• At the lowest point of the Civil War, Abraham Lincoln characterized the core factor between victory and defeat as finding a general who understood the “awful arithmetic” of war. War is a contest of blood and treasure; each can, and must, ultimately be counted and measured. It has been the same for every conflict before and after. 

    Yet this arithmetic is constantly changing, and never faster than right now. If the United States cannot update its calculations to properly reflect our new era, our failure will not just cost us blood and treasure, but will drive us toward defeat.

    Cost imposition has long been a tenet of U.S. strategy. During the Cold War, the U.S. launched expensive programs such as stealth and Star Wars not just for their tactical value, but to send a strategic signal to the Kremlin: neither your economy nor your war machine can keep up. Gorbachev, persuaded, gave up the decades-long competition with the U.S. 

    The very same concept of cost imposition was also elemental to the most celebrated operations of the past year. In Operation Spider’s Web, Ukraine used inexpensive drones, reportedly costing less than $500 each, to damage strategic bombers worth many millions of dollars, degrading Russia’s long-range strike capabilities for years to come. Similarly, in Operation Rising Lion, cheap Israeli drones took out Iranian surface-to-air missiles and radars, paving the way for the destruction of command and nuclear facilities worth tens of billions of dollars. In each, the tactical became the strategic through new operational concepts that leveraged the new math of new technologies. 

    Now contrast this with our own approaches, which overwhelmingly rely on sophisticated but costly overmatch.

    The most lauded U.S. operation of 2025 was Operation Midnight Hammer, our followup to Rising Lion. One estimate put its cost at $196 million, from combining B-2 bomber’s nearly $160,000 per flight hour and Tomahawk missiles' rough price of $1.87 million apiece. (It does not count the initial purchase of the seven B-2 Bombers that cost $2.1 billion each, nor the $4.3 billion submarine that launched the missiles.) 

    Perhaps it was worth spending one-fifth of a billion dollars to damage Iranian nuclear facilities, but the numbers in Operation Rough Rider—the strikes against the Houthis last spring—illustrate the problem more starkly. The Pentagon spent roughly $5 billion on munitions and operating costs to stop attacks on Red Sea shipping, which simply started back up this month.

    The same awful arithmetic haunts the current operations in the Caribbean against the Venezuela-based, government-connected Cartel de los Soles. The entity was recently designated by the Trump administration as a foreign terrorist organization, as part of its argument that US forces are engaged in an “armed conflict.” The cartel was declared by the Department of Justice to be the hub of a cocaine transport network, shipping a reported street value of between $6.25 billion and $8.75 billion in drugs (the cartel gets an unknown, but clearly lesser, percentage of that overall value in actual profit). 

    To battle this foe, the United States has assembled a fleet that cost at least $40 billion to buy in total. The carrier Ford alone cost $4.7 billion to develop and $12.9 billion to build. The fleet is backed by at least 83 aircraft of assorted types, including 10 F-35Bs ($109 million apiece), seven Predator drones ($33 million each), three P-8 Poseidons ($145 million per), and at least one AC-130J gunship ($165 million). To be sure, all of these assets will continue to serve long after Operation Southern Spear is wound down, but this is how we are using the investment. 

    But the current cost of operations and expendables hardly tells a better story. The Ford alone costs about $8 million a day to run. The F-35s and AC-130J cost about $40,000 per flight hour; the P-8s, about $30,000; the Reapers, about $3,500.

    Analysis of the strike videos on the 21 boats show that U.S. forces have fired AGM-176 Griffins ($127,333 apiece in 2019), Hellfires (running about $150,000 to $220,000) and potentially GBU-39B Small Diameter Bombs ($40,000). In some cases, they are reportedly firing four munitions per strike: “twice to kill the crew and twice more to sink it.”

    All this is arrayed to sink motorboats, 21 at last report. One of the boats was described by Pentagon officials as a 39-foot Flipper-type vessel with four 200-horsepower engines. New ones go for about $400,000 on Boats.com, but the old, open top motorbots in the videos are obviously well below that in cost. Their crews have been reported as making $500 per trip.

