Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11759

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-10-20 14:30:01 bleepingcomputer VULNERABILITIES October Windows Updates Cause Smart Card Authentication Issues
Microsoft's October 2025 security updates have led to smart card authentication and certificate issues across all Windows 10, Windows 11, and Windows Server versions. The issue arises from a change in Windows Cryptographic Services, transitioning from CSP to KSP for RSA-based smart card certificates to enhance security. Users may experience errors such as "invalid provider type specified" and "CryptAcquireCertificatePrivateKey error" due to this update. The problem is linked to a fix for CVE-2024-30098, which addresses a security feature bypass vulnerability by isolating cryptographic operations. Affected users can temporarily resolve the issue by modifying the DisableCapiOverrideForRSA registry key, though this workaround will be removed by April 2026. Microsoft advises users to collaborate with application vendors to address the underlying issue before the registry key's removal. The update also resolved issues with IIS websites and HTTP/2 localhost connections, and lifted compatibility holds for Windows 11 24H2 upgrades.
Details
2025-10-20 14:03:31 bleepingcomputer MALWARE Huntress Labs Identifies Malicious OAuth Apps in Microsoft 365 Environments
Huntress Labs has developed an open-source tool, Cazadora, to detect malicious OAuth applications within Microsoft 365 environments, addressing a significant security risk for enterprises. The tool targets Enterprise Applications and Application Registrations, identifying apps with suspicious characteristics such as anomalous names and reply URLs. Huntress' Security Operations Center (SOC) has mitigated thousands of identity attacks monthly, leveraging new capabilities to combat credential and token theft. Research indicates that approximately 10% of surveyed tenants had Traitorware apps, which are legitimate applications frequently exploited by cybercriminals. Stealthware apps, custom-built for malicious purposes, were found in over 500 instances across Huntress partner tenants, highlighting the need for vigilant app monitoring. The Cazadora script aids Azure administrators in auditing their tenant apps, providing a proactive measure against potential security breaches. Organizations are encouraged to utilize the Huntress Identity Security Assessment for a comprehensive evaluation of their Microsoft 365 identity threat landscape.
Details
2025-10-20 12:32:32 thehackernews NATION STATE ACTIVITY F5 Systems Breached by China-Linked Espionage Group UNC5221
F5 disclosed a breach involving unauthorized access to its systems, resulting in the theft of BIG-IP source code and undisclosed vulnerabilities, attributed to the China-linked group UNC5221. The breach was discovered on August 9, 2025, but attackers reportedly maintained access for over a year, exploiting the BRICKSTORM malware family. Elevated scanning activity targeting BIG-IP was observed in September and October 2025, although not directly linked to the breach. Over 680,000 F5 BIG-IP devices are publicly accessible, with the majority located in the U.S., necessitating proactive inventory and patch management. The incident underscores the strategic targeting of edge infrastructure by state-linked actors, emphasizing the need for robust security and intelligence collaboration. Organizations are advised to implement Zero Trust architectures and leverage AI to enhance threat detection and response capabilities. This breach serves as a reminder of the critical importance of securing edge devices and maintaining vigilance against long-term infiltration attempts.
Details
2025-10-20 11:55:20 thehackernews VULNERABILITIES ClickFix Attacks Exploit User Interaction for Security Breaches
ClickFix attacks prompt users to execute malicious scripts via browser interactions, exploiting user unawareness and bypassing traditional email-based phishing detection methods. These attacks have been linked to significant data breaches at organizations like Kettering Health and Texas Tech University Health Sciences Centers. Attackers employ SEO poisoning and malvertising to lure users, using legitimate-looking sites to trick them into copying and running harmful code. Technical defenses struggle as ClickFix attacks evade detection by camouflaging domains and using obfuscation techniques, bypassing email and web-crawling security tools. Endpoint Detection and Response (EDR) systems are the primary defense but face challenges due to user-initiated actions and sophisticated evasion tactics. Push Security has introduced a browser-based detection tool designed to block malicious copy-paste actions, offering a proactive defense against ClickFix attacks. Organizations are advised to enhance user training and consider adopting browser-based security solutions to mitigate the risks associated with these evolving threats.
