered via an ad network long implicated in malvertising,” Infoblox said. “Not only has PropellerAds turned a ‘blind eye’ to criminal abuse of their platform, but indicators […] suggest – with moderate-to-high confidence – that several ad-fraud campaigns originated from infrastructure attributed to PropellerAds.”
    • 2 New Supermicro BMC Bugs Allow Implanting Malicious Firmware — Servers running on motherboards sold by Supermicro contain medium-severity vulnerabilities that can allow hackers to remotely install malicious firmware that runs even before the operating system, providing unprecedented persistence. That said, the caveat is that the threat actor needs to have administrative access to the BMC control interface to perform the update, or distribute them as part of a supply chain attack by compromising the servers used to host firmware updates and replacing the original images with malicious ones, all while keeping the signature valid. Supermicro said it has updated the BMC firmware to mitigate the vulnerabilities, adding that it’s currently testing and validating affected products. The current status of the update is unknown.

    ‎️‍🔥 Trending CVEs

    Hackers don’t wait. They exploit newly disclosed vulnerabilities within hours, transforming a missed patch or a hidden bug into a critical point of failure. One unpatched CVE is all it takes to open the door to a full-scale compromise. Below are this week’s most critical vulnerabilities, making waves across the industry. Review the list, prioritize patching, and close the window of opportunity before attackers do.

    This week’s list includes — CVE-2025-20362, CVE-2025-20333, CVE-2025-20363 (Cisco), CVE-2025-59689 (Libraesva ESG), CVE-2025-20352 (Cisco IOS), CVE-2025-10643, CVE-2025-10644 (Wondershare RepairIt), CVE-2025-7937, CVE-2025-6198 (Supermicro BMC), CVE-2025-9844 (Salesforce CLI), CVE-2025-9125 (Lectora Desktop), CVE-2025-23298 (NVIDIA Merlin), CVE-2025-59545 (DotNetNuke), CVE-2025-34508 (ZendTo), CVE-2025-27888 (Apache Druid Proxy), CVE-2025-10858, CVE-2025-8014 (GitLab), and CVE-2025-54831 (Apache Airflow).

