Category: Cybersecurity

  • CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet

    CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet

    Jun 26, 2025Ravie LakshmananVulnerability / Firmware Security

    CISA Adds 3 Flaws to KEV Catalog

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Fortinet FortiOS, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation.

    The list of vulnerabilities is as follows –

    • CVE-2024-54085 (CVSS score: 10.0) – An authentication bypass by spoofing vulnerability in the Redfish Host Interface of AMI MegaRAC SPx that could allow a remote attacker to take control
    • CVE-2024-0769 (CVSS score: 5.3) – A path traversal vulnerability in D-Link DIR-859 routers that allows for privilege escalation and unauthorized control (Unpatched)
    • CVE-2019-6693 (CVSS score: 4.2) – A hard-coded cryptographic key vulnerability in FortiOS, FortiManager and FortiAnalyzer that’s used to encrypt password data in CLI configuration, potentially allowing an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data

    Firmware security company Eclypsium, which disclosed CVE-2024-54085 earlier this year, said the flaw could be exploited to carry out a wide-range of malicious actions, including deploying malware and tampering with device firmware.

    Cybersecurity

    There are currently no details on how the shortcoming is being weaponized in the wild, who may be exploiting it, and the scale of the attacks. The Hacker News has reached out to Eclypsium for comment, and we will update the story if we get a response.

    The exploitation of CVE-2024-0769 was revealed by threat intelligence firm GreyNoise exactly a year ago as part of a campaign designed to dump account names, passwords, groups, and descriptions for all users of the device.

    It’s worth noting that D-Link DIR-859 routers have reached end-of-life (EoL) as of December 2020, meaning the vulnerability will remain unpatched on these devices. Users are advised to retire and replace the product.

    As for the abuse of CVE-2019-6693, multiple security vendors have reported that threat actors linked to the Akira ransomware scheme have leveraged the vulnerability to obtain initial access to target networks.

    In light of the active exploitation of these flaws, Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary mitigations by July 16, 2025, to secure their networks.

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews

    WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews

    Jun 26, 2025Ravie LakshmananArtificial Intelligence / Data Protection

    Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution Meta AI to summarize unread messages in chats.

    The feature, called Message Summaries, is currently rolling out in the English language to users in the United States, with plans to bring it to other regions and languages later this year.

    It “uses Meta AI to privately and quickly summarize unread messages in a chat, so you can get an idea of what is happening, before reading the details in your unread messages,” WhatsApp said in a post.

    Message Summaries is optional and is disabled by default. The Meta-owned service said users can also enable “Advanced Chat Privacy” to choose which chats can be shared for providing AI-related features.

    Cybersecurity

    Most importantly, it’s made possible by Private Processing, which WhatsApp launched back in April as a way to enable AI capabilities in a privacy-preserving manner.

    Private Processing is designed to process AI requests within a secure environment called the confidential virtual machine (CVM) on the cloud by establishing a secure application session between a user’s device and the Trusted Execution Environment (TEE) over an Oblivious HTTP (OHTTP) connection.

    The company reiterated that the technology prevents any third-party, including Meta and WhatsApp, from having to see the actual message contents to generate the summaries.

    “No one else in the chat can see that you summarized unread messages either,” it said. “This means your privacy is protected at all times.”

    The development comes as the U.S. House of Representatives added WhatsApp to a list of apps banned from government-issued devices, citing security concerns.

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery

    nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery

    Jun 25, 2025Ravie LakshmananSaaS Security / Vulnerability

    New research has uncovered continued risk from a known security weakness in Microsoft’s Entra ID, potentially enabling malicious actors to achieve account takeovers in susceptible software-as-a-service (SaaS) applications.

    Identity security company Semperis, in an analysis of 104 SaaS applications, found nine of them to be vulnerable to Entra ID cross-tenant nOAuth abuse.

    First disclosed by Descope in June 2023, nOAuth refers to a weakness in how SaaS applications implement OpenID Connect (OIDC), which refers to an authentication layer built atop OAuth to verify a user’s identity.

    The authentication implementation flaw essentially allows a bad actor to change the mail attribute in the Entra ID account to that of a victim’s and take advantage of the app’s “Log in with Microsoft” feature to hijack that account.

    Cybersecurity

    The attack is trivial, but it also works because Entra ID permits users to have an unverified email address, opening the door to user impersonation across tenant boundaries.

