• A sophisticated supply chain attack has compromised hundreds of npm packages and exposed secrets from tens of thousands of GitHub repositories, with cybersecurity researchers now documenting how attackers weaponized GitHub Actions workflows to bootstrap one of the most aggressive worm campaigns in recent memory. On November 24, 2025, at 4:11 AM UTC, malicious versions of […]

    The post Shai Hulud v2 Exploits GitHub Actions to Steal Secrets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought. The company said Salesforce initially provided a list of 3 impacted customers and that it has “expanded to a larger list” as of November 21, 2025. It did not reveal the exact number of customers who were impacted, but its CEO, Chuck Ganapathi, said “we

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Since its release in October, Battlefield 6 has become one of the year’s most anticipated game launches. However, cybercriminals have quickly seized on this popularity to distribute malicious software.

    Attackers have created fake cracked versions of the game and fraudulent game trainers, spreading them across torrent websites and underground forums to target unsuspecting players and individuals searching for game modifications.

    The malicious campaigns impersonate well-known game cracking groups like InsaneRamZes and RUNE, using their legitimate names to gain user trust and credibility. This tactic mirrors common brand impersonation attacks used in other sectors.

    The criminals have developed three distinct types of malware, each serving different objectives ranging from stealing browser data and cryptocurrency wallet credentials to establishing persistent remote control over infected systems.

    Bitdefender Labs security researchers identified these malware campaigns after analyzing multiple samples.

    The investigation revealed that none of the malicious files contain actual Battlefield 6 functionality, and they likely originate from different threat groups based on their varying technical approaches.

    The first malware sample operates as a simple but aggressive information stealer disguised as a “Battlefield 6 Trainer Installer.” Users can easily discover it on Google’s second search results page, making it highly accessible to potential victims.

    Extracting Sensitive Data

    Once executed, the malware scans local directories and browser profiles to extract sensitive data, including crypto wallet information, cookie sessions from browsers like Chrome, Edge, and Firefox, Discord session tokens and credentials, and cryptocurrency wallet extension data from Chrome plugins such as iWallet and Yoroi.

    Regional execution blocking (Source - Bitdefender)
    Regional execution blocking (Source – Bitdefender)

    The stolen information travels to server 198.251.84.9 over unencrypted HTTP without any obfuscation attempts.

    The second variant, distributed as “Battlefield 6.GOG-InsaneRamZes,” demonstrates significantly more sophistication through advanced evasion tactics.

    The malware implements regional execution blocking that stops operation when it detects Russian or CIS country settings, a common self-protection measure used by groups based in those regions.

    Windows API hashing (Source - Bitdefender)
    Windows API hashing (Source – Bitdefender)

    It employs Windows API hashing to obscure its operations and runs anti-sandbox detection checks using timing analysis to determine system uptime.

    Additionally, memory analysis revealed references to development tools like Postman and BitBucket, suggesting the malware targets developer credentials and API keys for further exploitation.

    The third sample, disguised as a Battlefield 6 ISO image, delivers a persistent command-and-control agent. The 25MB executable contains compressed data that unpacks and creates a file named “2GreenYellow.dat” in the user directory, then silently executes it using regsvr32.exe.

    The installed DLL repeatedly attempts contact with ei-in-f101.1e100.net, appearing to use Google’s infrastructure as a relay or communication disguise. The C2 structure indicates capability for remote command execution or future data theft.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Exploiting Fake Battlefield 6 Popularity to Deploy Stealers and C2 Agents appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A threat actor operating under the alias ResearcherX has posted what they claim to be a full‑chain zero‑day exploit targeting Apple’s recently released iOS 26 operating system.

    The listing, which appeared on a prominent dark web marketplace, alleges that the exploit leverages a critical memory‑corruption vulnerability within the iOS Message Parser.

    If proven genuine, this vulnerability would represent a significant breach of Apple’s latest security architecture, potentially allowing attackers to gain unauthorized root access to modern iPhones and iPads without any user interaction.​

    According to the sale listing, the exploit is a “Full Chain” solution, meaning it provides a complete pathway from initial infection to full system control.

    The seller asserts that the attack vector lies in the processing of malformed messages, a classic “zero-click” surface that requires no victim interaction beyond receiving a data packet. The specific bug class is identified as memory corruption, a persistent issue in complex parsing engines despite modern mitigations.

    The most alarming aspect of the listing is the claim that the exploit successfully bypasses “Multi Layer Protection,” a reference to the advanced kernel and user-space defenses introduced in iOS 26. The actor states the exploit achieves root privileges, granting attackers access to the most sensitive user data, including:

    • Encrypted Messages and Photos
    • Real-time Location Data
    • Keychain Contents (passwords and encryption keys)

    The seller emphasizes the “High” stealth level of the tool, noting that execution causes “no visible crash or prompts,” making forensic detection significantly harder for victims.

    iOS 26 Security Landscape

    This listing comes just months after the public release of iOS 26 in September 2025, which was touted as one of Apple’s most significant security upgrades.