    Put in comparison, the cost of the US naval fleet deployed is at least five times what the cartel makes in smuggling. The air fleet deployed costs at least another two times more.  It is roughly 5,000 times the cost of the suspected drug boats that have been destroyed. Indeed, just the cost of operating the Ford off Venezuela for a single day has still not yet equaled the maximum cost the cartel paid for the boats it has lost.

    In the air, the U.S. military spent roughly 66,000 times more to buy each unmanned drone in the operation than the cartel paid each man that the unmanned drones killed. The US spent between 80 to 300 times more for each bomb or missile it has used than the cartel paid each man killed by those bombs or missiles. 

    The math is arguably even worse when we're on the defense. 

    In September, a wave of 19 Russian drones crossed into Polish airspace.. The Gerbera-type drones cost as little as $10,000—so cheap that they are often used as decoys to misdirect and overwhelm Ukrainian air defenses. NATO countered with a half-billion-dollar response force of F-35s, F-16s, AWACS radar planes, and helicopters, which shot down four of the drones with $1.6-million AMRAAM missiles. 

    This is a bargain compared to how challenging U.S. forces have found it to defend against Houthi forces using this same cheap tech. Our naval forces have fired a reported 120 SM-2, 80 SM-6, and 20 SM-3 missiles, costing about $2.1 million, $3.9 million, and over $9.6 million each. And this is to defend against a group operating out of the 187th-largest economy in the world, able to fire mere hundreds of drones and missiles. Our supposed pacing challenge, China, has an economy that will soon be the largest in the world and a combined national industrial and military acquisition plan to be able to fire munitions by the millions. 

    Even in America’s best-laid plans for future battlefields, there is a harsh reality that is too often ignored. The math of current battlefields remains literally orders of magnitude beyond what our budget plans to spend, our industry plans to build, our acquisitions system is able to contract, and thus what our military will deploy. 

    As a point of comparison, Ukraine is on pace to build, buy, and use over four million drones this year. The U.S. Army, meanwhile, aims to acquire 50,000 drones next year—about 1.25 percent of the Ukrainian total. In its most optimistic plans, it hopes to be able to acquire 1 million drones “within the next two to three years.” ​​ 

    When you spend orders of magnitude more than your foe, you are in what is known as a “losing equation.” And if we don’t change this math, we will need an update to Norm Augustine’s infamous “law” of defense acquisitions. Back in 1979, Augustine calculated that if the Pentagon couldn’t curtail the cost curve of its purchasing, by 2054 we wouldn’t be able to afford a single plane. 

    The 2025 version is that if we don't master the new math of the battlefield, we won’t be able to afford to win a single battle.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • India’s Department of Telecommunications (DoT) has ordered smartphone manufacturers to preload a government-backed cybersecurity app, “Sanchar Saathi,” on all new devices sold in the country.

    The order, issued privately on November 28, 2025, gives major players like Apple, Samsung, Xiaomi, Vivo, and Oppo 90 days to comply, requiring the “Sanchar Saathi” app to be installed as a non-removable feature on every handset.​

    The move signals a significant tightening of state control over consumer electronics in the world’s second-largest telecom market, which boasts over 1.2 billion subscribers.

    Government officials argue the measure is a critical defense against a surge in digital fraud and cybercrime. According to the directive, the app serves as a “citizen-centric” shield, enabling authorities to curb the use of stolen phones and combat spoofed IMEI numbers, which are often used in criminal activities.​

    Sanchar Saathi: A Digital “Communication Companion”

    Launched earlier this year, the Sanchar Saathi (Hindi for “Communication Companion”) platform was initially a web portal designed to empower mobile subscribers. The mandatory app version integrates several key safety features directly into the user interface:​

    • Chakshu: A reporting tool for suspected fraud communications, including malicious calls, SMS, or WhatsApp messages.​
    • Lost/Stolen Mobile Blocking: Uses the Central Equipment Identity Register (CEIR) to block stolen devices across all networks, rendering them useless to thieves.​
    • Connection Management: Allows users to check “Know Mobile Connections in Your Name” to identify unauthorized SIM cards registered against their identity.​
    • Genuineness Checks: Verifies if a device’s hardware and IMEI are authentic.​

    While the government highlights recovered devices over 700,000 lost phones have reportedly been traced using the system, the mandatory nature of the app has sparked immediate concern.​

    Industry Pushback and Privacy Fears

    The directive requires that the app be “undeletable,” a condition that is likely to upset privacy advocates and manufacturers like Apple, which has historically resisted preloading third-party software.