    It also exploits the fact that an app using multiple identity providers (e.g., Google, Facebook, or Microsoft) could inadvertently allow an attacker to sign in to a target user’s account simply because the email address is used as the sole criteria to uniquely identify users and merge accounts.

    Semperis’ threat model focuses on a variant of nOAuth, specifically finding applications that allow for Entra ID cross-tenant access. In other words, both the attacker and the victim are on two different Entra ID tenants.

    “nOAuth abuse is a serious threat that many organizations may be exposed to,” Eric Woodruff, chief identity architect at Semperis, said. “It’s low effort, leaves almost no trace and bypasses end‑user protections.”

    “An attacker that successfully abuses nOAuth would be able not only to gain access to the SaaS application data, but also potentially to pivot into Microsoft 365 resources.”

    Semperis said it reported the findings to Microsoft in December 2024, prompting the Windows maker to reiterate recommendations it gave back in 2023, coinciding with the public disclosure of nOAuth. It also noted that vendors that do not comply with the guidelines risk getting their apps removed from the Entra App Gallery.

    Microsoft has also emphasized that the use of claims other than subject identifier (referred to as the “sub” claim) to uniquely identify an end user in OpenID Connect is non-compliant.

    “If an OpenID Connect relying party uses any other claims in a token besides a combination of the sub (subject) claim and the iss (issuer) claim as a primary account identifier in OpenID Connect, they’re breaking the contract of expectations between federated identity provider and relying party,” the company noted at that time.

    Mitigating nOAuth ultimately rests in the hands of developers, who must properly implement authentication to prevent account takeovers by creating a unique, immutable user identifier.

    “nOAuth abuse exploits cross-tenant vulnerabilities and can lead to SaaS application data exfiltration, persistence, and lateral movement,” the company said. “The abuse is difficult for customers of vulnerable applications to detect and impossible for customers of vulnerable applications to defend against.”

    Cybersecurity

    The disclosure comes as Trend Micro revealed that misconfigured or overly privileged containers in Kubernetes environments can be used to facilitate access to sensitive Amazon Web Services (AWS) credentials, enabling attackers to conduct follow-on activities.

    The cybersecurity company said attackers can exploit excessive privileges granted to containers using methods like packet sniffing of unencrypted HTTP traffic to access plaintext credentials and API spoofing, which uses manipulated Network Interface Card (NIC) settings to intercept Authorization tokens and gain elevated privileges.

    “The findings […] highlight critical security considerations when using Amazon EKS Pod Identity for simplifying AWS resource access in Kubernetes environments,” security researcher Jiri Gogela said.

    “These vulnerabilities underscore the importance of adhering to the principle of least privilege, ensuring container configurations are scoped appropriately, and minimizing opportunities for exploitation by malicious actors.”

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC

    Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC

    Jun 25, 2025Ravie LakshmananVulnerability / Network Security

    Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has been exploited in the wild.

    The vulnerability, tracked as CVE-2025-6543, carries a CVSS score of 9.2 out of a maximum of 10.0.

    It has been described as a case of memory overflow that could result in unintended control flow and denial-of-service. However, successful exploitation requires the appliance to be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

    The shortcoming impacts the below versions –

    • NetScaler ADC and NetScaler Gateway 14.1 prior to 14.1-47.46
    • NetScaler ADC and NetScaler Gateway 13.1 prior to 13.1-59.19
    • NetScaler ADC and NetScaler Gateway 12.1 and 13.0 (vulnerable and end-of-life)
    • NetScaler ADC 13.1-FIPS and NDcPP prior to 13.1-37.236-FIPS and NDcPP
    Cybersecurity

    “Secure Private Access on-prem or Secure Private Access Hybrid deployments using NetScaler instances are also affected by the vulnerabilities,” Citrix said.

    “Customers need to upgrade these NetScaler instances to the recommended NetScaler builds to address the vulnerabilities.”

    The company did not reveal how the flaw is being exploited in real-world attacks, but said “exploits of CVE-2025-6543 on unmitigated appliances have been observed.”

    The disclosure comes shortly after Citrix patched another critical-rated security flaw in NetScaler ADC (CVE-2025-5777, CVSS score: 9.3) that could be exploited by threat actors to gain access to susceptible appliances.