    The update reportedly introduced new mechanisms to harden the kernel against memory safety vulnerabilities, specifically those targeting the exact type of parsing flaw ResearcherX claims to have exploited.​

    If legitimate, this sale suggests that threat actors have already found reliable workarounds for these new protections. Dark web listings for functional iOS zero-day chains often command prices in the millions, typically ranging from $2 million to $5 million, depending on the reliability and exclusivity of the exploit.

    ResearcherX has marked this as an “Exclusive Sale,” implying it will be sold to a single buyer, likely a nation-state actor or a private intelligence firm, rather than being distributed widely.

    Security researchers urge caution regarding the validity of the claim. Dark web forums are rife with scams, and “verified” sellers can still fabricate capabilities to defraud buyers. However, the specificity of the “Message Parser” vector aligns with historical trends in iOS exploitation, where components like iMessage and BlastDoor have frequently been targeted.​

    Cybersecurity experts recommend that organizations and high-risk individuals remain vigilant for expedited security updates (e.g., iOS 26.0.2) that may address parsing logic flaws in the coming weeks.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Threat Actors Allegedly Listed iOS 26 Full‑Chain 0‑Day Exploit on Dark Web appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals are successfully targeting Apple users through a sophisticated social engineering scheme that tricks victims into running harmful commands on their computers.

    The threat, called FlexibleFerret, is attributed to North Korean operators and represents a continuing evolution of the Contagious Interview campaign that has been active throughout 2025.

    The malware primarily spreads through fake job recruitment websites that promise employment opportunities but ultimately deliver credential-stealing backdoors and system access to attackers.

    LinkedIn post highlighting recruitment scams (Source - Jamf)
    LinkedIn post highlighting recruitment scams (Source – Jamf)

    The attack begins innocuously with job seekers visiting realistic-looking hiring assessment websites like evaluza.com and proficiencycert.com.

    Victims complete fake job assessments branded with names like “Blockchain Capital Operations Manager Hiring Assessment,” providing personal details and even recording video introductions.

    After completing these stages, applicants receive a critical instruction to run a specific Terminal command, which the attackers claim is needed to fix camera or microphone access issues.

    Jamf security analysts identified this new variant after discovering in-the-wild detections linked to the script named macpatch.sh.

    The researchers found JavaScript files on fraudulent recruitment sites designed to build and execute curl commands that download malicious payloads directly to victims’ computers.

    Infection mechanism

    The infection mechanism employs a multi-stage delivery process that remains hidden from users. When the initial curl command executes, it downloads a shell script that determines whether the victim’s Mac uses ARM64 or Intel architecture, then fetches the appropriate stage-two payload.

    The script creates working directories in temporary locations, establishes persistence through LaunchAgents that automatically launch the malware at login, and displays a convincing fake Chrome application that mimics a legitimate password prompt.

    Left - fake Chrome camera access prompt, Right - Chrome-style password prompt (Source - Jamf)
    Left – fake Chrome camera access prompt, Right – Chrome-style password prompt (Source – Jamf)

    This decoy application captures whatever credentials users enter and sends them to a Dropbox account controlled by the attackers.

    The third stage activates when a bundled Golang backdoor runs, establishing communication with a command-and-control server.

    This sophisticated component supports multiple operations including system information collection, file upload and download capabilities, command execution, Chrome profile theft, and automated credential harvesting.

    The backdoor maintains persistence through LaunchAgent entries and includes error-handling mechanisms that reset the malware if temporary failures occur.

    Organizations should educate employees to view unsolicited job assessment requests and Terminal-based fix instructions with extreme suspicion.

    Any recruitment communication asking users to execute system commands represents a significant red flag and should be reported immediately to security teams.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Tricks macOS Users to Execute Command in Terminal to Deliver FlexibleFerret Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new Malware-as-a-Service (MaaS) threat named “Olymp Loader” appeared in June 2025, aggressively advertised on underground hacker forums like XSS and HackForums.

    Advertised by an operator known as “OLYMPO,” this malware is marketed as a sophisticated tool written entirely in Assembly language.

    This marketing strategy aims to attract cybercriminals by claiming high performance and resistance to reverse engineering.

    The tool functions as a versatile suite, acting as a loader, crypter, and stealer, which significantly lowers the barrier to entry for attackers looking to deploy evasion techniques and complex infection routines.

    The malware has quickly gained a reputation for its “Fully UnDetectable” (FUD) status, boasting extremely low detection rates on VirusTotal.