    Industry executives, speaking on condition of anonymity, expressed frustration over the lack of prior consultation, fearing the “forced” app could compromise user trust and device performance.​

    Privacy advocates are concerned that a government-controlled app with extensive system access could theoretically be used for surveillance. However, the Indian government has consistently denied such intentions, stating that the directive is solely a consumer protection measure.

    Manufacturers must also push the app to existing devices via software updates, ensuring the entire active user base is eventually covered.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post India Mandates ‘Undeletable’ Government Cybersecurity App for All Smartphones appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A malicious Visual Studio Code extension posing as the popular “Material Icon Theme” has been used to attack Windows and macOS users, turning the add-on into a hidden backdoor.

    The fake extension shipped through the marketplace with backdoored files, giving the attackers a direct path into developer workstations once it was installed.

    After installation, the extension behaved like a normal icon theme, so most users had no reason to suspect anything was wrong.

    Behind the scenes, the package contained two Rust-based implants that were ready to run native code on both operating systems and reach out to a remote command server.

    Nextron Systems security researchers identified the implants in version 5.29.1 and traced their execution back to a loader script named extension.js placed in dist/extension/desktop next to the native payloads os.node on Windows and darwin.node on macOS.

    This shows how the malicious files mirror the folder tree of the real extension to blend in.

    darwin.node dylib (Source - Nextron Systems)
    darwin.node dylib (Source – Nextron Systems)

    Once the extension is activated in VS Code, extension.js loads the correct Rust implant for the current platform and hands control over to the attacker code.

    From that moment, the extension stops being a harmless add-on and becomes a loader for further stages that are fully controlled from outside the victim machine.

    Infection mechanism and command chain

    This section provides a complete technical breakdown of how the implants talk to their command server and fetch follow-up payloads.

    The Rust binaries do not use a fixed URL. Instead, they pull their instructions from data stored in a Solana blockchain wallet address, which acts as a hard-to-block control channel.

    A simplified view of the loader logic in extension.js is shown below:-

    function activate() {
      const bin = process.platform === "win32" ? "os.node" : "darwin.node";
      const native = require(__dirname + "/desktop/" + bin);
      native.run();
    }

    The native code reads the wallet data, base64-decodes it, and then contacts a command server to download a large base64 blob, which is an AES-256-CBC-encrypted JavaScript file.

    A fallback, from a Google Calendar event (Source - Nextron Systems)
    A fallback, from a Google Calendar event (Source – Nextron Systems)

    As a backup, the same next stage can also be fetched from a hidden Google Calendar event that stores the payload URL with invisible Unicode tricks. This illustrates the C2 chain from the blockchain wallet to the decrypted script.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Malicious VS Code Extension as Icon Theme Attacking Windows and macOS Users appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Advanced steganography techniques are becoming increasingly central to state-sponsored cyber operations.

    Recent analysis has exposed two Chinese technology companies, BIETA and CIII, that allegedly provide sophisticated steganography solutions to support advanced persistent threat campaigns.

    These organizations operate as front companies linked to China’s Ministry of State Security, playing a critical role in modernizing the country’s intelligence gathering capabilities.

    BIETA, formally known as the Beijing Institute of Electronics Technology and Application, operates from a location adjacent to the MSS headquarters in Beijing.

    The company maintains close institutional ties with government agencies and universities, including the University of International Relations, which functions as an MSS subsidiary.

    CIII, operating as Beijing Sanxin Times Technology Co., Ltd., presents itself as a state-owned enterprise while reportedly providing forensic and counterintelligence support services.

    Both organizations maintain detailed focus on developing advanced hiding techniques for malicious payloads.

    Security analysts at Telsy identified that these companies have dedicated substantial resources to steganographic research and development.

    Analysis of academic publications reveals that approximately 46 percent of BIETA’s 87 research papers published between 1991 and 2023 specifically address steganography.

