• KawaiiGPT emerges as an accessible, open-source tool that mimics the controversial WormGPT, providing unrestricted AI assistance via jailbroken large language models. Hosted on GitHub with over 188 stars and 52 forks, it requires no API keys and installs quickly on Linux or Termux environments.​

    Users can deploy KawaiiGPT in minutes by updating packages, installing Python and Git, cloning the repository, and running simple install and launch scripts.

    Linux distributions use apt-get commands, while Termux users use pkg equivalents, highlighting its lightweight design for pentesting or casual experimentation. The developer encourages starring the project for support and directs queries to a Telegram forum.​

    At its core, KawaiiGPT employs a reverse-engineered API wrapper derived from pollinations agents, routing queries to backend servers hosting models like DeepSeek, Gemini, and Kimi-K2.

    These integrations enable prompt-injection responses that bypass safety guardrails, producing uncensored outputs labeled as “fun” rather than malicious. Unlike fine-tuned models, it relies on prepared LLMs with embedded jailbreaks accessible via a help menu.​

    Security researchers highlight KawaiiGPT’s process in generating phishing emails, ransomware notes, lateral movement scripts using Paramiko, and data exfiltration tools.

    Its casual “kawaii” persona featuring playful greetings masks potent outputs for social engineering and elemental attacks, lowering barriers for novice threat actors. First noted in July 2025 and now at version 2.5, it contrasts paid tools like WormGPT 4 by offering free, community-driven enhancements.​

    The codebase’s obfuscation sparks debate, with the creator explaining that it prevents unauthorized repackaging and resale while denying the presence of malware, RATs, or spyware. Warnings urge verifying sources to avoid fakes, and the MIT-licensed project prohibits modifications for profit.

    A 180-500 member Telegram community shares tips, fueling its evolution amid Palo Alto Networks’ alerts on rising cybercrime automation.​

    Organizations face heightened threats from such tools, demanding advanced email filters, MFA, EDR, and training to counter AI-aided phishing and scripts. While positioned for ethical pentesting, KawaiiGPT’s free nature amplifies risks in an era of dual-use AI.​

    FeatureKawaiiGPTWormGPT 4
    CostFree (Open Source)Paid Subscription (~$50/mo)
    Underlying TechJailbroken Commercial Models (Gemini, DeepSeek)Custom/Fine-Tuned Model
    Access MethodPython Script / GitHubDark Web / Private Forum
    Primary RiskLowers entry barrier for novicesAdvanced, optimized attack scripts
    GuardrailsBypassed via Prompt InjectionNatively Uncensored

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post KawaiiGPT – Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A major security threat has emerged targeting software developers worldwide. North Korean state-sponsored threat actors, operating under the “Contagious Interview” campaign, are systematically spreading malicious packages across npm, GitHub, and Vercel infrastructure to deliver OtterCookie malware.

    This sophisticated multi-stage operation demonstrates how threat actors have adapted their tools to target modern JavaScript and Web3 development workflows.

    Since October 10, 2025, researchers have uncovered at least 197 new malicious npm packages designed to trick developers into installing compromised code, with over 31,000 additional downloads recorded during this wave alone.

    The attack chain works through a carefully coordinated supply chain approach. Threat actors create fake developer portfolios on GitHub, publish typosquatted packages on npm that impersonate legitimate libraries, and use Vercel hosting to stage the malware payloads.

    When developers unknowingly install these malicious packages, a postinstall script automatically executes and reaches out to attacker-controlled endpoints to fetch and run the latest OtterCookie variant.

    This seamless integration into standard development workflows makes the attack particularly dangerous, as it bypasses traditional security awareness since developers expect npm packages to execute code during installation.

    Socket.dev security analysts noted and identified that the infrastructure behind this campaign reveals a well-orchestrated operation.

    The researchers traced malicious packages like “tailwind-magic,” which impersonates the legitimate “tailwind-merge” library, to a threat actor-controlled GitHub account named “stardev0914” and a Vercel staging endpoint called “tetrismic.vercel.app.”

    Contagious Interview attack chain (Source - Socket.dev)
    Contagious Interview attack chain (Source – Socket.dev)

    This account contained at least 18 repositories designed to serve as both delivery vehicles and convincing lures, with repositories themed around cryptocurrency projects including fake DEX front-ends and token sites.

    At least five core malicious packages, including “node-tailwind,” “tailwind-node,” and “react-modal-select,” route through this infrastructure.

    The malware architecture itself reflects sophisticated development. OtterCookie operates as a combined infostealer and remote access trojan with cross-platform capabilities spanning Windows, macOS, and Linux.

    Once executed within a Node.js process, the malware performs initial environment checks to detect virtual machines and sandboxes, fingerprints the infected host, and then establishes bidirectional communication with command and control servers.

