Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12731

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-07-02 16:23:29 bleepingcomputer DDOS Citrix Faces Login Issues After Patching NetScaler Vulnerabilities
Citrix has issued warnings about potential login disruptions on NetScaler ADC and Gateway appliances following patches for severe security vulnerabilities. Patching the vulnerabilities, which could lead to authentication bypass and denial-of-service attacks, triggers issues due to the newly default-enabled Content Security Policy (CSP). The implemented CSP is intended to mitigate risks like cross-site scripting and code injections but inadvertently blocks legitimate scripts required for authentication methods like DUO, SAML, or other IDP configurations. The disruptions manifest as broken login pages, particularly under configurations relying on custom scripts not compliant with the strict CSP rules. Two critical vulnerabilities identified, CVE-2025-5777 ("Citrix Bleed 2") and CVE-2025-6543, are addressed by the patches; the latter is actively exploited in DoS attacks. Citrix recommends that administrators disable the CSP temporarily and clear the cache to resolve the login issues while further solutions are developed. Citrix offers further assistance through their support team for unresolved issues post-CSP adjustment.
Details
2025-07-02 15:45:58 bleepingcomputer MALWARE Critical Forminator Plugin Flaw Risks WordPress Site Takeovers
A severe vulnerability in the Forminator plugin for WordPress, identified as CVE-2025-6463 with a CVSS score of 8.8, risks entire site takeovers. The plugin is popular, installed on over 600,000 websites, and allows users to create forms with a drag-and-drop interface. The flaw originates from improper validation and sanitization of user input, enabling arbitrary file deletion when forms are submitted. Attackers can exploit the vulnerability by injecting malicious file paths into form fields, leading to the deletion of essential WordPress files like wp-config.php. The deletion of critical files forces WordPress sites into a setup state, where attackers can potentially gain control by linking the site to their own database. The issue was reported by a security researcher, resulting in a bug bounty of $8,100 and a rapid response from the developers, who issued a patch within ten days. Version 1.44.3 of Forminator, which fixes the vulnerability, has been released, but the total number of updated installations remains unclear. Although there are no current reports of active exploitation, the exposure of technical details makes it likely that attackers will soon attempt to exploit this vulnerability.
Details
2025-07-02 13:16:52 bleepingcomputer CYBERCRIME Over 40 Fake Crypto Wallet Extensions Found in Firefox Store
Over 40 fraudulent browser extensions mimicking popular cryptocurrency wallets discovered in the Firefox add-ons store. Extensions target credentials by impersonating reputable wallets like Coinbase, MetaMask, and others, featuring malicious code to exfiltrate sensitive data. Russian-speaking cybercriminal group believed to be behind the scheme; extensions include malicious code that captures wallet keys and seed phrases. The fraudulent code includes event listeners to monitor and steal data when users input sensitive information. Fake user reviews, predominantly five-star, used to enhance the credibility of the extensions, despite the presence of one-star scam alerts from affected users. Despite reports to Mozilla and the presence of an early detection system for such scams, the malicious add-ons remained accessible at the time of the report. The campaign has been continually active, with new malicious extensions frequently added to the store.
Details
2025-07-02 12:40:56 theregister CYBERCRIME US Imposes Sanctions on Russian Bulletproof Hosting Provider
The US Treasury has sanctioned Russian bulletproof hosting provider Aeza Group and four associates for supporting ransomware and cybercriminal activities. Aeza Group has facilitated operations for notable ransomware entities like BianLian and other data theft groups such as Meduza and Lumma. BianLian, known for targeting US critical infrastructure, has shifted from encryption ransomware to a data exfiltration extortion model. The sanctions mark the second punitive action against a bulletproof hosting provider in 2023, following the earlier sanctions against Zservers, which supported the LockBit ransomware group. Aeza Group's operations are linked to a UK-registered affiliate, Aeza International, managed with assistance from the UK's National Crime Agency. Sanctions mean US entities are prohibited from conducting business with Aeza, which could limit but not entirely stop their cybercriminal operations. The sanctions target the organization and its key operators, but the full impact on broader cybercriminal activities involving Russian entities may be limited.
Details
2025-07-02 11:01:55 thehackernews CYBERCRIME Evolving Cybersecurity: The Importance of Layered NDR Strategies
Nearly 80% of cyber threats now imitate legitimate user behaviors, complicating threat detection. Verizon's report shows a significant increase in breaches at edge devices and VPN gateways, from 3% to 22%. Traditional EDR solutions fail to detect advanced threats like zero-day exploits and malware-free attacks. Security operations centers (SOCs) are increasing resilience by adopting a multi-layered detection strategy using Network Detection and Response (NDR). NDR enhances visibility and detection without the need for agent deployment, effectively uncovering subtle, malicious activities. Layered NDR strategies combine lightweight base layers for common threats with more sophisticated behavioral and machine learning layers for complex threats. Top SOCs utilize NDR to correlate detections and offer a comprehensive view of network threats, facilitating faster and more effective incident response. The movement towards NDR is driven by the need to adapt to sophisticated, rapidly evolving cyber-attacks and increasing attack surfaces.