    The companies have obtained multiple software copyrights for techniques including audiovisual-to-voice conversion systems and JPEG image forensic differentiation methods, both registered in 2017.

    Steganography implementation strategies

    The steganography implementation strategies employed represent a significant technical shift in APT operations.

    Rather than relying solely on traditional encryption, threat actors use Least Significant Bit steganography to conceal .NET payloads within image files.

    BIETA’s research extends beyond standard JPEG formats to include MP3 audio and MP4 video files for covert information transmission.

    Historical APT groups including APT1, Mirage, Leviathan, and Pirate Panda have all utilized similar techniques to distribute backdoors like TClinet and Stegmap without triggering conventional detection systems.

    The technical innovation extends to emerging technologies, with BIETA researchers exploring Generative Adversarial Networks for steganographic applications.

    This advancement suggests future APT operations may employ AI-driven methods to generate undetectable carrier files.

    Understanding these techniques remains essential for defensive security teams as state-sponsored actors continue refining their ability to hide malicious communications within seemingly innocuous media files, making detection increasingly challenging for traditional security monitoring tools and approaches.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new remote access trojan dubbed KimJongRAT has surfaced, posing a severe threat to Windows users.

    This sophisticated malware is believed to be orchestrated by the Kimsuky group, a threat actor with alleged state backing.

    The campaign typically begins with a phishing email containing a deceptive archive named National Tax Notice, which lures unsuspecting victims into initiating the infection chain.

    Upon opening the malicious archive, users are presented with a shortcut file disguised as a legitimate PDF document.

    Tax notice.pdf (Source - Alyac)
    Tax notice.pdf (Source – Alyac)

    When executed, this shortcut file triggers a hidden command that decodes a Base64 URL and abuses the legitimate Microsoft HTML Application utility to contact a remote server.

    This process stealthily downloads an additional payload known as tax.hta, effectively bypassing standard security checks.

    Alyac security analysts identified that this loader script is implemented in VBScript and employs clever evasion techniques.

    The malware attempts to evade detection by utilizing legitimate services like Google Drive to host its malicious components.

    Once active, the loader retrieves both decoy documents to trick the user and the actual malicious binaries required for the next stage of the attack.

    Exfiltration of sensitive data

    The primary objective of this campaign is the exfiltration of sensitive personal and financial data.

    The malware targets a wide array of information, including system details, browser storage data, and encryption keys.

    It specifically hunts for cryptocurrency wallet information and credentials for communication platforms like Telegram and Discord, making it a highly dangerous tool for identity theft and financial fraud.

    The most notable aspect of KimJongRAT is its ability to adapt its behavior based on the target environment’s security posture.

    The malware executes a specific VBScript command to check the status of Windows Defender before proceeding.

    It uses the code snippet Set exec = oShell.Exec(ss) followed by If InStr(output, “STOPPED”) > 0 Then to determine if the security service is active.

    If Windows Defender is disabled, the malware downloads a file named v3.log, which executes the primary payload.

    Conversely, if security is active, it retrieves an alternative file called pipe.log to circumvent detection.

    Regardless of the path taken, the malware establishes persistence by registering itself in the system registry, ensuring it runs automatically to transmit stolen data periodically.

    List of cryptocurrency wallets hijacked by malware (Source - Alyac)
    List of cryptocurrency wallets hijacked by malware (Source – Alyac)

    While the List of cryptocurrency wallets hijacked by malware highlights the breadth of targeted applications, it also highlights the specific financial intent behind this tailored threat.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post KimJongRAT Attacking Windows Users via Weaponized .hta Files to Steal Logins appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated cyberespionage campaign dubbed “Operation Hanoi Thief” has surfaced, specifically targeting IT professionals and recruitment teams in Vietnam.

    Discovered on November 3, 2025, this threat activity employs a complex multi-stage infection chain designed to harvest sensitive browser credentials and history.

    The attackers leverage a malicious spear-phishing strategy, distributing a ZIP archive named Le-Xuan-Son_CV.zip, which masquerades as a legitimate job application from a software developer based in Hanoi.