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure

    Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure

    Jun 25, 2025Ravie LakshmananData Privacy / Vulnerability

    Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could have enabled attackers to access sensitive information under certain conditions.

    The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for January 2025.

    “The research discovered that SAP GUI input history is stored insecurely, both in the Java and Windows versions,” Pathlock researcher Jonathan Stross said in a report shared with The Hacker News.

    SAP GUI user history allows users to access previously entered values in input fields with the goal of saving time and reducing errors. This historical information is stored locally on devices. This can include usernames, national IDs, social security numbers (SSNs), bank account numbers, and internal SAP table names.

    Cybersecurity

    The vulnerabilities identified by Pathlock are rooted in this input history feature, allowing an attacker with administrative privileges or access to the victim’s user directory on the operating system to access the data within a predefined directory based on the SAP GUI variant.

    • SAP GUI for Windows – %APPDATA%LocalLowSAPGUICacheHistorySAPHistory<WINUSER>.db
    • SAP GUI for Java – %APPDATA%LocalLowSAPGUICacheHistory or $HOME/.SAPGUI/Cache/History (Windows or Linux) and $HOME/Library/Preferences/SAP/Cache/History (macOS)

    The issue is that the inputs are saved in the database file using a weak XOR-based encryption scheme in the case of SAP GUI for Windows, which makes them trivial to decode with minimal effort. In contrast, SAP GUI for Java stores these historical entries in an unencrypted fashion as Java serialized objects.

    As a result, depending on the user input provided in the past, the disclosed information could include anything between non-critical data to highly sensitive data, thereby impacting the confidentiality of the application.

    “Anyone with access to the computer can potentially access the history file and all sensitive information it stores,” Stross said. “Because the data is stored locally and weakly (or not at all) encrypted, exfiltration through HID injection attacks (like USB Rubber Ducky) or phishing becomes a real threat.”

    To mitigate any potential risks associated with information disclosure, it’s advised to disable the input history functionality and delete existing database or serialized object files from the aforementioned directories.

    Citrix Patches CVE-2025-5777

    The disclosure comes as Citrix patched a critical-rated security flaw in NetScaler (CVE-2025-5777, CVSS score: 9.3) that could be exploited by threat actors to gain access to susceptible appliances.

    The shortcoming stems from insufficient input validation that may enable unauthorized attackers to grab valid session tokens from memory via malformed requests, effectively bypassing authentication protections. However, this only works when Netscaler is configured as a Gateway or AAA virtual server.

    The vulnerability has been codenamed Citrix Bleed 2 by security researcher Kevin Beaumont, owing to its similarities to CVE-2023-4966 (CVSS score: 9.4), which came under active exploitation in the wild two years ago.

    It has been addressed in the following versions –

    • NetScaler ADC and NetScaler Gateway 14.1-43.56 and later releases
    • NetScaler ADC and NetScaler Gateway 13.1-58.32 and later releases of 13.1
    • NetScaler ADC 13.1-FIPS and 13.1-NDcPP 13.1-37.235 and later releases of 13.1-FIPS and 13.1-NDcPP
    • NetScaler ADC 12.1-FIPS 12.1-55.328 and later releases of 12.1-FIPS
    Cybersecurity

    Secure Private Access on-prem or Secure Private Access Hybrid deployments using NetScaler instances are also affected by the vulnerabilities. Citrix is recommending that users run the following commands to terminate all active ICA and PCoIP sessions after all NetScaler appliances have been upgraded –

    kill icaconnection -all
    kill pcoipConnection -all

    The company is also urging customers of NetScaler ADC and NetScaler Gateway versions 12.1 and 13.0 to move to a support version as they are now End Of Life (EOL) and no longer supported.

    While there is no evidence that the flaw has been weaponized, watchTowr CEO Benjamin Harris said it “checks all the boxes” for attacker interest and that exploitation could be around the corner.

    “CVE-2025-5777 is shaping up to be every bit as serious as CitrixBleed, a vulnerability that caused havoc for end-users of Citrix Netscaler appliances in 2023 and beyond as the initial breach vector for numerous high-profile incidents,” Benjamin Harris, CEO at watchTowr, told The Hacker News.

    “The details surrounding CVE-2025-5777 have quietly shifted since its initial disclosure, with fairly important pre-requisites or limitations being removed from the NVD CVE description — specifically, the comment that this vulnerability was in the lesser-exposed Management Interface has now been removed — leading us to believe that this vulnerability is significantly more painful than perhaps first signaled.”