Details
2025-07-02 10:52:28 thehackernews CYBERCRIME PDF Impersonation Phishing Targets Major Brands to Mislead Users
Cybersecurity experts have identified a phishing trend using PDF attachments to emulate trusted brands like Microsoft and DocuSign. Attackers trick victims into initiating phone calls under the guise of solving issues or confirming transactions through these PDFs. These phishing calls may lead victims to inadvertently disclose sensitive data or install malicious software, including banking Trojans. Many PDFs contain QR codes that, when scanned, redirect to fake brand login pages, enhancing the illusion of legitimacy. The campaigns exploit VoIP technology for anonymity, using untraceable numbers to execute complex, multi-stage social engineering. The FBI has noted a rise in such callback phishing activities, particularly from a group known as Luna Moth. Further misuse of Microsoft 365's Direct Send feature by attackers allows phishing emails that appear to be internal communications. Overall, brand impersonation and sophisticated social engineering tactics remain major threats in the digital landscape.
Details
2025-07-02 09:40:31 theregister CYBERCRIME Cl0p Cybercrime Group's Tool Vulnerable to Hacker Exploits
Cl0p cybercrime gang’s Python-based data extraction tool has a significant security flaw allowing Remote Command Execution (RCE) attacks. The vulnerability has a high severity score of 8.9, primarily due to improper input validation which fails to sanitize inputs, enabling attackers to execute OS commands. Italian researcher Lorenzo N identified the flaw, which was later publicized by the Computer Incident Response Center Luxembourg (CIRCL). CIRCL head Alexandre Dulaunoy expressed skepticism regarding any forthcoming fixes from the Cl0p developers for this vulnerability. Potential exploiters of this vulnerability could include rival cybercriminal groups aiming to disrupt Cl0p's operations or steal their data using the compromised tool. The MOVEit file transfer attacks led by Cl0p in 2023 impacted numerous major organizations, continuously exploiting MOVEit vulnerabilities well into 2024. Recent activity reported by Greynoise detected a spike in scanning for systems vulnerable to previously known MOVEit bugs, indicating ongoing cyber threats related to MOVEit vulnerabilities.
Details
2025-07-02 08:58:16 thehackernews NATION STATE ACTIVITY U.S. Sanctions Russian Host for Cybercrime and Ransomware Support
The U.S. Treasury has sanctioned Aeza Group, a Russian bulletproof hosting provider, and its affiliates for aiding cybercriminals. Sanctions target Aeza's involvement in ransomware deployment, technological theft, and illicit drug market operations on the dark web. Key figures arrested include Penzev, charged with leading a criminal organization, and employees Bozoyan, Orel, and Zubova. Aeza Group's services help cybercriminals host phishing sites, command-and-control servers, and evade law enforcement actions. Aeza accused of providing infrastructure to malware families targeting U.S. defense industries and other global victims. The report highlights Aeza’s infrastructure used by pro-Russian operations and other criminal activities. The sanctions are part of broader efforts by the U.S. and international partners to dismantle the support networks for cybercriminals.
Details
2025-07-02 08:36:04 theregister NATION STATE ACTIVITY UK Updates Laws in Response to Subsea Cable Threats
The UK government plans to update laws, such as the Submarine Telegraph Act of 1885, amidst threats from cyberattacks and subsea cable sabotage. A recent Strategic Defence Review proposes new legislation to address state-sponsored cybercrime and the risk to undersea infrastructure. The old legislation, only imposing a £1,000 fine for damages, is deemed inadequate for modern threats, which include grey zone threats below official armed conflict. Incidents in the Baltic Sea, including suspected Russian sabotage of underwater data cables, have escalated concerns and highlight vulnerabilities. There is a proposed increase in fines and a draft of new legislation is expected, involving the Ministry of Defence and the Department for Science, Innovation and Technology. The ambiguity of what constitutes an act of war in the context of cyberattacks and subsea sabotage makes international responses challenging. Future legislation will seek a balance between civil and military approaches to enhance national security and ensure readiness for escalating threats.
Details
2025-07-02 05:54:55 thehackernews CYBERCRIME AI-Powered Phishing: Cybercriminals Exploit Vercel's v0 for Fake Pages
Unknown cybercriminals have utilized v0, an AI tool by Vercel, to create authentic-looking phishing sites impersonating reputable brands. This development marks a significant evolution in cybercrime, where generative AI is now being used to simplify and accelerate the production of phishing attacks. Vercel's v0 tool, designed for easy creation of web content via natural language prompts, has been misused to generate functional fake login pages without coding expertise. The ease of use of tools like v0 enables even less technically skilled individuals to launch sophisticated phishing operations that convincingly mimic legitimate websites. In addition to utilizing Vercel’s infrastructure for hosting fake sites, criminals also hosted illicit resources such as stolen logos to enhance the authenticity of their phishing pages. Following responsible disclosure practices, Vercel has blocked access to the identified malicious sites. There is a broader trend of malicious actors leveraging uncensored or custom-developed large language models (LLMs) to bolster their cybercriminal activities. The incident underscores a growing shift in phishing tactics, leveraging AI technology to scale and enhance the effectiveness of cyber attacks.