    The infection initiates when a victim interacts with a shortcut file, CV.pdf.lnk, contained within the archive. This file triggers a sequence of events utilizing “Living off the Land” (LOLBin) tactics.

    Specifically, it abuses the Windows ftp.exe utility with the -s flag to execute a batch script hidden within a pseudo-polyglot file named offsec-certified-professional.png.

    This file dual-functions as a harmless image lure and a malicious container, effectively evading traditional detection mechanisms by burying its payload within legitimate image headers.

    Data Exfiltration (Source - Seqrite)
    Data Exfiltration (Source – Seqrite)

    This command line argument is a critical indicator of the attack’s stealthy nature.

    Seqrite security analysts identified that this campaign is likely of Chinese origin, citing overlaps in tactics with previous state-sponsored activities.

    The primary objective appears to be intelligence gathering, focusing on the theft of login data and browsing habits from victims in the technology and HR sectors.

    By exploiting the trust inherent in recruitment processes, the threat actors successfully bypass initial perimeter security layers.

    Technical Analysis of the LOTUSHARVEST Payload

    The core of this attack is the execution of the LOTUSHARVEST implant. Once the initial script runs, it abuses DeviceCredentialDeployment.exe to conceal its command-line activities and renames system utilities like certutil.exe to lala.exe to bypass monitoring.

    In the infection chain, the script then extracts a base64-encoded blob from the polyglot file, decoding it into a malicious DLL named MsCtfMonitor.dll.

    Infection Chain (Source - Seqrite)
    Infection Chain (Source – Seqrite)

    This DLL is side-loaded using a legitimate ctfmon.exe binary copied to the C:\ProgramData directory.

    LOTUSHARVEST functions as a robust information stealer, employing anti-analysis checks like IsDebuggerPresent and IsProcessorFeaturePresent to crash if analyzed.

    It targets Google Chrome and Microsoft Edge, querying SQLite databases to extract the top 20 visited URLs and decrypting up to five saved credentials using CryptUnprotectData.

    Finally, the stolen data is formatted into JSON and exfiltrated via an HTTPS POST request to the attacker-controlled server eol4hkm8mfoeevs.m.pipedream.net/service.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • With the holiday shopping season kicking into high gear, a massive cybersecurity threat has emerged, putting online shoppers at significant risk.

    A coordinated campaign has been discovered, involving the registration of over 2,000 fake holiday-themed online stores.

    These malicious sites are designed to lure unsuspecting consumers with the promise of steep discounts, only to steal their payment information and personal data.

    The scale of this operation is vast, with two distinct clusters of fraudulent storefronts identified, both employing sophisticated tactics to appear legitimate and deceive shoppers.

    The first cluster primarily consists of typosquatted domains mimicking Amazon, while the second spans a wide array of “.shop” domains impersonating well-known brands such as Apple, Samsung, and Ray-Ban.

    These fake stores are not isolated incidents but part of a large-scale, automated campaign. The threat actors behind this operation have timed their attack to coincide with peak shopping periods like Black Friday and Cyber Monday, when consumers are actively hunting for bargains and may be less cautious about unfamiliar websites.

    Fake storefront (Source - CloudSEK)
    Fake storefront (Source – CloudSEK)

    CloudSEK security researchers noted the coordinated nature of these scams, identifying the use of identical phishing kits, recurring website templates, and shared infrastructure across the network of fake stores.

    This level of coordination suggests a well-organized and resourced operation. The impact on consumers is severe, ranging from direct financial losses to the long-term risks of identity theft.

    Furthermore, these scams erode trust in legitimate online retailers and the e-commerce ecosystem as a whole.

    Infection and Deception Tactics

    The modus operandi of these fake stores is both simple and effective. They leverage a combination of social engineering and technical evasion to trick users and avoid detection.

    The sites are designed to look like professional e-commerce platforms, complete with holiday-themed banners, countdown timers creating a false sense of urgency, and fake “trust badges” to build credibility.

    Fabricated “recent purchase” pop-ups are also used to create social proof and pressure visitors into making a purchase.

    Fake Landing Page (Source - CloudSEK)
    Fake Landing Page (Source – CloudSEK)

    When a user attempts to buy a product, they are redirected to a shell checkout page designed to harvest their billing and payment details.