    📰 Around the Cyber World

    • Microsoft Offers ESU for Free in the E.U. — Microsoft has decided to offer free extended security updates for Windows 10 users in the European Economic Area (EEA), following pressure from the Euroconsumers group. “We are pleased to learn that Microsoft will provide a no-cost Extended Security Updates (ESU) option for Windows 10 consumer users in the European Economic Area (EEA),” Euroconsumers said. In other regions, users will need to either enable Windows Backup or pay $30 for the year or redeem 1,000 Microsoft Reward points. It’s worth noting that Windows 10 reached end of support (EoS) on October 14, 2025.
    • Olymp Loader Spotted in the Wild — A new malware loader called Olymp Loader has been spotted in the wild, being propagated via GitHub repositories, or through tools disguised as popular software such as PuTTY, OpenSSL, Zoom, and even a Counter Strike mod called Classic Offensive. Written in assembly language, the malware-as-a-service (MaaS) solution provides built-in stealer modules, including a custom version of BrowserSnatch that’s available on GitHub. Campaigns using Olymp have been found to deliver an array of information stealers and remote access trojans like Lumma, Raccoon, WebRAT (aka SalatStealer), and Quasar RAT. The tool was first advertised by a seller named OLYMPO in HackForums on June 5, 2025, as a botnet, before evolving into a loader and a crypter. “The malware seller has published a roadmap that treats Olymp as a bundle comprising Olymp Botnet, Olymp Loader, Olymp Crypter, an install service, and a file‑scanning tool for antivirus testing,” Outpost24 said. “It remains to be seen whether OLYMPO can sustain and support a broader malware product suite over time.” Regardless, the emergence of yet another bundled crimeware stack can further lower the entry barrier for less experienced threat actors, allowing them to mount widespread campaigns at scale within a short amount of time.
    • Malicious Facebook Ads Lead to JSCEAL Malware — Cybersecurity researchers have disclosed an ongoing campaign that’s using bogus ads on Facebook and Google to distribute premium versions of trading platforms like TradingView for free. According to Bitdefender, the activity has also expanded to YouTube, where sponsored ads on the platform are being used to direct users to malware-laced downloads that steal credentials and compromise accounts. These ads are posted via legitimate-but-compromised verified YouTube accounts to serve the ads. The attackers take pains to ensure that the hijacked channels mimic the official TradingView channel by reusing the latter’s branding and playlists to build credibility. An unlisted video uploaded by the rebranded channel, titled “Free TradingView Premium – Secret Method They Don’t Want You to Know,” is estimated to have racked up more than 182,000 views through aggressive advertising. “The unlisted status is deliberate, of course. By not being publicly searchable, these malicious videos avoid casual reporting and platform moderation,” Bitdefender said. “Instead, they are shown exclusively through ad placements, ensuring they reach their targets while remaining hidden from public view.” The attacks ultimately led to the deployment of malware known as JSCEAL (aka WEEVILPROXY) to steal sensitive data.
    • LockBit 5.0 Analyzed — The threat actors behind the LockBit ransomware have released a “significantly more dangerous” version, LockBit 5.0, on its sixth anniversary, with advanced obfuscation and anti-analysis techniques, while being capable of targeting Windows, Linux, and ESXi systems. “The 5.0 version also shares code characteristics with LockBit 4.0, including identical hashing algorithms and API resolution methods, confirming this is an evolution of the original codebase rather than an imitation,” Trend Micro said. “The preservation of core functionalities while adding new evasion techniques demonstrates the group’s strategy of incremental improvement to their ransomware platform.” LockBit may not be the most prolific ransomware group it once was ever since its infrastructure was disrupted in a law enforcement operation early last year, but the findings show that it continues to be as aggressive as ever when it comes to refining and retooling its tactics. “The Windows binary uses heavy obfuscation and packing: it loads its payload through DLL reflection while implementing anti-analysis techniques like ETW patching and terminating security services,” the company said. “Meanwhile, the newly discovered Linux variant maintains similar functionality with command-line options for targeting specific directories and file types. The ESXi variant specifically targets VMware virtualization environments, designed to encrypt entire virtual machine infrastructures in a single attack.”
    • Microsoft Blocks Access to Services Used by Israeli Military Unit — Microsoft has revealed that it “ceased and disabled” a set of services to Unit 8200 within the Israel Ministry of Defense (IMOD) that were used to enable mass surveillance of civilians in Gaza and the West Bank. It said it found evidence “relating to IMOD consumption of Azure storage capacity in the Netherlands and the use of AI services.” The secretive contract came to light last month following a report by The Guardian, along with +972 Magazine and Local Call, that revealed how Microsoft’s Azure service was being used to store and process millions of Palestinian civilian phone calls made each day in Gaza and the West Bank. The newspaper reported that the trove of intercepted calls amounted to 8,000 terabytes of data and was held in a Microsoft data center in the Netherlands. The collected data has been moved out of the country and is being planned to be transferred to the Amazon Web Services cloud platform.
    • Ransomware Groups Use Stolen AWS Keys to Breach Cloud — Ransomware gangs are using Amazon Web Services (AWS) keys stored in local environments, such as Veeam backup servers, to pivot to a victim’s AWS account and steal data with the help of the Pacu AWS exploitation framework, turning what started as an on-premise event into a cloud compromise. “Threat actors are becoming increasingly adept at exploiting cloud environments — leveraging compromised AWS keys, targeting backup servers, and using advanced attack frameworks to evade detection,” Varonis said.
    • Meta Unveils Ad-Free Option in the U.K. — Meta has launched an ad-free experience for Facebook and Instagram in the U.K., allowing users to pay £2.99 a month to access the platforms without ads on the web, and £3.99 a month for Android and iOS. “We will notify UK users over the age of 18 that they have the choice to subscribe to Facebook and Instagram for a fee to use these services without seeing ads,” the company said. “A reduced, additional fee of £2/month on the web or £3/month on iOS and Android will automatically apply for each additional account listed in a user’s Account Center.” Meta has significant hurdles in rolling out the scheme in the E.U., causing it to walk back its ad model, offering users the choice to receive “less personalized ads” that are full-screen and temporarily unskippable. Earlier this May, the European Commission said the model does not comply with the Digital Markets Act (DMA) and fined Meta €200 million. In response, the company said it would need to make modifications to the model that “could result in a materially worse user experience for European users and a significant impact.” In a report published in July 2025, privacy non-profit noyb said: “‘Pay or Okay’ has spread throughout the E.U. in recent years and can now be found on hundreds of websites. However, data protection authorities still haven’t adopted a consistent E.U.-wide approach to deal with these systems. They should have agreed on this long ago.”
