Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11813

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-07-18 21:16:11 bleepingcomputer MALWARE Arch Linux Removes Malware-Infected AUR Packages
Arch Linux has removed three AUR packages that were found installing the CHAOS remote access trojan on devices. The malicious packages, named "librewolf-fix-bin", "firefox-patch-bin", and "zen-browser-patched-bin", were uploaded on July 16 and removed by July 18 after community reports. These packages contained a script from a GitHub repository operated by the uploader, which was actually a trojan rather than a legitimate software patch. Users of the packages might have installed a "systemd-initd" executable found in the /tmp folder, indicating infection. A dormant Reddit account was revived to promote these malicious packages, reflecting a potential account compromise. CHAOS RAT, the trojan installed by these packages, can perform functions like file management, command execution, and a reverse shell to allow attackers remote control. The Arch Linux team advises anyone who installed these packages to remove them and verify their system's integrity to prevent further compromise.
Details
2025-07-18 19:42:52 bleepingcomputer NATION STATE ACTIVITY UK NCSC Links Russian GRU to Sophisticated Email Espionage Malware
The UK National Cyber Security Centre (NCSC) has attributed the "Authentic Antics" malware to Russia's GRU, specifically to the cyber threat group APT28, also known as Fancy Bear. Authentic Antics targets Microsoft 365, stealing credentials and OAuth 2.0 tokens to gain access to email accounts. The malware operates by embedding within the Outlook process, triggering multiple Microsoft login prompts to steal sign-in data and authorization codes. Stolen data is exfiltrated using the victim's Outlook account, cleverly avoiding detection by disabling the "save to sent" option. Consisting of a dropper, an infostealer, and several PowerShell scripts, Authentic Antics does not require a C2 server, instead utilizing victim's email for sending stolen data to an attacker-controlled address. It demonstrates high sophistication and stealth, maintaining lengthy, undetected access to victim accounts by minimizing its disk presence and storing data in Outlook-specific registry locations. The UK government imposed sanctions on three GRU units and 18 individuals linked to this and similar operations, stressing the increasing threat sophistication and commitment to countering such espionage activities.
Details
2025-07-18 18:57:21 thehackernews NATION STATE ACTIVITY Chinese Tool Extracts Data from Seized Phones at Borders
Cybersecurity researchers have identified a mobile forensics tool named Massistant used by Chinese law enforcement to extract data from confiscated phones. Developed by SDIC Intelligence Xiamen Information Co., formerly Meiya Pico, Massistant can access GPS data, SMS messages, images, and more. The tool requires physical access to install on devices and is typically used at border checkpoints or similar scenarios. Massistant and its predecessor, MFSocket, need to be connected to a forensic software via desktop to function, removing itself post-use. It supports data extraction from a range of third-party apps, including Signal and Letstalk, enhancing its surveillance capabilities. Not limited to Android, there is potential functionality for iOS devices, indicated by related patents for extracting data, including voiceprints. The company involved has faced sanctions by the U.S. for biometric surveillance and tracking activities, particularly targeting minorities in Xinjiang.
Details
2025-07-18 18:26:45 thehackernews NATION STATE ACTIVITY UNG0002 Espionage Group Targets Asia with Advanced Cyber Tactics
UNG0002 group has launched cyber espionage campaigns against multiple sectors in China, Hong Kong, and Pakistan, focusing mainly on industries like defense, energy, and healthcare. The campaigns, named Operation Cobalt Whisper and Operation AmberMist, utilized spear-phishing with LNK files and VBScripts disguised as resumes to deploy RATs and other malware. Cobalt Strike and Metasploit post-exploitation tools were used to maintain and expand the attackers' foothold within compromised networks. Attack strategies included fake job applications and deceptive landing pages mimicking official government platforms to deliver malware such as Shadow RAT and INET RAT. Seqrite Labs first identified and documented these sophisticated attack tactics in their reports, outlining the persistence and evolving methods of UNG0002. The exact origin of UNG0002 is uncertain, but evidence suggests it is a well-coordinated group from Southeast Asia specializing in espionage and intellectual property theft. The threat group's high adaptability and technical proficiency highlight the significant cybersecurity risk they pose to targeted regions and sectors.
