Article Details

Scrape Timestamp (UTC): 2025-02-17 09:20:32.281

Source: https://thehackernews.com/2025/02/thn-weekly-recap-google-secrets-stolen.html

Original Article Text

Click to Toggle View

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More. Welcome to this week's Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the technical details into simple, easy-to-follow insights. ⚡ Threat of the Week Russian Threat Actors Leverage Device Code Phishing to Hack Microsoft Accounts — Microsoft and Volexity have revealed that threat actors with ties to Russia are leveraging a technique known as device code phishing to gain unauthorized access to victim accounts, and use that access to get hold of sensitive data and enable persistent access to the victim environment. At least three different Russia-linked clusters have been identified abusing the technique to date. The attacks entail sending phishing emails that masquerade as Microsoft Teams meeting invitations, which, when clicked, urge the message recipients to authenticate using a threat actor-generated device code, thereby allowing the adversary to hijack the authenticated session using the valid access token. Stop Playing The Hackers' Game Their Way It's time for a new security approach. Replace traditional security technology that exposes your attack surface and allows lateral movement to access your data. 🔔 Top News ‎️‍🔥 Trending CVEs Your go-to software could be hiding dangerous security flaws—don't wait until it's too late! Update now and stay ahead of the threats before they catch you off guard. This week's list includes — CVE-2025-1094 (PostgreSQL), CVE-2025-0108 (Palo Alto Networks PAN-OS), CVE-2025-23359 (NVIDIA Container Toolkit), CVE-2025-21391 (Microsoft Windows Storage), CVE-2025-21418 (Microsoft Windows Ancillary Function Driver for WinSock), CVE-2024-38657, CVE-2025-22467, CVE-2024-10644 (Ivanti Connect Secure), CVE-2024-47908 (Ivanti Cloud Services Application), CVE-2024-56131, CVE-2024-56132, CVE-2024-56133, CVE-2024-56134, CVE-2024-56135 (Progress Kemp LoadMaster), CVE-2025-24200 (Apple iOS and iPadOS), CVE-2024-12797 (OpenSSL), CVE-2025-21298 (Microsoft Windows OLE), CVE-2025-1240 (WinZip), CVE-2024-32838 (Apache Fineract), CVE-2024-52577 (Apache Ignite), CVE-2025-26793 (Hirsch Enterphone MESH), CVE-2024-12562 (s2Member Pro plugin), CVE-2024-13513 (Oliver POS – A WooCommerce Point of Sale (POS) plugin), CVE-2025-26506 (HP LaserJet), CVE-2025-22896, CVE-2025-25067, CVE-2025-24865 (mySCADA myPRO Manager), CVE-2024-13182 (WP Directorybox Manager plugin), CVE-2024-10763 (Campress theme), CVE-2024-7102 (GitLab CE/EE), CVE-2024-12213 (WP Job Board Pro plugin), CVE-2024-13365 (Security & Malware scan by CleanTalk plugin), CVE-2024-13421 (Real Estate 7 theme), and CVE-2025-1126 (Lexmark Print Management Client). 📰 Around the Cyber World 🎥 Cybersecurity Webinars P.S. Know someone who could use these? Share it. 🔧 Cybersecurity Tools 🔒 Tip of the Week Segment Your Wi-Fi Network for Better Protection — In today's smart home, you likely have many connected devices—from laptops and smartphones to smart TVs and various IoT gadgets. When all these devices share the same Wi‑Fi network, a breach in one device could potentially put your entire network at risk. Home network segmentation helps protect you by dividing your network into separate parts, similar to how large businesses isolate sensitive information. To set this up, use your router's guest network or VLAN features to create different SSIDs, such as "Home_Private" for personal devices and "Home_IoT" for smart gadgets. Ensure each network uses strong encryption (WPA3 or WPA2) with unique passwords, and configure your router so devices on one network cannot communicate with those on another. Test your setup by connecting your devices accordingly and verifying that cross-network traffic is blocked, then periodically check your router's dashboard to keep the configuration working smoothly. Conclusion That wraps up this week's cybersecurity news. We've covered a broad range of stories—from the case of a former Google engineer charged with stealing key AI secrets to hackers taking advantage of a Windows user interface flaw. We've also seen how cybercriminals are moving into new areas like AI misuse and cryptocurrency scams, while law enforcement and industry experts work hard to catch up. These headlines remind us that cyber threats come in many forms, and every day, new risks emerge that can affect everyone from large organizations to individual users. Keep an eye on these developments and take steps to protect your digital life. Thank you for joining us, and we look forward to keeping you informed next week.

Daily Brief Summary

NATION STATE ACTIVITY // Russian Threat Actors Utilize Device Code Phishing Attacks

Russian-linked threat actors are exploiting device code phishing to access Microsoft accounts.

Phishing tactics include sending falsified Microsoft Teams invitations to victims.

Victims who click on these phishing links are prompted to authenticate using a device code generated by the attackers.

Once authenticated, attackers gain access to sensitive data and maintain persistent access to the victim’s environment.

Microsoft and Volexity have identified at least three distinct Russian-linked clusters employing this technique.

The technique allows attackers to hijack authenticated sessions using valid access tokens, posing major security risks.

Users are urged to be cautious with email authentication requests and to verify the legitimacy of unexpected communication links.