    This detection-evasion approach ensures the malware only fully activates on legitimate developer machines rather than analyst environments where security researchers typically operate.

    Infection and Persistence Mechanisms

    The infection mechanism demonstrates meticulous engineering. The malicious npm packages use a postinstall script that executes when developers run npm install.

    This script calls the threat actor endpoint at https://tetrismic.vercel.app/api/ipcheck using axios, which returns JavaScript code embedded in a JSON field named “model.”

    Annotated GitHub view of the threat actor-controlled account stardev0914 (Source - Socket.dev)
    Annotated GitHub view of the threat actor-controlled account stardev0914 (Source – Socket.dev)

    The package then extracts this field and executes it with eval inside the victim’s Node.js process, granting the attackers full Node.js privileges and allowing arbitrary code execution.

    The staging server continuously updates its main.js payload, enabling threat actors to rotate malware variants across multiple packages and customize responses per target.

    Once deployed, OtterCookie establishes persistence through multiple mechanisms. On Windows systems, the malware creates scheduled tasks named “NodeUpdate” that run at logon with highest privileges, and adds registry entries under HKCU\Run\NodeHelper.

    The actual payload spawns three asynchronous worker processes using child_process.spawn, each running as a detached Node.js process with stdio redirected to ignore and the windowsHide flag set true.

    These processes then unref themselves, allowing them to continue running in the background after the initial loader exits.

    KXCO-branded DEX front end hosted at knightsbridge-dex[.]vercel[.]app (Source - Socket.dev)
    KXCO-branded DEX front end hosted at knightsbridge-dex[.]vercel[.]app (Source – Socket.dev)

    The malware simultaneously performs system-wide keylogging using the GlobalKeyboardListener module, captures screenshots from all connected monitors every 5 seconds, exfiltrates clipboard contents, and recursively scans the filesystem for files matching patterns like “.env,” “metamask,” “phantom,” and “seed” to harvest cryptocurrency wallet data and credentials.

    The comprehensive data harvesting capabilities extend to browser profiles. The malware specifically targets Chrome and Brave browsers on all three operating systems, accessing stored login credentials by querying the “Login Data” SQLite database found in each browser’s profile directory.

    Additionally, it identifies and extracts data from at least 42 different cryptocurrency wallet browser extensions, including MetaMask, Phantom, Keplr, and dozens of others commonly used by Web3 developers.

    All collected data flows through the command and control infrastructure at IP address 144.172.104.117, which handles both data collection and tasking, allowing threat actors to issue remote commands and maintain persistent interactive shell access.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post North Korean Hackers Exploiting npm, GitHub, and Vercel to Deliver OtterCookie Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address multiple high-severity vulnerabilities.

    The patches, rolled out in versions 18.6.1, 18.5.3, and 18.4.5, fix security flaws that could allow attackers to bypass authentication, steal user credentials, or crash servers through Denial-of-Service (DoS) attacks.

    Security experts and GitLab administrators are being urged to upgrade their self-managed installations immediately. GitLab.com has already been patched to protect users.

    Credential Theft and System Crashes

    The most concerning vulnerability in this release is CVE-2024-9183, a high-severity issue labeled as a “race condition” in the CI/CD cache.

    This flaw could allow an authenticated attacker to steal credentials from users with higher privileges.

    By exploiting this timing error, a malicious user could take over administrative accounts or perform unauthorized actions.

    CVE IDSeverityTypeDescription
    CVE-2024-9183HighPrivilege EscalationA race condition in CI/CD cache allowing users to obtain higher-privileged credentials.
    CVE-2025-12571HighDenial of ServiceUnauthenticated users can crash the system via malicious JSON input.
    CVE-2025-12653MediumAuth BypassUnauthenticated users could join arbitrary organizations by altering headers.
    CVE-2025-7449MediumDenial of ServiceAuthenticated users can cause a crash via HTTP response processing.
    CVE-2025-6195MediumImproper Authorization(EE Only) Users could view restricted security reports under certain conditions.
    CVE-2025-13611LowInfo DisclosureLeak of sensitive tokens in the terraform registry logs.

    Another major fix addresses CVE-2025-12571, a dangerous Denial-of-Service flaw.

    This vulnerability allows unauthenticated attackers without a username or password to crash a GitLab instance by sending a malicious JSON request.

    This type of attack could take an organization’s code repositories offline, disrupting development workflows.

    Authentication Bypasses

    The update also resolves CVE-2025-12653, a medium-severity issue that could allow unauthenticated users to bypass security checks and join arbitrary organizations by manipulating network request headers.

    While less severe than the crash flaw, this bypass poses a significant risk to organizational privacy and access control.

    The following table details the security issues resolved in this patch release:

    GitLab strongly recommends that all customers running affected versions upgrade to the latest patch immediately. Upgrade targets: Versions 18.6.1, 18.5.3, or 18.4.5.