Details
2025-10-20 10:53:33 thehackernews MALWARE Chrome Extensions Exploit WhatsApp Web for Large-Scale Spam Campaign
Cybersecurity researchers identified 131 Chrome extensions used to hijack WhatsApp Web for spam, affecting approximately 20,905 active users, primarily in Brazil. These extensions, sharing a common codebase, automate message sending to bypass WhatsApp's anti-spam measures, posing significant risks to platform integrity. The extensions are marketed under various names and logos, often masquerading as CRM tools, despite violating Google's Chrome Web Store Spam and Abuse policy. DBX Tecnologia, the company behind these extensions, promotes a reseller program allowing affiliates to rebrand and distribute the software, promising substantial recurring revenue. The campaign has been ongoing for at least nine months, with recent updates indicating sustained activity and adaptation to platform defenses. Security firms Trend Micro, Sophos, and Kaspersky have also reported related campaigns targeting Brazilian users with a WhatsApp worm distributing a banking trojan. The situation underscores the need for enhanced monitoring of browser extension ecosystems to prevent similar abuses and protect users from deceptive practices.
Details
2025-10-20 07:25:06 theregister MISCELLANEOUS UK Launches Digital Veteran Card Amid Implementation Delays
The UK government has initiated a digital version of the Veteran Card, aimed at simplifying access to services and discounts for Armed Forces veterans. Originally scheduled for a summer release, the digital card's launch is delayed, with no specific reasons provided by the Department for Science, Innovation and Technology (DSIT). The digital card will be integrated into the GOV.UK One Login app, which is designed to securely store digital credentials and facilitate public service access. The initiative is part of a broader government strategy to modernize public services, making them more accessible and user-friendly through digital transformation. The digital Veteran Card is distinct from the broader digital ID scheme but utilizes the same secure technology platform, ensuring high security standards. The government is considering expanding digital IDs for voter identification, reflecting a push towards digital solutions in democratic processes. As more credentials are added to the GOV.UK Wallet, the government aims to enhance its functionality and reach a wider user base.
Details
2025-10-20 05:35:22 thehackernews NATION STATE ACTIVITY China Accuses NSA of Cyber Attack on National Time Service Center
China's Ministry of State Security (MSS) accused the U.S. NSA of a cyber attack on the National Time Service Center (NTSC), claiming the operation was premeditated and aimed at destabilizing Beijing Time. The MSS reported that the NSA used 42 cyber tools in a multi-stage attack, exploiting security flaws in a foreign SMS service to compromise NTSC staff mobile devices. The attack, which began in March 2022, involved the theft of sensitive data and attempts to disrupt NTSC's high-precision timing systems, posing risks to critical infrastructure. The MSS stated that the U.S. used virtual private servers across multiple regions to conceal the origins of the attack, employing tactics like digital certificate forgery and encryption to evade detection. China's national security agencies reportedly neutralized the attack and enhanced security measures to protect the integrity of Beijing Time and associated systems. The MSS accused the U.S. of ongoing cyber operations against China and other regions, using technological footholds in Asia to obscure its involvement. The incident adds tension to U.S.-China relations, with allegations of cyber espionage and counterclaims of misinformation and public manipulation.
Details
2025-10-19 18:31:37 bleepingcomputer MALWARE TikTok Videos Exploit ClickFix to Spread Aura Stealer Malware
Cybercriminals are leveraging TikTok to distribute infostealers by disguising videos as activation guides for software like Windows, Spotify, and Netflix. The campaign, identified by ISC Handler Xavier Mertens, uses social engineering tactics to execute malicious PowerShell commands on users' systems. Users are tricked into running commands that connect to remote sites, downloading malware such as Aura Stealer, which harvests credentials and sensitive data. Aura Stealer targets saved browser credentials, authentication cookies, and cryptocurrency wallets, posing significant risks of account compromise. An additional payload, source.exe, is downloaded and executed in memory, though its exact purpose remains unknown. Victims are advised to reset all passwords immediately, as their credentials are likely compromised. ClickFix attacks have surged in popularity, often linked to ransomware and cryptocurrency theft campaigns. Users should avoid executing commands from untrusted sources to mitigate the risk of such malware infections.