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • Beware the Hidden Risk in Your Entra Environment

    Beware the Hidden Risk in Your Entra Environment

    Guest Account Risk in Entra Environment

    If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk.

    A gap in access control in Microsoft Entra’s subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them.

    All the guest user needs are the permissions to create subscriptions in their home tenant, and an invitation as a guest user into an external tenant. Once inside, the guest user can create subscriptions in their home tenant, transfer them into the external tenant, and retain full ownership rights. This stealthy privilege escalation tactic allows a guest user to gain a privileged foothold in an environment where they should only have limited access.

    Many organizations treat guest accounts as low-risk based on their temporary, limited access, but this behavior, which works as designed, opens the door to known attack paths and lateral movement within the resource tenant. It can allow a threat actor to achieve unauthorized reconnaissance and persistence in the defender’s Entra ID, and advance privilege escalation in certain scenarios.

    Typical threat models and best practices don’t account for an unprivileged guest creating their own subscription within your tenant, so this risk may not only exist outside your organization’s controls; it may be off your security team’s radar as well.

    How to Compromise Your Entra ID Tenant with a Guest User Account

    Guest-made subscription footholds exploit the fact that Microsoft’s billing permissions (Enterprise Agreement or Microsoft Customer Agreement) are scoped at the billing account, not the Entra directory. Most security teams think about Azure permissions as either Entra Directory Roles (such as Global Administrator) or Azure RBAC Roles (such as Owner). But there is another set of permissions that get overlooked: Billing Roles.

    While Entra Directory and Azure RBAC Roles focus on managing permissions around identities and access to resources, Billing roles operate at the billing account level, which exists outside the well-understood Azure tenant authentication and authorization boundaries. A user with the right billing role can spin up or transfer subscriptions from their home tenant to gain control inside a target tenant, and a security team that is strictly auditing Entra Directory roles won’t gain visibility of these subscriptions in a standard Entra permission review.

    When a B2B guest user is invited to a resource tenant, they access the tenant via federation from their home tenant. This is a cost-saving measure, the trade-off being that your tenant cannot enforce auth controls like MFA. As such, defenders usually try to limit the privileges and access of guests as they are inherently less securable. However, if the guest has a valid billing role in their home tenant, they can use it to become a subscription owner inside Azure.

    This is also true for guest users who exist in pay-as-you-go Azure tenants that an attacker could spin up in just a few minutes. And, by default, any user, including guests, can invite external users into the directory. This means an attacker could leverage a compromised account to invite in a user with the correct billing permissions into your environment.

    How an Attacker can Gain Elevated Access Using an Unprivileged Entra Guest Account:

    1. Attacker gets control of a user with a billing role that can create subscriptions / owner of a subscription in a tenant, either by:
      1. Creating their own Entra tenant using an Azure free trial (the user they signed up with will be a Billing Account owner)
      2. Or, by compromising an existing user in a tenant who already has a privileged billing role / subscription ownership
    2. Attacker gets an invite to become a guest user in their target Entra tenant. By default, any user or guest can invite a guest into the tenant.
    3. Attacker logs into the Azure Portal, goes into their own home directory – which they completely control.
    4. Attacker navigates to Subscriptions > Add +.
    5. Attacker switches to the “Advanced” tab and sets the defender’s directory as the target directory.
    6. Attacker creates subscription. No subscription will appear in the attacker tenant. Instead, the subscription appears in the defender tenant, under the root management group.
    7. Attacker will automatically be assigned the RBAC Role of “Owner” for this subscription.

    Real-World Risk: What a Restless Guest Can Do with a New Subscription

    Once an attacker has a subscription with Owner permissions within another organization’s tenant, they can use that access to perform actions that would normally be blocked by their limited role. These include:

    Why Guest Subscription Creation Is a Growing Concern for Entra Security

    While more work is required to understand the true implications of this updated threat model, what we already know is concerning: any guest account federated into your tenant may represent a path to privilege. The risk is not hypothetical. Researchers at BeyondTrust have observed attackers actively abusing guest-based subscription creation in the wild. The threat is present, active, and the real danger here lies in the fact that it’s largely under the radar.