    • Dutch Teen Duo Arrested Over Alleged ‘Wi-Fi Sniffing’ for Russia — Two teenagers have been arrested in the Netherlands on suspicion of espionage, reportedly on behalf of Russian intelligence agencies. The boys, both aged 17, were arrested on Monday. One has been remanded in custody while the other has been released on home bail. The arrests are related to laws regarding state-sponsored interference, but additional details have been withheld due to the age of the suspects and the ongoing investigation. The teens are alleged to have been tasked with carrying a “Wi-Fi sniffer” along a route past buildings in The Hague, including the headquarters of Europol and Eurojust, as well as several embassies.
    • Akira Ransomware Breaching MFA-Protected SonicWall VPN Accounts — Cybersecurity researchers have warned about an “aggressive” Akira ransomware campaign targeting SonicWall VPNs to rapidly deploy the locker as part of an attack wave that began on July 21, 2025. “In almost all intrusions, ransomware encryption took place in under four hours from initial access, with a staging interval as short as 55 minutes in some instances,” Arctic Wolf said in a new report. Other commonly observed post-exploitation activities include internal network scanning, Impacket SMB activity tied to discovery, Active Directory discovery, and VPN client logins originating from Virtual Private Server (VPS) hosting providers. Targeting firewall and LDAP-synchronized, several intrusions have involved the threat actors leveraging the dedicated account used for Active Directory synchronization to log in via SSL VPN, despite not being intentionally configured for such access. In more than 50% of the analyzed intrusions, login attempts were observed against accounts with the One Time Password (OTP) feature enabled. “Malicious logins were followed within minutes by port scanning, Impacket SMB activity, and rapid deployment of Akira ransomware,” the company noted. “Victims spanned across multiple sectors and organization sizes, suggesting opportunistic mass exploitation.”
    • Four People to Face Trial Over Greece Spyware Scandal — Four individuals, two Israeli and two Greek employees of spyware vendor Intellect, are expected to face trial in Greece over the use of the Predator surveillance tool by the ruling government in 2022 to eavesdrop on judges, senior military officers, journalists, and the opposition. But to date, no government officials have been charged in connection with the scandal.
    • Phishing Emails Lead to DarkCloud Stealer — The information stealer known as DarkCloud is being distributed via phishing emails masquerading as financial correspondence that trick recipients into opening malicious ZIP archives. The stealer, besides adding new layers of encryption and evasion, targets web browser data, keystrokes, FTP credentials, clipboard contents, email clients, files, and cryptocurrency wallets. Stolen credentials/data are sent to attacker-controlled Telegram, FTP, SMTP, or Web Panel (PHP) endpoints. It’s marketed on Telegram by a user named @BluCoder and on the clearnet through the domain darkcloud.onlinewebshop[.]net. It’s advertised as the “best surveillance software for parents, spouses, and employers.” Cybersecurity company eSentire said: “DarkCloud is an information-stealing malware written in VB6 and is actively being updated to target a wide range of applications, including email clients, FTP clients, cryptocurrency wallets, web browsers and supports numerous other information-stealing capabilities like keystroke/clipboard harvesting, clipboard hijacking, and file collection.”
    • Nupay Plugs “Configuration Gap” — Indian fintech company Nupay said it addressed a configuration gap after UpGuard flagged an unprotected Amazon S3 storage bucket containing more than 270,000 documents related to bank transfers of Indian customers. The exposed information included bank account numbers, transaction amounts, names, phone numbers, and email addresses. The data was linked to at least 38 different banks and financial institutions. It’s currently not known how long the data was left publicly accessible on the internet, although misconfigurations of this kind are not uncommon. Nupay told TechCrunch the bucket exposed a “limited set of test records with basic customer details,” and that a majority of the details were “dummy or test files.”
    • Top AI Chatbots Provide Answers with False Claims — Some of the top AI chatbots’ tendency to repeat false claims on topics in the news increased nearly twice as much as they did last year, according to an audit by NewsGuard. The disinformation rates of the chatbots have almost doubled, going from 18% in August 2024 to 35% a year later, with the tools providing false claims to news prompts more than one-third of the time. “Instead of citing data cutoffs or refusing to weigh in on sensitive topics, the LLMs now pull from a polluted online information ecosystem — sometimes deliberately seeded by vast networks of malign actors, including Russian disinformation operations — and treat unreliable sources as credible,” it said.
    • Israel’s PM Says His U.N. Speech Streamed Directly to Gaza Cellphones — Israeli Prime Minister Benjamin Netanyahu said his speech at the United Nations last week was also pushed to mobile phones of Gaza residents in an unprecedented operation. “Ladies and gentlemen, thanks to special efforts by Israeli intelligence, my words are now also being carried,” Netanyahu said. “They’re streamed live through the cell phones of Gaza.” There is no evidence for how it would’ve worked or if this actually took place.
    • Fake Teams Installers Lead to Oyster Malware — Threat actors are abusing SEO poisoning and malvertising to lure users searching for Teams online into downloading a fake installer that leads to malware called Oyster (aka Broomstick or CleanUpLoader). “Oyster is a modular, multistage backdoor that provides persistent remote access, establishes Command and Control (C2) communications, collects host information, and enables the delivery of follow-on payloads,” Blackpoint said. “By hiding behind a widely used collaboration platform, Oyster is well positioned to evade casual detection and blend into the noise of normal enterprise activity.” The activity has been attributed by Conscia to Vanilla Tempest (aka Storm-0832 or Vice Society).
    • Flaw in Streamlit Framework Patched — Cybersecurity researchers discovered a vulnerability in the Streamlit app deployment framework that can allow attackers to hijack underlying cloud servers. “To do that, threat actors bypass file type restrictions and take full control of a misconfigured cloud instance running Streamlit applications,” Cato Networks said. In a hypothetical attack scenario, bad actors can exploit a file upload vulnerability in the framework to rewrite server files and deploy new SSH configurations. Streamlit released a security patch in March.