    These shell websites often use unflagged domains to process transactions, allowing the attackers to bypass fraud detection systems.

    Fake & Impersonating Domains:-

    Domain ClusterImpersonated BrandFake Domain Examples
    Cluster A (Amazon-themed)Amazonamaboxhub.com, amawarehousesale.com, amaznshop.com
    Cluster B (.shop domains)Xiaomixiaomidea.shop
    Jo MaloneJomalonesafe.shop
    FujifilmFujifilmsafe.shop
    SamsungSamsungsafe.shop
    A popular brand[brand]safe.shop or [brand]fast.shop

    The investigation also revealed that a shared Content Delivery Network (CDN), cdn.cloud360.top, was used to serve assets to over 750 of the fake stores, further highlighting the centralized nature of the campaign.

    A recurring JavaScript file, identified by its unique SHA-256 hash, was also found across numerous malicious .shop domains, controlling the fraudulent checkout process.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Registered 2,000+ Fake Holiday-Themed Online Stores to Steal User Payments appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New York, New York, December 1st, 2025, CyberNewswire BreachLock, the global leader in Penetration Testing as a Service (PTaaS), has been named a Leader and Fast Mover in the 2025 GigaOm Radar Report for PTaaS for the third year in a row. The GigaOm Radar Report for PTaaS is published annually to help security leaders and practitioners […]

    The post BreachLock Named a Leader in 2025 GigaOm Radar Report for Penetration Testing as a Service (PTaaS) for Third Consecutive Year appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New York, New York, December 1st, 2025, CyberNewswire

    BreachLock, the global leader in Penetration Testing as a Service (PTaaS), has been named a Leader and Fast Mover in the 2025 GigaOm Radar Report for PTaaS for the third year in a row.

    The GigaOm Radar Report for PTaaS is published annually to help security leaders and practitioners evaluate PTaaS solutions for more informed decision-making. This year’s report evaluated 16 of the top PTaaS providers in the market based on key feature capabilities, their ability to meet enterprise business requirements, deployment models, and other important decision-making criteria.  

    2025 marks the third year in a row BreachLock has been positioned as a leader and fast mover in the Maturity and Platform Play Quadrant of the GigaOm PTaaS Radar Report, demonstrating both its consistency and platform innovations geared towards enterprise customers.  

    BreachLock and the 15 other PTaaS providers evaluated in the report were scored based on the following key feature capabilities: 

    1. Built-in vulnerability scanners 
    2. Integration with SDLC technologies 
    3. API access 
    4. Customizable testing methodologies 
    5. Retesting of findings 
    6. Streamlined procurement 
    7. Crowdsourcing pentesters 
    8. Compliance Reporting 

    BreachLock scored highly in all but one category, with the exception of crowdsourcing pentesters, helping earn its position as a leader and fast mover in this year’s report. While crowdsourcing pentesters has its benefits, BreachLock’s 100% in-house team of highly skilled, certified expert pentesters offers enterprises a higher level of consistency, scalability, and reliability to guarantee quality results when penetration testing critical systems and applications. 

    BreachLock also scored highly in GigaOm’s business criteria comparison focused on non-functional requirements buyers commonly consider for purchase decision-making to determine a solution’s impact on an organization. The five factors evaluated as part of the business criteria comparison included: 

    1. Flexibility 
    2. Scalability 
    3. Speed 
    4. Risk Reduction 
    5. Cost 

    While the key capabilities and business criteria scores were the most heavily weighted criteria for radar positioning, GigaOm also scored each provider on emerging features, which scored providers’ integration capabilities with attack surface management (ASM) and private PTaaS platforms. 

    Lastly, GigaOm’s solution overview of BreachLock highlights its unified, cloud-native platform that combines PTaaS, Continuous Threat Exposure Management (CTEM), and Adversarial Exposure Validation (AEV), addressing how it enables organizations to transition from traditional point-in-time security testing to continuous, threat intelligence-driven offensive security. 