    These actions fall outside what most Azure administrators expect a guest user to be capable of. Most security teams don’t account for guest users being able to create and control subscriptions. As a result, this attack vector often falls outside of typical Entra threat models, making this path to privilege under-recognized, unexpected, and dangerously accessible.

    This attack vector is extremely common in B2B scenarios, where home and resource tenants are often controlled by different organizations. We suspect many organizations leveraging Entra ID B2B Guest features are unaware of the possible paths to privilege that this feature inadvertently enables.

    Mitigations: How to Prevent Guest Subscription Accounts from Gaining a Foothold

    To mitigate this behaviour, Microsoft allows organizations to configure Subscription Policies to block guests from transferring subscriptions into their tenant. This setting restricts subscription creation to explicitly permitted users only, and Microsoft has published supporting documentation[2] for this control.

    In addition to enabling this policy, we recommend the following actions:

    1. Audit all guest accounts in your environment and remove those that are no longer required
    2. Harden guest controls as much as possible: for instance, disable guest-to-guest invitations
    3. Monitor all subscriptions in your tenant regularly to detect unexpected guest-created subscriptions and resources
    4. Monitor all Security Center alerts in the Azure Portal; some may appear even if the visibility is inconsistent
    5. Audit device access, especially if these utilize dynamic group rules.

    To assist defenders, BeyondTrust Identity Security Insights provides built-in detections to flag subscriptions created by guest accounts, offering automated visibility into these unusual behaviors.

    BeyondTrust Identity Security Insights customers can gain a holistic view of all Identities across their entire identity fabric. This includes gaining a consolidated understanding of Entra Guest accounts and their True Privilege™.

    The Bigger Picture: Identity Misconfigurations Are the New Exploits

    Guest-made subscription compromise isn’t an anomaly; it’s a stark example of the many overlooked identity security weaknesses that can undermine the modern enterprise environment, if not adequately addressed. Misconfigurations and weak default settings are prime access points for threat actors who are looking for the hidden paths into your environment.

    It isn’t just your admin accounts that need to be included in your security policies anymore. B2B trust models, inherited billing rights, and dynamic roles mean that every account is a potential launch point for privilege escalation. Re-examine your guest access policies, visibility tools, and subscription governance models now, before these Restless Guests take advantage.

    To gain a snapshot of potential identity-based risks in your environment, including those introduced through guest access, BeyondTrust offers a no-cost Identity Security Risk Assessment.

    Note: This article is expertly written and contributed by Simon Maxwell-Stewart, Senior Security Researcher at BeyondTrust. Simon Maxwell-Stewart is a University of Oxford physics graduate with over a decade of experience in the big data environment. Before joining BeyondTrust, he worked as a Lead Data Scientist in healthcare, and successfully brought multiple machine learning projects into production. Now working as a “resident graph nerd” on BeyondTrust’s security research team, Simon applies his expertise in graph analysis to help drive identity security innovation.

    1. Mnemonic. “Abusing dynamic groups in Azure AD for privilege escalation.” Available: https://www.mnemonic.io/resources/blog/abusing-dynamic-groups-in-azure-ad-for-privilege-escalation/
    2. Microsoft. “Manage Azure subscription policies.” Available: https://learn.microsoft.com/en-us/azure/cost-management-billing/manage/manage-azure-subscription-policy
    Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

    Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games

    Pro-Iranian Hacktivist Group

    Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published online by a pro-Iranian hacktivist group called Cyber Fattah.

    Cybersecurity company Resecurity said the breach was announced on Telegram on June 22, 2025, in the form of SQL database dumps, characterizing it as an information operation “carried out by Iran and its proxies.”

    “The actors gained unauthorized access to phpMyAdmin (backend) and exfiltrated stored records,” Resecurity said. “This is an example of Iran using data breaches as part of a larger anti-U.S., anti-Israel, and anti-Saudi propaganda activity in cyberspace, targeting major sports and social events.”

    It’s believed that the data is likely pulled from the Saudi Games 2024 official website and then shared on DarkForums, a cybercrime forum that has gained attention in the wake of BreachForums’ repeated takedowns. The information was published by a forum user named ZeroDayX, a burner profile that was likely created to promote this breach.

    The leaked data includes IT staff credentials; government official email addresses; athletes’ and visitors’ information; passports and ID cards; bank statements; medical forms; and scanned copies of sensitive documents.