    🎥 Cybersecurity Webinars

    • Beyond the Hype: Practical AI Workflows for Cybersecurity Teams — AI is transforming cybersecurity workflows, but the best results come from blending human oversight with automation. In this webinar, Thomas Kinsella of Tines shows how to pinpoint where AI truly adds value, avoid over-engineering, and build secure, auditable processes that scale.
    • Halloween Special: Real Breach Stories and the Fix to End Password Horrors — Passwords are still a prime target for attackers—and a constant pain for IT teams. Weak or reused credentials, frequent helpdesk resets, and outdated policies expose organizations to costly breaches and reputational damage. In this Halloween-themed webinar from The Hacker News and Specops Software, you’ll see real breach stories, discover why traditional password policies fail, and watch a live demo on blocking compromised credentials in real time—so you can end password nightmares without adding user friction.
    • From Code to Cloud: Learn How to See Every Risk, Fix Every Weak Link — Modern AppSec needs end-to-end visibility from code to cloud. Without it, hidden flaws delay fixes and raise risk. This webinar shows how code-to-cloud mapping unites dev, DevOps, and security to prioritize and remediate faster, forming the backbone of effective ASPM.

    🔧 Cybersecurity Tools

    • Pangolin — It is a self-hosted reverse proxy that securely exposes private services to the internet without opening firewall ports. It creates encrypted WireGuard tunnels to connect isolated networks and includes built-in identity and access management, so you can control who reaches your internal apps, APIs, or IoT devices. Ideal for developers, DevOps teams, or organizations needing safe remote access, Pangolin simplifies sharing internal resources while keeping them protected behind strong authentication and role-based permissions.
    • AI Red Teaming Playground — Microsoft’s AI Red Teaming Playground Labs offers hands-on challenges to practice probing AI systems for security gaps. Built on Chat Copilot and powered by the open-source PyRIT framework, it lets you simulate prompt injections and other adversarial attacks to identify hidden risks in generative AI before deployment.

    Disclaimer: The tools featured here are provided strictly for educational and research purposes. They have not undergone full security audits, and their behavior may introduce risks if misused. Before experimenting, carefully review the source code, test only in controlled environments, and apply appropriate safeguards. Always ensure your usage aligns with ethical guidelines, legal requirements, and organizational policies.

    🔒 Tip of the Week

    Hardening Active Directory Against Modern Attacks — Active Directory is a prime target—compromise it and attackers can own your network. Strengthen its defenses starting with Kerberos FAST (Flexible Authentication Secure Tunneling), which encrypts pre-authentication traffic to block offline password cracking and relay attacks. Deploy it in “Supported” mode, monitor KDC events (IDs 34, 35), then enforce “Required” once all clients are ready.