Details
2025-07-18 18:26:45 bleepingcomputer CYBERCRIME Russian Alcohol Retailer WineLab Halts Operations After Ransomware Hit
WineLab, Russia's largest alcohol retailer and part of Novabev Group, has shuttered its stores following a strategic ransomware attack. The cyberattack, recognized on July 14, targeted Novabev's IT systems, causing significant disruptions to their operations and affecting the availability of essential services. Novabev confirmed the attackers demanded a ransom, which the company has refused to pay, emphasizing their non-compliance with the extortion demands. The attack led to temporary closure of physical stores and issues with online purchases, with the company’s website and mobile app remaining non-operational since the incident. Novabev is actively working to mitigate the damage and restore full functionality with their IT team engaged in extensive recovery efforts. While there are no current claims from ransomware groups, and no evidence suggests customer personal data was compromised, the ongoing investigation continues to assess the full impact. The incident is notable even on hacker forums and has stirred discussions about the increasing trend of ransomware attacks within Russia, despite most major Russian ransomware groups traditionally avoiding local targets.
Details
2025-07-18 18:18:08 thehackernews MALWARE Exploitation of Ivanti Vulnerabilities to Launch Cobalt Strike
Ivanti Connect Secure appliances were compromised using zero-day exploits to deliver new malware, MDifyLoader, and launch Cobalt Strike. The attacks, observed from December 2024 to July 2025, utilized CVE-2025-0282 and CVE-2025-22457, both enabling remote code execution. MDifyLoader employs DLL side-loading to introduce an encoded Cobalt Strike beacon into memory, facilitating in-memory attacks. Attackers also utilized VShell, a Go-based remote access tool, and Fscan, a network scanning utility, both linked to Chinese hacking groups. The offensive included brute-force attacks against FTP, MS-SQL, and SSH servers, and used the EternalBlue exploit for lateral movement. Methodologies also included creating new domain accounts and malware registration as services or in task schedulers to maintain long-term network access.
Details
2025-07-18 15:56:55 bleepingcomputer CYBERCRIME Japanese Police Release Decryptor for Phobos Ransomware Victims
Japanese authorities have introduced a free decryptor for victims of Phobos and 8-Base ransomware, allowing them to recover encrypted files without cost. The decryptor is available on the Japanese police website and also via the Europol's NoMoreRansom project, promoting its legitimacy with support from the FBI. This initiative follows a substantial law enforcement action that saw a disruption of the Phobos operation and the arrest of key suspects involved in the ransomware distribution. The decryptor is effective against files encrypted with extensions such as ".phobos", ".8base", ".elbie", ".faust", and ".LIZARD", with potential support for additional extensions. It's noteworthy that some browsers may flag the decryptor as malware, yet testing confirms its safety and effectiveness in decrypting files. A recent case verified by BleepingComputer confirmed the decryptor successfully restored all 150 files encrypted by a variant of Phobos ransomware on a test system. Ransom victims are encouraged to utilize this tool even if the ransomware used different file extensions, as it might still decrypt their data successfully.
Details
2025-07-18 15:11:06 bleepingcomputer CYBERCRIME Hackers Target TeleMessage SGNL App Exposing User Data
Researchers have identified exploitation attempts aimed at a vulnerability (CVE-2025-48927) in the TeleMessage SGNL app, potentially compromising usernames, passwords, and other sensitive information. GreyNoise, a threat monitoring firm, reported observing 11 IPs attempting to exploit this specific vulnerability, with ongoing related reconnaissance activities. The flaw stems from unrestricted access to the '/heapdump' endpoint in Spring Boot Actuator, allowing unauthorized downloading of Java heap memory dumps that contain sensitive data. Despite TeleMessage addressing the flaw, some on-prem installations remain at risk due to outdated configurations not limiting access to diagnostic endpoints. To mitigate risk, it's recommended to disable or restrict access to sensitive endpoints, particularly the /heapdump endpoint, strictly to trusted IP addresses. The SGNL app, although intended for secure communications with built-in archival for compliance, has faced scrutiny over claims of not maintaining end-to-end encryption, risking the integrity of stored messages and credentials. This vulnerability and its exploitation highlighted national security concerns in the U.S, following its use by Customs & Border Protection and other officials. CVE-2025-48927 has been added to the Known Exploited Vulnerabilities catalog by CISA, with a directive for federal agencies to apply necessary mitigations promptly.