    “The activities of Cyber Fattah align with a broader trend of hacktivism in the Middle East, where groups frequently engage in cyber warfare as a form of activism,” Resecurity said.

    Cybersecurity

    The leak unfolds against the backdrop of simmering tensions between Iran and Israel, with as many as 119 hacktivist groups claiming to have conducted cyber attacks or have made declarations to align with or act against the two nations, per Cyberknow.

    Cyber Fattah, which calls itself an “Iranian cyber team,” has a history of targeting Israeli and Western web resources and government agencies.

    It’s also known to collaborate with other threat actors active in the region, such as 313 Team, which claimed responsibility for a distributed denial-of-service (DDoS) attack against social media platform Truth Social in retaliation for U.S. airstrikes on Iran’s nuclear facilities.

    “This incident by Cyber Fattah may indicate an interesting shift from Israel-centric malicious activity toward a broader focus on anti-U.S. and anti-Saudi messaging,” Resecurity said.

    Last week, a pro-Israel group known as Predatory Sparrow (aka Adalat Ali, Gonjeshke Darande, Indra, or MeteorExpress) claimed to have leaked data obtained from the Iranian Ministry of Communications. Notably, it also hacked Iran’s largest cryptocurrency exchange, Nobitex, and burned over $90 million in cryptocurrency by sending digital assets to invalid wallets.

    Cybersecurity company Outpost24 said the attackers possibly had “access to internal documentation that detailed the inner workings of the exchange and possibly even authentication credentials” to pull off the heist, or that it was a case of a rogue insider who worked with the group.

    “This was not a financially motivated heist but a strategic, ideological, and psychological operation,” security researcher Lidia López Sanz said. “By destroying rather than exfiltrating funds, the threat actor emphasized its goals: dismantling public trust in regime-linked institutions and signaling its technical superiority.”

    Subsequently, on June 18, Iran’s state broadcaster IRIB’s (short for Islamic Republic of Iran Broadcasting) television stream was hijacked to display pro-Israeli and anti-Iranian government imagery. IRIB claimed Israel was behind the incident.

    Image Source: Cyberknow

    Israel, for its part, has also become a target of pro-Palestine hacking groups like the Handala team, which has listed several Israeli organizations on its data leak site starting June 14, 2025. These included Delek Group, Y.G. New Idan, and AeroDreams.

    Another trend observed in the cyber warfare between Iran and Israel is the coming together of smaller hacktivist groups to form umbrella entities like the Cyber Islamic Resistance or United Cyber Front for Palestine and Iran.

    Cybersecurity

    “These loosely affiliated ‘cyber unions’ share resources and synchronize campaigns, amplifying their impact despite limited technical sophistication,” Trustwave SpiderLabs said in a report published last week.

    The company also singled out another pro-Iranian group named DieNet that, despite its pro-Iranian and pro-Hamas stance, is believed to include Russian-speaking members and connections to other cyber communities in Eastern Europe.

    “What distinguishes DieNet from many other pro-Iranian actors is its hybrid identity,” it noted. “Linguistic analysis of DieNet’s messages, as well as timestamps, metadata, and interaction pattern, suggests that at least part of the group communicates internally in Russian or uses Slavic-language resources.”

    “This points to the broader phenomenon of cross-regional cyber collaboration, where ideological alignment overrides geographic or national boundaries.”

    Group-IB, in an analysis of Telegram-based hacktivist activity following June 13, said DieNet was the most referenced channel, quoted 79 times during the time period. In all, more than 5,800 messages have been recorded across various hacktivist channels between June 13 and 20.

    The deployment of cyber capabilities in the context of the Iran-Israel war, as well as other recent geopolitical events surrounding Hamas–Israel and Russia-Ukraine conflicts, demonstrates how digital operations are increasingly being integrated to supplement kinetic actions, influence public perception, and disrupt critical infrastructure, Trustwave added.

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

    SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

    Jun 25, 2025Ravie LakshmananVPN Security / Malware

    SonicWall NetExtender Trojan and ConnectWise Exploits

    Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it.

    “NetExtender enables remote users to securely connect and run applications on the company network,” SonicWall researcher Sravan Ganachari said. “Users can upload and download files, access network drives, and use other resources as if they were on the local network.”