    Run PingCastle for a rapid forest health check and use ADeleg/ADeleginator to uncover dangerous over-delegation in OUs or service accounts. Harden password security with Fine-Grained Password Policies (FGPP) and automate local admin password rotation using LAPS or Lithnet Password Protection to block breached credentials in real time.

    Tighten other control layers: use AppLocker Inspector/Gen to lock down application execution and GPOZaurr to detect orphaned or risky Group Policy Objects. Scan AD Certificate Services with Locksmith to close misconfigurations and use ScriptSentry to catch malicious logon scripts that enable stealthy persistence.

    Finally, apply CIS or Microsoft security baselines and generate custom Attack Surface Reduction rules with ASRGen to block exploit techniques that bypass standard policies. This layered, rarely implemented strategy raises the cost of compromise and forces even advanced adversaries to work far harder.

    Conclusion

    These headlines show how tightly connected our defenses must be in today’s threat landscape. No single team, tool, or technology can stand alone—strong security depends on shared awareness and action.

    Take a moment to pass these insights along, spark a conversation with your team, and turn this knowledge into concrete steps. Every patch applied, policy updated, or lesson shared strengthens not just your own organization, but the wider cybersecurity community we all rely on.


    Source: thehackernews.com…

  • The State of AI in the SOC 2025 – Insights from Recent Study 

    The State of AI in the SOC 2025 – Insights from Recent Study 

    Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points.

    A comprehensive survey of 282 security leaders at companies across industries reveals a stark reality facing modern Security Operations Centers: alert volumes have reached unsustainable levels, forcing teams to leave critical threats uninvestigated. You can download the full report here. The research, conducted primarily among US-based organizations, shows that AI adoption in security operations has shifted from experimental to essential as teams struggle to keep pace with an ever-growing stream of security alerts.

    The findings paint a picture of an industry at a tipping point, where traditional SOC models are buckling under operational pressure and AI-powered solutions are emerging as the primary path forward.

    Alert Volume Reaches Breaking Point

    Security teams are drowning in alerts, with organizations processing an average of 960 alerts per day. Large enterprises face an even more daunting reality, handling over 3,000 daily alerts from an average of 30 different alert-generating security tools.

    This volume creates a fundamental operational crisis where security teams must make difficult detection and investigation decisions under extreme time pressure. The survey reveals that alert fatigue has evolved beyond an emotional burden to become a measurable operational risk.

    Investigations Remain Slow and Manual

    The sheer mathematics of alert processing exposes the problem’s scale. The survey results revealed that it takes an average of 70 minutes to fully investigate an alert, that is, if someone can find the time to look at it. According to the survey, a full 56 minutes pass on average before anyone acts on an alert. This impossibility forces difficult choices about which alerts receive attention and which get ignored.

    The survey results have unequivocally demonstrated a critical and well-known challenge within Security Operations Centers (SOCs): the sheer volume of alerts generated daily far exceeds the capacity of human analysts to investigate them thoroughly. Compounding the problem, modern security stacks and data sources continue to grow in number and complexity, leading to longer investigation times.

    For high-priority incidents requiring immediate attention, these timeframes represent unacceptable delays that can compound breach severity. According to the latest CrowdStrike Cyber Threat Report, it only takes 48 minutes on average for a cyber threat like a Business Email Compromise to result in an incident.

    The Hidden Cost of Overwhelmed SOCs

    This overwhelming influx creates an impossible dilemma, forcing SOC teams to make difficult and often risky choices about which alerts receive attention and which are, by necessity, ignored. The consequence of this impossible situation is a heightened risk of missing genuine threats amidst the noise, ultimately compromising an organization’s security posture.

    40% of security alerts go completely uninvestigated due to volume and resource constraints. Even more troubling, 61% of security teams admitted to ignoring alerts that later proved to be critical security incidents.

    This statistic represents a fundamental breakdown in security operations. Teams designed to protect organizations are systematically unable to examine nearly half of the potential threats they detect. The survey reveals that this isn’t negligence but rather a forced adaptation to impossible workload demands.

    SOC Teams Struggle with 24/7 Operations

    The survey exposes critical gaps in round-the-clock security coverage. Many organizations lack sufficient staffing to maintain effective 24/7 SOC operations, creating vulnerability windows during off-hours when skeleton crews handle the same alert volumes that overwhelm full-strength day shifts.