    Commenting on BreachLock’s position in the report, Seemant Sehgal, Founder & CEO of BreachLock, expressed, “It’s an honor to be recognized by GigaOm as a PTaaS leader for the third year in a row, which is a clear reflection of BreachLock’s constant innovation and focus on enterprise needs.” He added, “The world is evolving fast with Agentic AI—and so are attackers. BreachLock is one of the very few offensive security companies leading this shift. Our unified, agentic, and automation-first approach is reshaping enterprise-scale offensive security, and we’re proud to be ranked alongside the best—driving innovation, speed, and measurable outcomes for our clients.” 

    Chris Ray, author of the GigaOm Radar Report for PTaaS, highlighted BreachLock’s strengths in the report, writing, “BreachLock excels for enterprises with CI/CD pipelines requiring continuous security validation through its deep SDLC integration, risk-contextualized findings, and pipeline security gates. Its unified PTaaS and ASM solution provides seamless visibility for organizations transitioning from periodic to continuous security testing, eliminating blind spots between scheduled assessments.” 

    About BreachLock 

    BreachLock is a global leader in offensive security, delivering scalable and continuous security testing. Trusted by global enterprises, BreachLock provides human-led and AI-powered Attack Surface Management, Penetration Testing as a Service (PTaaS), Red Teaming, and Adversarial Exposure Validation (AEV) solutions that help security teams stay ahead of adversaries. 

    With a mission to make proactive security the new standard, BreachLock is shaping the future of cybersecurity through automation, data-driven intelligence, and expert-driven execution.

    Contact

    Senior Marketing Executive
    Megan Charrois
    BreachLock
    megan.c@breachlock.com

    The post BreachLock Named a Leader in 2025 GigaOm Radar Report for Penetration Testing as a Service (PTaaS) for Third Consecutive Year appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly discovered Windows malware packer named TangleCrypt has emerged as a serious threat in ransomware attacks, specifically designed to evade endpoint detection and response (EDR) solutions.

    The packer was first observed during a September 2025 ransomware incident involving Qilin ransomware, where threat actors deployed it alongside the ABYSSWORKER driver to disable security tools before encrypting victim systems.

    TangleCrypt works by hiding malicious payloads through multiple layers of encoding, compression, and encryption. The original executable is stored within PE resources using base64 encoding, LZ78 compression, and XOR encryption.

    This multi-layer approach makes it difficult for traditional security tools to detect the actual malware hidden inside the packed executable.

    WithSecure Labs security researchers identified the malware during an incident response investigation, recovering artifacts including two executables packed with TangleCrypt and VMProtect, along with a kernel driver masquerading as a CrowdStrike Falcon Sensor driver.

    The payload embedded in these executables was identified as STONESTOP, an EDR-killer tool that uses the ABYSSWORKER driver to terminate security processes running on the system forcibly.

    The packer employs string encryption and dynamic import resolving to hinder both static and dynamic analysis.

    Although malware authors commonly use these techniques, the TangleCrypt implementation lacks advanced anti-analysis mechanisms, making manual unpacking relatively straightforward for experienced analysts.

    Payload Execution Mechanism

    TangleCrypt supports two distinct methods for launching its payload, determined by a configuration string appended to the embedded executable.

    The first method, identified by the string “exex64_amd64_block_”, decrypts and executes the payload within the same process memory.

    The second method, marked with “exex64_amd64__riin”, creates a suspended child process and writes the decrypted payload into it before resuming execution.

    ProcessMonitor log of ‘b1.exe’ starting child process of itself (Source – Withsecure Labs)

    When executed, the loader first decrypts a small resource entry containing a numeric key, such as “175438”. This key is then used to XOR-decrypt the larger payload stored in the PE resources.

    The decryption process follows a specific sequence where a base64-encoded string is decoded, then LZ78 decompressed, decoded again from base64, and finally XOR-decrypted to reveal the original executable.

    Upon successful unpacking, the STONESTOP payload checks for administrative privileges and registers the ABYSSWORKER driver if elevated rights are present.

    The driver then terminates processes matching a predefined list of security product names, effectively blinding the system’s defenses before ransomware deployment begins.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post TangleCrypt Windows Packer with Ransomware Payloads Evades EDR Using ABYSSWORKER Driver appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