Details
2025-07-02 01:42:11 theregister DATA BREACH Qantas Cyberattack Exposes Data of Six Million Customers
Qantas detected unusual activity on a third-party platform on June 30, indicating a cyberattack. Information of six million customers, including names, email addresses, phone numbers, birth dates, and frequent flyer numbers was compromised. No credit card details, personal financial info, or passport details were stored on the affected system. Qantas is still determining the full extent of the data theft but expects it to be significant. The airline has confirmed that its operations and other systems remain secure despite the breach. Qantas is actively investigating the incident and plans to notify potentially affected customers. The incident could impact numerous commercial partners linked with Qantas' frequent flyer program. This cyberattack could become one of Australia's significant data breaches, alongside recent high-profile cases like Medibank and Optus.
Details
2025-07-02 01:03:29 bleepingcomputer DATA BREACH Qantas Announces Major Data Breach Involving Customer Information
Qantas, Australia's largest airline, disclosed a cyberattack on a third-party platform affecting customer data. The breach, detected on a Monday, involved unauthorized access to a customer service platform used by a Qantas contact center. Significant amounts of customer data were stolen, including names, email addresses, phone numbers, birth dates, and frequent flyer numbers. No financial information or secure login details for frequent flyer accounts were compromised. Qantas promptly reported the incident to the Australian Cyber Security Centre, the Office of the Australian Information Commissioner, and the Australian Federal Police. The incident bears similarities to attacks by the hacker group "Scattered Spider," which has been targeting the aviation sector. Security experts recommend enhancing defenses across infrastructure, identity systems, and third-party vendor platforms in response to such threats.
Details
2025-07-01 20:25:45 bleepingcomputer CYBERCRIME AT&T Introduces New "Wireless Lock" to Prevent SIM Swap Attacks
AT&T has launched a security feature named "Wireless Lock" aimed at safeguarding customers from SIM swap attacks by disabling changes to customer accounts and phone number porting. The feature ensures no modifications can occur to a user's phone number, billing information, authorized users, or phone line transfers without first disabling this lock. Previously tested with a select group of customers, this newly comprehensive service is now available to all AT&T subscribers. SIM swap fraud involves cybercriminals transferring a victim's phone number to a device they control, thus accessing calls, texts, and crucially, multi-factor authentication codes. This cybersecurity measure by AT&T comes considerably later than similar offerings by other telecom giants like Verizon, which introduced it nearly five years ago. SIM swap attacks have been linked to significant thefts, including a notable case in 2020 where over $794,000 in cryptocurrency was stolen. The FCC has implemented new regulations in 2023 requiring tighter identity verification for SIM swaps and number transfers to further combat this type of cybercrime.
Details
2025-07-01 19:11:56 bleepingcomputer MISCELLANEOUS Microsoft Releases VS Code Copilot Chat as Open Source
Microsoft has open-sourced the GitHub Copilot Chat extension for Visual Studio Code, making the source code publicly available under the MIT license. This release provides transparency on how the AI-based coding assistant operates, including its "agent mode," data sent to large language models, and the design of system prompts. The decision to open source marks a key step in Microsoft's strategy to incorporate artificial intelligence directly into its popular coding editor, outlined initially in May 2025. GitHub Copilot Chat, using a GPT4-based model, assists developers by allowing them to chat with the AI model within VS Code, enhancing coding efficiency. The repository also provides details on telemetry collection mechanisms, increasing transparency regarding data privacy and usage in AI tools. The extension has gained significant popularity, with over 35 million installations, reflecting the growing trend of LLM-assisted coding solutions. Despite the open-sourcing of the Copilot Chat extension, the original GitHub Copilot extension remains proprietary, with plans to merge its features into the open source module in the future. Developers are encouraged to explore, contribute to, and provide feedback on the open-sourced project, with comprehensive documentation and FAQs provided to support them.
Details
2025-07-01 19:06:08 theregister MISCELLANEOUS Microsoft Intune Update Causes Customization Reset Issues
Microsoft Intune, a cloud-based endpoint management service, is experiencing issues with saving security baseline customizations during updates. Administrators using Intune are recommended to manually reapply their customizations after updating baseline policies due to this glitch. The problem specifically affects those who update their security baseline to a newer version, such as from 23H2 to 24H2. Microsoft Intune is used by organizations for managing device configurations and policy updates, competing with traditional on-premises tools. This issue poses significant inconvenience and potential workflow interruptions for IT administrators who rely on specific customized settings. Microsoft suggests that the resolved default values may not align with every organization's unique operational needs. There is currently no permanent fix provided by Microsoft; the solution offered involves a temporary manual adjustment by administrators.
Details