    Analyst burnout has become a quantifiable problem rather than just an HR concern. Teams report that suppressing detection rules has become a default coping mechanism when alert volumes become unmanageable. This approach reduces immediate workload but potentially creates blind spots in security coverage.

    The staffing challenges are compounded by the specialized nature of security analysis work. Organizations cannot easily scale their teams to match alert volume growth, particularly given the shortage of experienced cybersecurity professionals in the current job market.

    The Hacker News

    AI transitions from experiment to strategic priority

    AI for security operations has rapidly climbed the priority ladder, now ranking as a top-three initiative alongside core security programs like cloud security and data security. This signals a fundamental shift in how security leaders view AI as a critical enabler for operational success today.

    Currently, 55% of security teams already deploy AI copilots and assistants in production to support alert triage and investigation workflows.

    The next wave of adoption is coming fast. Among teams not yet using AI, 60% plan to evaluate AI-powered SOC solutions within the year. And looking ahead, 60% of all SOC workloads are expected to be handled by AI in the next three years, according to the survey.

    Organizations seek AI for core investigative tasks

    Security teams have identified where AI can make the biggest immediate difference. Triage tops the list at 67%, followed closely by detection tuning (65%) and threat hunting (64%).

    These priorities reflect a growing desire to apply AI to the early stages of investigation and surfacing meaningful alerts while providing initial context, and offloading repetitive analysis. It’s not about automating away human judgment, but about accelerating workflows and sharpening human focus.

    Barriers Remain but Momentum is Clear

    Despite strong adoption intentions, security leaders identify meaningful barriers to AI implementation. Data privacy concerns, integration complexity, and explainability requirements top the list of organizational hesitations.

    The Future SOC Takes Shape

    The survey data reveals a clear trajectory toward hybrid security operations where AI handles routine analysis tasks and human analysts focus on complex investigations and strategic decision-making. This evolution promises to address both the volume problem and analyst burnout simultaneously.

    Success metrics for this transformation will likely center on operational efficiency improvements. Organizations will measure progress through reduced Mean Time to Investigation (MTTI) and Mean Time to Response (MTTR) in addition to traditional alert closure rates. Other meaningful success metrics include using AI to upskill and train new SOC Analyst and dramatically accelerate ramp up time.

    By ensuring comprehensive alert coverage through AI augmentation, organizations can reduce the risk tolerance currently forced by volume constraints. The future SOC will investigate more alerts more thoroughly while requiring less manual effort from human analysts.

    How Prophet Security Helps Customers

    Prophet Security helps organizations move beyond manual investigations and alert fatigue with an agentic AI SOC platform that automates triage, accelerates investigations, and ensures every alert gets the attention it deserves. By integrating across the existing stack, Prophet AI improves analyst efficiency, reduces incident dwell time, and delivers more consistent security outcomes. Security leaders use Prophet AI to maximize the value of their people and tools, strengthen their security posture, and turn daily SOC operations into measurable business results. Visit Prophet Security to learn more or request a demo and see how Prophet AI can elevate your SOC operations.

    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security

    Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security

    Microsoft Flags AI-Driven Phishing

    Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses.

    “Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and a synthetic structure to disguise its malicious intent,” the Microsoft Threat Intelligence team said in an analysis published last week.

    The activity, detected on August 28, 2025, shows how threat actors are increasingly adopting artificial intelligence (AI) tools into their workflows, often with the goal of crafting more convincing phishing lures, automating malware obfuscation, and generating code that mimics legitimate content.

    In the attack chain documented by the Windows maker, bad actors have been observed leveraging an already compromised business email account to send phishing messages to steal victims’ credentials. The messages feature lure masquerading as a file-sharing notification to entice them into opening what ostensibly appears to be a PDF document, but, in reality, is a Scalable Vector Graphics (SVG) file.

    What’s notable about the messages is that the attackers make use of a self-addressed email tactic, where the sender and recipient addresses match, and the actual targets were hidden in the BCC field so as to bypass basic detection heuristics.

    DFIR Retainer Services

    “SVG files (Scalable Vector Graphics) are attractive to attackers because they are text-based and scriptable, allowing them to embed JavaScript and other dynamic content directly within the file,” Microsoft said. “This makes it possible to deliver interactive phishing payloads that appear benign to both users and many security tools.”

    On top of that, the fact that SVG file format supports features such as invisible elements, encoded attributes, and delayed script execution makes it ideal for adversaries looking to sidestep static analysis and sandboxing, it added.