Details
2025-07-18 13:52:55 theregister MISCELLANEOUS WeTransfer Rolls Back ToS Update Amid User Privacy Concerns
WeTransfer recently modified its Terms of Service, introducing language that suggested the use of uploaded content to train AI for improving content moderation, which led to significant user backlash. The specific ToS change involved granting WeTransfer extensive rights to user content, including a perpetual, royalty-free license to use this content for service operations and technology development. Following user complaints and negative reactions on social media, WeTransfer clarified that the inclusion of "machine learning" was only under consideration and not currently in use, and decided to remove the contentious wording to avoid further confusion. Users expressed concerns that their sensitive content could be misused under the new terms, viewing the update as a potential privacy violation. Legal experts note that terms of service adjustments are common as tech companies seek additional rights for new features, but explicit clarity and user consent are crucial to maintaining trust. The episode reflects broader issues in the tech community regarding data privacy and the implications of AI, highlighting the need for transparency and careful communication by companies when updating service agreements. WeTransfer's situation mirrors similar controversies faced by other tech companies, such as Dropbox, as they navigate the integration of AI technologies and associated legal and ethical challenges.
Details
2025-07-18 11:33:39 thehackernews NATION STATE ACTIVITY Ukrainian CERT Identifies APT28 Malware Using AI for Phishing Attacks
Ukraine’s Computer Emergency Response Team (CERT-UA) uncovered a phishing campaign employing the LAMEHUG malware, featuring unique AI integration for command generation via textual descriptions. The phishing emails, designed to appear as if sent by ministry officials, targeted top-level government entities and contained a ZIP archive with three variations of the LAMEHUG payload. The malware was developed using a Large Language Model (LLM) named Qwen2.5-Coder-32B-Instruct from Alibaba Cloud, tailored for coding tasks and accessed through the Hugging Face API. LAMEHUG capabilities include harvesting host data and searching for text and PDF files in critical directories, with the information being sent back to the attackers via SFTP or HTTP POST. The attack's connection to Russian state-backed hacking collective APT28, also known as Fancy Bear, was established with medium confidence. Utilizing legitimate services like Hugging Face for command-and-control operations allows such attacks to blend with normal traffic and evade detection systems. This report follows another finding by Check Point of a malware called Skynet, demonstrating new tactics like prompt injection to challenge AI-based analysis tools, signaling evolving adversarial strategies against AI-integrated security systems.
Details
2025-07-18 11:17:00 thehackernews CYBERCRIME Google Initiates Legal Action Against Chinese Botnet Operators
Google has filed a lawsuit in New York against 25 Chinese entities responsible for operating the BADBOX 2.0 botnet, which compromised over 10 million Android devices. The compromised devices were primarily uncertified Android products lacking Google's security measures, susceptible to pre-installed malware. The botnet facilitated extensive ad fraud and other digital criminal activities, utilizing infected devices through Google's Ad Network. Google has updated its Play Protect service to counter BADBOX-related apps, following an FBI warning regarding the security threat. The botnet primarily infected devices in Brazil, the U.S., Mexico, and Argentina, being spread through IoT devices and malicious apps from unofficial marketplaces. The legal complaint highlights multiple BADBOX enterprise groups, each specializing in different facets of the criminal operation. A preliminary court injunction has mandated the cessation of the botnet's operations and engaged third-party ISPs and domain registries in dismantling the network. Google's actions and the corresponding legal measures represent a significant development in the fight against global cybercrime and device exploitation.