    Impact: Single-node instances will experience downtime during the upgrade due to database migrations. Multi-node instances can perform zero-downtime upgrades.

    Failure to update leaves installations exposed to attackers who can now analyze the public patches to reverse-engineer exploits.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Gitlab Patches Multiple Vulnerabilities that Enable Authentication Bypass and DoS Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • OpenAI has publicly disclosed a security incident involving a data breach at Mixpanel, a third-party analytics provider previously used by the company for monitoring usage on its API platform. The breach exposed limited but sensitive user information, including names, email addresses, operating system details, and browser metadata. According to OpenAI, the incident originated within Mixpanel’s […]

    The post OpenAI Reveals Mixpanel Data Breach Exposing User Details appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • During late October 2025, a new malware campaign dubbed ShadowV2 emerged, coinciding with a global AWS disruption.

    This sophisticated threat actively exploits vulnerabilities in IoT devices to assemble a botnet for distributed denial-of-service (DDoS) attacks.

    The malware’s rapid deployment indicates a coordinated effort to harness compromised hardware for large-scale disruptive activities.

    The infection spread swiftly across seven industries, including technology, education, and retail, impacting organizations in the United States, Europe, and Asia.

    Experts believe this surge was likely a “test run” designed to evaluate the botnet’s potential for causing widespread service interruptions.

    The widespread nature of the campaign highlights the persistent risks associated with unsecured connected devices in enterprise environments.

    Fortinet security analysts identified the malware leveraging older, unpatched security flaws in routers and DVRs from vendors like D-Link and TP-Link.

    By targeting these known weaknesses, the attackers successfully compromised numerous devices that organizations had failed to update with the latest firmware patches.

    The attack chain initiates when a vulnerable device is forced to download a script named binary.sh from a remote server at 81.88.18.108.

    Downloader script binary.sh (Source - Fortinet)
    Downloader script binary.sh (Source – Fortinet)

    As seen in the above figure, this script automatically detects the host’s architecture—whether ARM, MIPS, or x86—and retrieves the corresponding malware payload to ensure successful execution.

    Technical Analysis of ShadowV2

    ShadowV2 mirrors the architecture of the “LZRD” Mirai variant but employs distinct obfuscation techniques. Upon launch, it utilizes a simple XOR cipher with the key 0x22 to decrypt its configuration.

    VendorCVE IDVulnerability Details
    DDWRTCVE-2009-2765HTTP Daemon Arbitrary Command Execution
    D-LinkCVE-2020-25506ShareCenter CGI Code Execution
    D-LinkCVE-2022-37055Buffer Overflow in HNAP Main
    D-LinkCVE-2024-10914Account Manager Command Injection
    D-LinkCVE-2024-10915Account Manager Command Injection
    DigiEverCVE-2023-52163Time Setup CGI Command Injection
    TBKCVE-2024-3721DVR Command Injection
    TP-LinkCVE-2024-53375Archer Devices Command Injection

    This hidden data includes file paths, such as /proc/, and deceptive User-Agent strings intended to mask malicious traffic as legitimate user activity.

    XOR-encoded configuration (Source - Fortinet)
    XOR-encoded configuration (Source – Fortinet)

    Once active, the malware establishes contact with its command-and-control server to receive attack orders.

    It supports multiple DDoS vectors, including UDP floods and TCP SYN floods, mapping these behaviors to specific internal function IDs for rapid deployment against targets.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Actively Exploiting IoT Vulnerabilities to Deploy New ShadowV2 Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A recently discovered vulnerability in Apache SkyWalking, a popular application performance monitoring tool, could allow attackers to execute malicious scripts and launch cross-site scripting (XSS) attacks. The flaw, identified as CVE-2025-54057, affects all versions of SkyWalking up to 10.2.0. CVE ID Description Severity Affected Versions CVE-2025-54057 Stored XSS vulnerability in Apache SkyWalking Important Through 10.2.0 […]

    The post Apache SkyWalking Flaw Allows Attackers to Launch XSS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated cyber intimidation campaign by the Handala hacker group has targeted Israeli high-tech and aerospace professionals, publishing their personal information alongside aggressive, misleading descriptions that falsely label them as criminals. Security researchers monitoring dark web activity discovered the publication, which appears to rely primarily on data scraped from LinkedIn professional profiles. During ongoing dark […]

    The post Handala Hacker Group Targets Israeli High-Tech and Aerospace Professionals appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new threat has emerged in the Solana trading community. Security researchers have discovered a malicious Chrome extension named Crypto Copilot that appears to offer convenient trading features but secretly siphons cryptocurrency from users during transactions.

    Published on the Chrome Web Store on June 18, 2024, the extension has managed to remain available while quietly stealing funds from hundreds of traders who believed they were using a legitimate tool.