    The malicious payload delivered via the rogue VPN software has been codenamed SilentRoute by Microsoft, which detected the campaign along with the network security company.

    SonicWall said the malware-laced NetExtender impersonates the latest version of the software (10.3.2.27) and has been found to be distributed via a fake website that has since been taken down. The installer is digitally signed by CITYLIGHT MEDIA PRIVATE LIMITED.”

    Cybersecurity

    This suggests that the campaign is targeting users searching for NetExtender on search engines like Google or Bing, and tricking them into installing it through spoofed sites propagated via known techniques like spear-phishing, search engine optimization (SEO) poisoning, malvertising, or social media posts.

    Two different components of the installer have been modified to facilitate the exfiltration of the configuration information to a remote server under the attacker’s control.

    These include “NeService.exe” and “NetExtender.exe,” which have been altered to bypass the validation of digital certificates various NetExtender components and continue execution regardless of the validation results and exfiltrate the information to 132.196.198[.]163 over port 8080.

    “The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server,” Ganachari said.

    “Once the VPN configuration details are entered and the “Connect” button is clicked, the malicious code performs its own validation before sending the data to the remote server. Stolen configuration information includes the username, password, domain, and more.”

    Threat Actors Abuse ConnectWise Authenticode Signatures

    The development comes as G DATA detailed a threat activity cluster dubbed EvilConwi that involves bad actors abusing ConnectWise to embed malicious code using a technique called authenticode stuffing without invalidating the digital signature.

    The German cybersecurity company said it has observed a spike in attacks using this technique since March 2025. The infection chains primarily leverage phishing emails as an initial access vector or through bogus sites advertised as artificial intelligence (AI) tools on Facebook.

    Cybersecurity

    These email messages contain a OneDrive link that redirects recipients to a Canva page with a “View PDF” button, which results in the surreptitious download and execution of a ConnectWise installer.

    The attacks work by implanting malicious configurations in unauthenticated attributes within the Authenticode signature to serve a fake Windows update screen and prevent users from shutting down their systems, as well as including information about the external URL to which the remote connection should be established for persistent access.

    What makes EvilConwi notable is that it offers malicious actors a cover for nefarious operations by conducting them using a trusted, legitimate, and maybe elevated system or software process, thereby allowing them to fly under the radar.

    “By modifying these settings, threat actors create their own remote access malware that pretends to be a different software like an AI-to-image converter by Google Chrome,” security researcher Karsten Hahn said. “They commonly add fake Windows update images and messages too, so that the user does not turn off the system while threat actors remotely connect to them.”

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

    North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

    Jun 25, 2025Ravie LakshmananMalware / Open Source

    NPM Supply Chain Attack

    Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to the ongoing Contagious Interview operation originating from North Korea.

    According to Socket, the ongoing supply chain attack involves 35 malicious packages that were uploaded from 24 npm accounts. These packages have been collectively downloaded over 4,000 times. The complete list of the JavaScript libraries is below –

    • react-plaid-sdk
    • sumsub-node-websdk
    • vite-plugin-next-refresh
    • vite-plugin-purify
    • nextjs-insight
    • vite-plugin-svgn
    • node-loggers
    • react-logs
    • reactbootstraps
    • framer-motion-ext
    • serverlog-dispatch
    • mongo-errorlog
    • next-log-patcher
    • vite-plugin-tools
    • pixel-percent
    • test-topdev-logger-v1
    • test-topdev-logger-v3
    • server-log-engine
    • logbin-nodejs
    • vite-loader-svg
    • struct-logger
    • flexible-loggers
    • beautiful-plugins
    • chalk-config
    • jsonpacks
    • jsonspecific
    • jsonsecs
    • util-buffers
    • blur-plugins
    • proc-watch
    • node-orm-mongoose
    • prior-config
    • use-videos
    • lucide-node, and
    • router-parse

    Of these, six continue to remain available for download from npm: react-plaid-sdk, sumsub-node-websdk, vite-plugin-next-refresh, vite-loader-svg, node-orm-mongoose, and router-parse.

    Cybersecurity

    Each of the identified npm packages contains a hex-encoded loader dubbed HexEval, which is designed to collect host information post installation and selectively deliver a follow-on payload that’s responsible for delivering a known JavaScript stealer called BeaverTail.

    BeaverTail, in turn, is configured to download and execute a Python backdoor called InvisibleFerret, enabling the threat actors to collect sensitive data and establish remote control of infected hosts.