Details
2025-07-18 11:06:50 thehackernews MALWARE Critical Vulnerability in NVIDIA AI Cloud Toolkit Allows Full Server Takeover
NVIDIA Container Toolkit disclosed a critical vulnerability, tracked as CVE-2025-23266, with a CVSS score of 9.0, allowing container escapes and privilege escalation. The flaw, named NVIDIAScape by Wiz, affects all versions of NVIDIA Container Toolkit up to 1.17.7 and NVIDIA GPU Operator up to 25.3.0. Attackers can execute a simple three-line Dockerfile exploit to load malicious libraries, enabling them to access, alter, or steal data across shared hardware environments. Approximately 37% of cloud environments are susceptible to the exploit, potentially impacting sensitive data and proprietary AI models of multiple customers. NVIDIA has released updates (versions 1.17.8 and 25.3.1) to mitigate the vulnerability. Security experts warn that containers provide insufficient security isolation on their own and emphasize the necessity for stronger barriers like virtualization. This incident underscores ongoing critical infrastructure vulnerabilities in the growing AI technology stack, highlighting the urgent need for robust security measures.
Details
2025-07-18 10:38:40 thehackernews CYBERCRIME Rethinking Backup Strategies in the Age of Ransomware Threats
IT disruptions are escalating, prompting a shift from traditional backup to cyber resilience strategies due to the increasing threat of ransomware. Ransomware attacks have evolved into complex schemes like double and triple extortion, targeting not just encryption but also data exfiltration, and attack on recovery processes. Financial impacts on small and medium businesses (SMBs) can be severe, with potential costs running into tens of thousands for even a single day of downtime, not including long-term reputational damage. Compliance pressures and regulatory demands across sectors are driving the need for robust cyber resilience to maintain operations amidst attacks. Traditional backup methods are inadequate against modern cyber threats that involve deliberate attacks on backup and recovery systems. A resilience-first strategy involves identifying critical systems, automating backup testing, protecting recovery infrastructure, and developing clear recovery playbooks. Cyber resilience is crucial for managing financial risks and leveraging insurance as it demonstrates preparedness and operational continuity during crises.
Details
2025-07-17 23:43:25 bleepingcomputer CYBERCRIME Critical Citrix Vulnerability Exploited Before Public PoC Release
Citrix NetScaler vulnerability, CVE-2025-5777 (CitrixBleed 2), was exploited nearly two weeks before proof-of-concept (PoC) exploits were publicly available. GreyNoise detected active exploitation from IP addresses originating in China starting on June 23, 2025. Citrix did not initially acknowledge the exploitation in its security advisories despite warnings and eventually updated its guidance post-exposure in KEV database. U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities catalog on July 9, urging immediate patching. Security researcher Kevin Beaumont criticized Citrix for insufficient response and guidance on mitigating the flaw and clearing compromised sessions. Exploit allows attackers to send malformed POST requests during login to leak memory and hijack Citrix sessions using valid session tokens. Citrix released a patch and an additional blog post on July 15 for identifying indicators of compromise in NetScaler logs; however, they have historically been slow and opaque regarding the dissemination of exploitation details. Over 120 companies reportedly compromised by the flaw, with the financial sector being a primary target according to third-party security firm Imperva.
Details
2025-07-17 23:36:24 theregister CYBERCRIME Google Sues Operators of Massive Botnet Damaging Its Reputation
Google has initiated legal actions against 25 unidentified individuals based in China for exploiting over 10 million devices worldwide. These devices, infected by the BadBox 2.0 botnet, include streaming boxes, tablets, projectors, and car infotainment systems. Accusations detail the botnet's interference with Google’s user relationships, damage to its reputation, and enforced significant resource expenditure to mitigate the issues. This lawsuit aims to dismantle the criminal operations of BadBox 2.0, preventing further cybercrimes and fraudulent activities. Despite the lawsuit, accountability is uncertain as extradition from China to the USA is rare. Historical efforts by Human Security with Google's collaboration have partially disrupted BadBox operations but challenges remain as the botnet capability expands. The botnet facilitates various fraudulent operations, including ad fraud and DDoS attacks, by exploiting residential proxies that mask illicit network traffic. Google's legal action highlights key groups within the botnet’s infrastructure responsible for different fraudulent and criminal activities.
Details