    The extension positions itself as a seamless solution for Solana traders looking to execute quick swaps directly from the X social media platform.

    It connects to popular wallets like Phantom and Solflare, displays real-time token data from DexScreener, and routes transactions through Raydium, one of the largest decentralized exchanges on Solana.

    The marketing materials promise speed, convenience, and one-click trading without mentioning any hidden costs or extra transactions.

    Socket.dev security analysts identified the malicious behavior embedded within the extension’s code structure. Behind the attractive interface lies a sophisticated fee-stealing mechanism that operates without user knowledge.

    Every time a user performs a swap, the extension injects an undisclosed transfer that routes a minimum of 0.0013 SOL or 0.05% of the total trade amount to an attacker-controlled wallet address: Bjeida13AjgPaUEU9xrh1iQMwxZC7QDdvSfg730xQff7.

    Attack Mechanism

    The attack works by manipulating transaction construction at the blockchain level. When users initiate a swap, the extension first builds the legitimate Raydium swap instruction.

    Then it silently appends a second instruction containing a SystemProgram.transfer command that moves SOL from the user’s wallet directly to the attacker’s address.

    The user interface displays only the swap details, creating a false sense of legitimacy. Most wallet confirmation screens show a summary of transactions without highlighting individual instructions, so users sign what appears to be a single transaction while both instructions execute together on-chain.

    Crypto Copilot (Source - Socket.dev)
    Crypto Copilot (Source – Socket.dev)

    Socket researchers also discovered additional malicious functionality beyond fee theft. The extension exfiltrates users’ connected wallet public keys to a backend server at crypto[.]copilot-dashboard[.]vercel[.]app/api/users, creating privacy violations.

    Furthermore, embedded Helius RPC API credentials expose sensitive infrastructure information, compounding the security risks.

    The malicious code resides within assets/popup.js file, wrapped in heavy obfuscation to evade detection.

    The Chrome Web Store listing has remained unchanged despite these discoveries, with no warning to potential users about the hidden charges or data collection occurring in the background.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security vulnerability has been discovered in the Angular framework that could allow attackers to steal sensitive user security tokens.

    The vulnerability, tracked as CVE-2025-66035, affects the Angular HttpClient and involves the accidental leakage of Cross-Site Request Forgery (XSRF) tokens.

    Angular applications use a built-in protection mechanism to prevent Cross-Site Request Forgery (CSRF) attacks.

    Angular HTTP Client Vulnerability

    This system works by assigning a secret “token” to a user’s session. Whenever the application sends a request to the server, it includes this token to prove the request is legitimate.

    The flaw lies in Angular’s determination of whether a request is safe. The system checks destination URLs to determine whether to attach this secret token.

    Unfortunately, the logic incorrectly identified URLs starting with // (protocol-relative URLs) as “same-origin” or local requests.

    FieldValue
    CVE IDCVE-2025-66035
    Vulnerability TypeCredential Leak / XSRF Token Exposure
    CVSS Score7.5
    Attack VectorNetwork
    CWE IdentifiersCWE-201 (Insertion of Sensitive Information Into Sent Data), CWE-359 (Exposure of Private Personal Information)
    ImpactAllows attackers to capture XSRF tokens and bypass CSRF protections to perform unauthorized actions on behalf of victims

    Suppose a developer inadvertently uses a protocol-relative URL (e.g., //attacker.com) in an HTTP request. In that case, Angular mistakenly treats it as a valid URL and sends the user’s secret XSRF token to that external domain.

    Suppose an attacker successfully tricks the application into sending a request to a domain they control. In that case, they can capture the user’s valid XSRF token.

    Cvn With this stolen key, the attacker can bypass CSRF protections entirely. This allows them to perform unauthorized actions on the victim’s behalf, such as changing account settings or submitting fraudulent transactions.

    The vulnerability affects multiple versions of the framework. The following table outlines the affected versions and the required updates.

    Development teams using Angular should upgrade to the patched versions immediately to ensure their applications are secure.

    If an immediate upgrade is not possible, a workaround is available. Developers must ensure their code avoids using protocol-relative URLs (starting with //).

    Instead, all backend requests should use relative paths (starting with /) or fully qualified absolute URLs (starting with https://).

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Angular HTTP Client Vulnerability Exposes XSRF Token to an Attacker-Controlled Domain appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GitLab’s security team has discovered a severe, ongoing attack spreading dangerous malware through npm, the world’s most extensive code library. The malware uses an alarming “dead man’s switch,” a self-destruct trigger that threatens to erase user data if the attack is shut down. Security researchers identified multiple infected packages containing a destructive malware called Shai-Hulud. […]

    The post “Dead Man’s Switch” Triggers Massive npm Supply Chain Malware Attack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