Details
2025-10-19 06:17:30 thehackernews CYBERCRIME Europol Dismantles Global SIM Farm Network Enabling Cybercrime-as-a-Service
Europol's Operation SIMCARTEL disrupted a cybercrime-as-a-service platform, arresting seven suspects and seizing 1,200 SIM box devices with 40,000 active SIM cards. The operation involved authorities from Austria, Estonia, Finland, and Latvia, in collaboration with Europol and Eurojust, targeting a network facilitating global cybercrime. The dismantled network enabled the creation of over 49 million fake online accounts, used for phishing, financial fraud, and other cybercrimes, impacting victims worldwide. Authorities seized €431,000 in bank accounts and €266,000 in cryptocurrency, along with four luxury vehicles, highlighting the financial scale of the operation. The network's infrastructure was sophisticated, providing temporary phone numbers from over 80 countries for anonymous criminal activities, including social media fraud and identity concealment. The platform's services extended to extortion, migrant smuggling, and distribution of child sexual abuse material, showcasing its broad criminal application. The takedown of websites gogetsms[.]com and apisim[.]com disrupted the network's online presence, marking a significant blow to its operations. This operation underscores the importance of international cooperation in combating complex cybercrime networks that exploit telecommunications infrastructure for illicit gains.
Details
2025-10-18 15:07:03 bleepingcomputer MALWARE Malicious Campaign Targets macOS Developers with Infostealing Malware
A new campaign is exploiting macOS developers by distributing infostealing malware through fake Homebrew, LogMeIn, and TradingView platforms. The attack utilizes Google Ads to promote malicious sites that mimic legitimate platforms, tricking users into executing harmful commands. Researchers identified over 85 domains impersonating these platforms, leveraging "ClickFix" techniques to deceive users into installing malware. The malware, including AMOS and Odyssey Stealers, is delivered via base64-encoded commands that bypass macOS security features like Gatekeeper. Once installed, the malware collects hardware information, manipulates system services, and exfiltrates sensitive data, including browser credentials and cryptocurrency information. AMOS operates as a malware-as-a-service, offering remote access capabilities, while Odyssey targets browser data and cryptocurrency wallets. Users are advised against executing Terminal commands from untrusted sources to prevent infection and data theft.
Details
2025-10-18 11:46:14 thehackernews MALWARE New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Sectors
Seqrite Labs has identified a new .NET malware, CAPI Backdoor, targeting Russian automobile and e-commerce firms through phishing emails containing ZIP archives. The attack utilizes a decoy Russian-language document and a Windows shortcut (LNK) file to execute the malware via a legitimate Microsoft binary, leveraging a living-off-the-land technique. CAPI Backdoor is capable of stealing data from web browsers, taking screenshots, collecting system information, and exfiltrating data to a remote server. The malware employs methods to establish persistence, including scheduled tasks and LNK files in the Windows Startup folder, ensuring continued access to compromised systems. The campaign's connection to the Russian automobile sector is suggested by a domain impersonating "carprice[.]ru," indicating targeted industry focus. The malware's ability to evade detection by checking for virtual environments and installed antivirus products poses a significant challenge to security measures. Organizations in the targeted sectors are advised to enhance email security protocols and monitor for suspicious activity linked to the identified malware indicators.