    The SVG file, once launched, redirects the user to a page that serves a CAPTCHA for security verification, completing which, they are likely taken to a fake login page to harvest their credentials. Microsoft said the exact next stage is unclear due to its systems flagging and neutralizing the threat.

    But where the attack stands apart is when it comes to its unusual obfuscation approach that uses business-related language to disguise the phishing content in the SVG file — a sign that it may have been generated using an LLM.

    “First, the beginning of the SVG code was structured to look like a legitimate business analytics dashboard,” Microsoft said. “This tactic is designed to mislead anyone casually inspecting the file, making it appear as if the SVG’s sole purpose is to visualize business data. In reality, though, it’s a decoy.”

    The second aspect is that the payload’s core functionality – which is to redirect users to the initial phishing landing page, trigger browser fingerprinting, and initiate session tracking – is also obscured using a long sequence of business-related terms such as revenue, operations, risk, quarterly, growth, or shares.

    Microsoft said it ran the code against its Security Copilot, which found that the program was “not something a human would typically write from scratch due to its complexity, verbosity, and lack of practical utility.” Some of the indicators it used to arrive at the conclusion include the use of –

    • Overly descriptive and redundant naming for functions and variables
    • Highly modular and over-engineered code structure
    • Generic and verbose comments
    • Formulaic techniques to achieve obfuscation using business terminology
    • CDATA and XML declaration in the SVG file, likely in an attempt to mimic documentation examples

    “While this campaign was limited in scope and effectively blocked, similar techniques are increasingly being leveraged by a range of threat actors,” Microsoft said.

    The disclosure comes as Forcepoint detailed a multi-stage attack sequence that uses phishing emails with .XLAM attachments to execute shellcode that ultimately deploys XWorm RAT by means of a secondary payload, while simultaneously displaying a blank or corrupted Office file as a ruse. The secondary payload functions as a conduit to load a .DLL file in memory.

    CIS Build Kits

    “The second stage .DLL file from memory uses heavily obfuscated packing and encryption techniques,” Forcepoint said. “This second stage .DLL file loaded another .DLL file in memory again using reflective DLL injection which was further responsible for final execution of malware.”

    “The next and final step performs a process injection in its own main executable file, maintaining persistence and exfiltrating data to its command-and-control servers. The C2s where data was exfiltrated was found to be related to XWorm family.”

    In recent weeks, phishing attacks have also employed lures related to the U.S. Social Security Administration and copyright infringement to distribute ScreenConnect ConnectWise and information stealers such as Lone None Stealer and PureLogs Stealer, respectively, per Cofense.

    “The campaign typically spoofs various legal firms claiming to request the takedown of copyright-infringing content on the victim’s website or social media page,” the email security company said of the second set of attacks. “This campaign is notable for its novel use of a Telegram bot profile page to deliver its initial payload, obfuscated compiled Python script payloads, and evolving complexity as seen through multiple iterations of campaign samples.”


    Source: thehackernews.com…

  • First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

    First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

    Sep 29, 2025Ravie LakshmananMCP Server / Vulnerability

    Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted in the wild, raising software supply chain risks.

    According to Koi Security, a legitimate-looking developer managed to slip in rogue code within an npm package called “postmark-mcp” that copied an official Postmark Labs library of the same name. The malicious functionality was introduced in version 1.0.16, which was released on September 17, 2025.

    The actual “postmark-mcp” library, available on GitHub, exposes an MCP server to allow users to send emails, access and use email templates, and track campaigns using artificial intelligence (AI) assistants.

    DFIR Retainer Services

    The npm package in question has since been deleted from npm by the developer “phanpak,” who uploaded it to the repository on September 15, 2025, and maintains 31 other packages. The JavaScript library attracted a total of 1,643 downloads.

    “Since version 1.0.16, it’s been quietly copying every email to the developer’s personal server,” Koi Security Chief Technology Officer Idan Dardikman said. “This is the world’s first sighting of a real-world malicious MCP server. The attack surface for endpoint supply chain attacks is slowly becoming the enterprise’s biggest attack surface.”

    The malicious package is a replica of the original library, save for a one-line change added in version 1.0.16 that essentially forwards every email sent using the MCP server to the email address “phan@giftshop[.]club” by BCC’ing it, potentially exposing sensitive communications.