    It spreads through social engineering campaigns, often disguised as legitimate software downloads such as PuTTY, Zoom, or Node.js executables hosted on GitHub.

    These deceptive vectors trick users into running the malicious code, initiating the infection chain on the victim’s machine.

    The use of reputable platforms like GitHub for hosting malicious assets further complicates detection, as network traffic to these sites often appears legitimate to security appliances.

    Picus Security’s security analysts identified that Olymp Loader frequently delivers dangerous payloads like LummaC2 and Raccoon Stealer.

    They noted the malware’s rapid evolution, specifically its strategic pivot in early August from a botnet architecture to a streamlined dropper model.

    This shift demonstrates the developer’s ability to adapt quickly to technical challenges and market demands from the cybercriminal community.

    Anti-analysis and Detection Evasion

    Following a major restructuring on August 3, 2025, Olymp Loader introduced advanced anti-analysis mechanisms to ensure successful infection.

    The malware now embeds encrypted payloads directly into the stub, executing them only after neutralizing local defenses.

    A primary component of this evasion strategy is the forcible disabling of Windows Defender. The loader executes specific PowerShell commands to blind real-time monitoring and exclude paths from scanning.

    For example, it utilizes the following PowerShell command to achieve this:-

    powershell -NoProfile -Command "Set-MpPreference -DisableRealtimeMonitoring $true"

    Subsequently, the malware drops executables into the Temp directory and leverages the “Defender Remover” tool.

    This process involves using PowerRun.exe to apply registry modifications via files like RemoveDefender.reg and deleting critical system files such as SecurityHealthSystray.exe.

    It also targets the WinSxS folder to delete file maps associated with Defender. This aggressive defense nullification ensures that payloads run unhindered by endpoint protection solutions installed on the host.

    Tactics continued to shift days later; analysts observed samples from August 10 replacing explicit disabling commands with extensive directory exclusion lists, covering locations like %APPDATA% and %DESKTOP%.

    This constant evolution highlights Olymp Loader’s capability to bypass standard security controls effectively and stealthily.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Malware-as-a-Service Olymp Loader Advertised on Hacker Forums with It’s Anti-analysis and Detection Features appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A significant gap in Microsoft Teams’ B2B guest access allows attackers to bypass Defender for Office 365 protections, creating unprotected zones for phishing and malware delivery.

    At Cybersecurity News, we recently highlighted how Microsoft Teams’ New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks.

    This architectural issue, highlighted by Ontinue, stems from new cross-tenant chat features enabled by default, enabling threat actors to lure users into malicious tenants where home organization safeguards like Safe Links and Safe Attachments do not apply. As Teams becomes central to enterprise collaboration, this risk amplifies with minimal setup costs for attackers.​

    Microsoft’s MC1182004 update, rolled out in November 2025, lets any Teams user start chats with external email addresses, automatically inviting recipients as guests.

    Enabled by default across licenses, including low-cost SMB plans like Teams Essentials, recipients get legitimate Microsoft notifications that evade email filters. While aimed at simplifying collaboration, it ignores inbound invitation controls, as disabling outbound invites via PowerShell (Set-CsTeamsMessagingPolicy -UseB2BInvitesToAddExternalUsers $false) offers no inbound defense.​

    Teams Guest Chat Exposes Users

    In guest scenarios, security policies are enforced from the resource tenant, the host of the conversation, not the user’s home tenant. Defender for Office 365 features such as Safe Links for URL scanning, Safe Attachments for file detonation, and Zero-hour Auto Purge (ZAP) check the host’s subscriptions and policies.

    Attackers exploit this by spinning up trial or basic tenants lacking Defender, disabling scans entirely, allowing safe delivery of malicious links and files without alerts in the victim’s security console, reads Ontinue research.

    Threat actors begin by creating a bare-bones tenant, then target users via LinkedIn or breaches for pretextual invites like vendor talks.

    Victims accept, entering the attacker’s domain where phishing builds trust, malware deploys unchecked, and data exfiltrates unnoticed. Pivots to tools like QuickAssist follow, all of which are invisible to the home organization’s Defender tools.​

    AspectGuest AccessExternal Access
    Policy EnforcementResource tenant controls (no home protections)​Home tenant retains protections
    Common Attack UseInvites to malicious chats/channelsFederated messaging
    Defender FeaturesBypassed (Safe Links, ZAP, Attachments) ​Applied normally

    Organizations must restrict guest invites in Entra ID External collaboration settings to allowlisted domains only.