Details
2025-10-18 06:51:23 thehackernews MALWARE Silver Fox Expands Winos 4.0 Malware Campaign to Japan and Malaysia
Silver Fox, a Chinese cybercrime group, has broadened its Winos 4.0 malware attacks to include Japan and Malaysia, utilizing the HoldingHands RAT for remote access. The group employs phishing emails with malicious PDFs masquerading as official documents to initiate infections, targeting unsuspecting users in these regions. Winos 4.0 spreads through phishing and SEO poisoning, directing victims to fake websites imitating popular software platforms like Google Chrome and Telegram. Recent campaigns have shifted focus to Malaysia, using deceptive landing pages to distribute the HoldingHands RAT, which conducts anti-VM checks and terminates security processes. The HoldingHands RAT communicates with a remote server, executes attacker commands, and can update its command-and-control address via the Windows Registry. Operation Silk Lure, a related campaign, targets Chinese fintech and trading firms with phishing emails containing malicious LNK files, leading to Winos 4.0 deployment. The malware's capabilities include persistence, reconnaissance, and evasion techniques, posing significant risks of espionage, identity theft, and credential compromise.
Details
2025-10-17 19:31:01 bleepingcomputer VULNERABILITIES ConnectWise Patches Critical Automate Flaws Preventing Potential AiTM Attacks
ConnectWise has released a critical security update for its Automate platform, addressing vulnerabilities that could lead to adversary-in-the-middle attacks and unauthorized data interception. The most severe flaw, CVE-2025-11492, rated 9.6 in severity, involves potential cleartext transmission of sensitive information, exposing communications to interception and modification. A second vulnerability, CVE-2025-11493, with an 8.8 severity score, lacks integrity verification for update packages, allowing attackers to push malicious files as legitimate updates. These vulnerabilities could enable attackers to impersonate a valid ConnectWise server and deploy malware or unauthorized updates to client machines. ConnectWise has updated cloud-based instances to the latest Automate release, 2025.9, and advises on-premise users to install the update promptly. Although there is no mention of active exploitation, the vulnerabilities pose a significant risk of being targeted by future exploits. Past incidents with ConnectWise products, including breaches by nation-state actors, underline the importance of timely patch management and security vigilance.
Details
2025-10-17 19:14:43 bleepingcomputer DATA BREACH Envoy Air Confirms Data Theft by Clop Extortion Group
Envoy Air, an American Airlines subsidiary, reported a data breach involving its Oracle E-Business Suite, attributed to the Clop extortion group. The breach did not compromise sensitive or customer data but involved limited business and commercial contact information. The Clop group has begun leaking the stolen data, criticizing the company's security measures on their leak site. The incident is part of a broader campaign by Clop, exploiting a zero-day vulnerability, CVE-2025-61882, in Oracle systems. CrowdStrike and Mandiant confirmed Clop's use of these vulnerabilities in August to breach systems and deploy malware. Oracle has since patched the exploited zero-day vulnerabilities, including another recent one, CVE-2025-61884. Clop's activities extend beyond Envoy Air, with other organizations, including Harvard University, also impacted by similar attacks. The U.S. State Department offers a $10 million reward for information linking Clop's activities to any foreign government.
Details
2025-10-17 17:09:09 bleepingcomputer CYBERCRIME Europol Dismantles Major SIM Box Operation Enabling Global Fraud
Europol's operation, codenamed 'SIMCARTEL', dismantled an illegal SIM-box service facilitating over 3,200 fraud cases, resulting in losses exceeding EUR 4.5 million. The operation involved seizing 1,200 SIM-box devices and 40,000 SIM cards used for telecommunication crimes, including phishing, investment fraud, and extortion. The cybercriminal service operated through websites gogetsms.com and apisim.com, now seized and displaying law enforcement banners. The fraudulent service provided phone numbers from over 80 countries, aiding in the creation of more than 49 million fake online accounts. Authorities linked the service to 1,700 fraud cases in Austria and 1,500 in Latvia, with significant financial impacts in both countries. The operation led to the arrest of five Latvian nationals and two other suspects, with forensic analysis of seized servers ongoing. The collaborative effort involved law enforcement from Austria, Estonia, Finland, and Latvia, conducting 26 searches to dismantle the network.
Details