    “The postmark-mcp backdoor isn’t sophisticated – it’s embarrassingly simple,” Dardikman said. “But it perfectly demonstrates how completely broken this whole setup is. One developer. One line of code. Thousands upon thousands of stolen emails.”

    Developers who have installed the npm package are recommended to immediately remove it from their workflows, rotate any credentials that may have been exposed through email, and review email logs for BCC traffic to the reported domain.

    CIS Build Kits

    “MCP servers typically run with high trust and broad permissions inside agent toolchains. As such, any data they handle can be sensitive (password resets, invoices, customer communications, internal memos, etc.),” Snyk said. “In this case, the backdoor in this MCP Server was built with the intention to harvest and exfiltrate emails for agentic workflows that relied on this MCP Server.”

    The findings illustrate how threat actors continue to abuse the user trust associated with the open-source ecosystem and the nascent MCP ecosystem to their advantage, especially when they are rolled out in business critical environments without adequate guardrails.


    Source: thehackernews.com…

  • Researchers Expose Phishing Threats Distributing CountLoader and PureRAT

    Researchers Expose Phishing Threats Distributing CountLoader and PureRAT

    Sep 26, 2025Ravie LakshmananMalware / Cryptocurrency

    SVG and PureRAT Phishing

    A new campaign has been observed impersonating Ukrainian government agencies in phishing attacks to deliver CountLoader, which is then used to drop Amatera Stealer and PureMiner.

    “The phishing emails contain malicious Scalable Vector Graphics (SVG) files designed to trick recipients into opening harmful attachments,” Fortinet FortiGuard Labs researcher Yurren Wan said in a report shared with The Hacker News.

    In the attack chains documented by the cybersecurity company, the SVG files are used to initiate the download of a password-protected ZIP archive, which contains a Compiled HTML Help (CHM) file. The CHM file, when launched, activates a chain of events that culminate in the deployment of CountLoader. The email messages claim to be a notice from the National Police of Ukraine.

    CountLoader, which was the subject of a recent analysis by Silent Push, has been found to drop various payloads like Cobalt Strike, AdaptixC2, and PureHVNC RAT. In this attack chain, however, it serves as a distribution vector for Amatera Stealer, a variant of ACRStealer, and PureMiner, a stealthy .NET cryptocurrency miner.

    DFIR Retainer Services

    It’s worth pointing out that both PureHVNC RAT and PureMiner are part of a broader malware suite developed by a threat actor known as PureCoder. Some of the other products from the same author include –

    • PureCrypter, a crypter for Native and .NET
    • PureRAT (aka ResolverRAT), a successor to PureHVNC RAT
    • PureLogs, an information stealer and logger
    • BlueLoader, a malware that can act as a botnet by downloading and executing payloads remotely
    • PureClipper, a clipper malware that substitutes cryptocurrency addresses copied into the clipboard with attacker-controlled wallet addresses to redirect transactions and steal funds

    According to Fortinet, Amatera Stealer and PureMiner are both deployed as fileless threats, with the malware “executed via .NET Ahead-of-Time (AOT) compilation with process hollowing or loaded directly into memory using PythonMemoryModule.”

    Amatera Stealer, once launched, gathers system information, collects files matching a predefined list of extensions, and harvests data from Chromium- and Gecko-based browsers, as well as applications like Steam, Telegram, FileZilla, and various cryptocurrency wallets.

    “This phishing campaign demonstrates how a malicious SVG file can act as an HTML substitute to initiate an infection chain,” Fortinet said. In this case, attackers targeted Ukrainian government entities with emails containing SVG attachments. The SVG-embedded HTML code redirected victims to a download site.”

    The development comes as Huntress uncovered a likely Vietnamese-speaking threat group using phishing emails bearing copyright infringement notice themes to trick recipients into launching ZIP archives that lead to the deployment of PXA Stealer, which then evolves into a multi-layered infection sequence dropping PureRAT.

    CIS Build Kits

    “This campaign demonstrates a clear and deliberate progression, starting with a simple phishing lure and escalating through layers of in-memory loaders, defense evasion, and credential theft,” security researcher James Northey said. “The final payload, PureRAT, represents the culmination of this effort: a modular, professionally developed backdoor that gives the attacker complete control over a compromised host.”

    “Their progression from amateurish obfuscation of their Python payloads to abusing commodity malware like PureRAT shows not just persistence, but also hallmarks of a serious and maturing operator.”


    Source: thehackernews.com…