    “This nesting-doll structure helps the campaign evade basic static scanners and manual reviews,” Socket researcher Kirill Boychenko said. “One npm alias also shipped a cross-platform keylogger package that captures every keystroke, showing the threat actors’ readiness to tailor payloads for deeper surveillance when the target warrants it.”

    Contagious Interview, first publicly documented by Palo Alto Networks Unit 42 in late 2023, is an ongoing campaign undertaken by North Korean state-sponsored threat actors to obtain unauthorized access to developer systems with the goal of conducting cryptocurrency and data theft.

    The cluster is also broadly tracked under the monikers CL-STA-0240, DeceptiveDevelopment, DEV#POPPER, Famous Chollima, Gwisin Gang, Tenacious Pungsan, UNC5342, and Void Dokkaebi.

    Recent iterations of the campaign have also been observed taking advantage of the ClickFix social engineering tactic to deliver malware such as GolangGhost and PylangGhost. This sub-cluster of activity has been designated the name ClickFake Interview.

    The latest findings from Socket point to a multi-pronged approach where Pyongyang threat actors are embracing various methods to trick prospective targets into installing malware under the pretext of an interview or a Zoom meeting.

    The npm offshoot of Contagious Interview typically involves the attackers posing as recruiters on LinkedIn, sending job seekers and developers coding assignments by sharing a link to a malicious project hosted on GitHub or Bitbucket that embeds the npm packages within them.

    “They target software engineers who are actively job-hunting, exploiting the trust that job-seekers typically place in recruiters,” Boychenko said. “Fake personas initiate contact, often with scripted outreach messages and convincing job descriptions.”

    Cybersecurity

    The victims are then coaxed into cloning and running these projects outside containerized environments during the purported interview process.

    “This malicious campaign highlights an evolving tradecraft in North Korean supply chain attacks, one that blends malware staging, OSINT-driven targeting, and social engineering to compromise developers through trusted ecosystems,” Socket said.

    “By embedding malware loaders like HexEval in open source packages and delivering them through fake job assignments, threat actors sidestep perimeter defenses and gain execution on the systems of targeted developers. The campaign’s multi-stage structure, minimal on-registry footprint, and attempt to evade containerized environments point to a well-resourced adversary refining its intrusion methods in real-time.”

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…

  • Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

    Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

    Jun 25, 2025Ravie LakshmananEndpoint Security / IT Management

    Microsoft on Tuesday announced that it’s extending Windows 10 Extended Security Updates (ESU) for an extra year by letting users either pay a small fee of $30 or by sync their PC settings to the cloud.

    The development comes ahead of the tech giant’s upcoming October 14, 2025, deadline, when it plans to officially end support and stop providing security updates for devices running Windows 10. The desktop operating system was launched in July 2015.

    Cybersecurity

    The Windows maker describes ESU as a “last resort option” for customers who need to run legacy Microsoft software that has reached end-of-life (EoL) status. This is meant to be a temporary solution while migrating to a newer supported platform.

    As part of the new enrollment options announced by Microsoft, individuals can opt-in to the program from their personal Windows 10 PC through an “enrollment wizard” available in the Settings app. Users can choose one of the three options –

    • Use Windows Backup to sync your settings to the cloud (at no additional cost)
    • Redeem 1,000 Microsoft Rewards points (at no additional cost)
    • Pay $30 (local pricing may change)

    Once the appropriate option is selected, users’ PCs will be automatically enrolled into the program. ESU coverage for Windows 10 devices runs from October 15, 2025, to October 13, 2026.

    The enrollment wizard is currently available in the Windows Insider Program, and is expected to be rolled out to Windows 10 customers in July, with expanded availability set for mid-August.

    Cybersecurity

    It’s worth noting that ESUs do not cover new features, non-security updates, or design change requests. Another key aspect to factor in is that using Microsoft Rewards or Windows Backup requires users to sign up for a Microsoft account, if they don’t have it already.

    “Individuals or organizations who elect to continue using Windows 10 after support ends on October 14, 2025, will have the option of enrolling their PCs into a paid ESU subscription,” Microsoft notes.

    “The ESU program enables PCs to continue to receive critical and important security updates through an annual subscription service after support ends.”

    Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.


    Source: thehackernews.com…