    Deploy cross-tenant access policies to block untrusted B2B by default, and limit Teams external access to specific domains in the admin center. User training on rejecting unsolicited invites completes the defense, countering this default-enabled risk before exploitation surges.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Teams Guest Chat Vulnerability Exposes Users to Malware Attack appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly discovered critical vulnerability in the Next.js framework allows attackers to crash self-hosted servers using a single HTTP request, requiring negligible resources to execute.

    Discovered by researchers at Harmony Intelligence, the denial-of-service (DoS) flaw affects widespread versions of the framework, including the latest 15.x branch prior to the patch.​

    The vulnerability resides in the cloneBodyStream function within body-streams.ts, a component responsible for copying streamed requests into memory before passing them to middleware. Unlike typical resource exhaustion attacks that require flooding a network, this flaw exploits a lack of size limits on the internal memory buffer.​

    According to the disclosure, an attacker can send an infinite stream of data chunks to the server. While the attacker can release each chunk from their own memory immediately after sending, the Next.js server attempts to buffer the entire stream in RAM.

    This asymmetry means a device with minimal resources described by researchers as a “smart toaster” can successfully crash a robust enterprise server by exhausting its memory.​

    Harmony Intelligence discovered the flaw accidentally while testing an AI AppSec Agent against a different, known vulnerability, the authentication bypass tracked as CVE-2025-29927.

    During the test, the agent autonomously executed a proof-of-concept script that crashed the demo application, revealing the zero-day flaw in the underlying Next.js framework.​

    Affected Systems and Impact

    The vulnerability specifically impacts self-hosted Next.js applications that utilize middleware. Applications hosted directly on Vercel’s infrastructure are unaffected by this issue, Harmony said.

    Given that approximately 55% of Next.js deployments are self-hosted (rising to 80% among enterprises), the potential attack surface is significant.​

    Currently, no CVE identifier has been assigned, though a request has been lodged. Researchers have recommended a CVSS v3.1 severity score of 7.5 (High), citing the low barrier to entry and lack of authentication required to execute the attack.​

    Vercel patched the vulnerability on October 13, 2025, introducing a default 10MB limit on the internal buffer size. Administrators are urged to upgrade immediately or implement strict proxy-level constraints.​

    ComponentStatus / Recommendation
    Vulnerability TypeUnauthenticated Denial of Service (DoS)
    Affected VersionsNext.js 15.x (<= 15.5.4), 14.x, 13.x, and older
    Patched Versions15.5.5, 16.0.0, or newer
    Primary MitigationUpgrade to a patched version immediately
    WorkaroundConfigure a reverse proxy (e.g., Nginx) to enforce client_max_body_size limits

    Researchers emphasize that standard rate-limiting solutions are ineffective against this attack because the crash occurs before middleware-based rate limiters can process the request. Similarly, Next.js’s built-in bodyParser.sizeLimit configuration does not prevent this specific memory exhaustion vector.​

    The discovery underscores the importance of defense-in-depth strategies for self-hosted architectures. While upgrading is the definitive fix, placing a properly configured reverse proxy in front of application servers remains a critical best practice for rejecting oversized requests before they reach the application layer.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post New Unauthenticated DoS Vulnerability Crashes Next.js Servers with a Single Request appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Democratic People’s Republic of Korea (DPRK) has intensified its global cyber operations, systematically violating United Nations Security Council resolutions through large-scale cyberattacks, cryptocurrency theft, and cross-border money laundering schemes.

    According to the Multilateral Sanctions Monitoring Team (MSMT) report, North Korean hackers stole at least USD 1.19 billion in cryptocurrency during 2024 and an additional USD 1.65 billion in the first nine months of 2025, bringing the total to approximately USD 2.8 billion.

    The DPRK’s cyber capabilities have reached near-superpower levels, with multiple Advanced Persistent Threat (APT) groups executing coordinated attacks across the cryptocurrency industry.

    These operations fund the regime’s weapons of mass destruction and ballistic missile programs. The February 2025 breach of Dubai-based Bybit exchange, resulting in the theft of nearly USD 1.5 billion, stands as the largest cryptocurrency theft in history.

    Other significant victims include Japan’s DMM Bitcoin and India’s WazirX. SlowMist security analysts identified that DPRK threat actors deploy sophisticated malware through social engineering campaigns disguised as job recruitment processes.

    The “Contagious Interview” campaign specifically targets software developers by inviting them to online interviews and instructing them to download malicious software packages.

    Upon execution, the BeaverTail malware harvests cryptocurrency wallet credentials and credit card information stored in browsers, while secretly installing the InvisibleFerret backdoor for persistent remote access.

    Infection Mechanism and Persistence Tactics

    The attack chain demonstrates advanced technical sophistication in establishing foothold within target systems. When victims access fake interview websites, they encounter camera error messages prompting them to download drivers.

    Temp.Hermit's Cyber operations against ROK infrastructure (Source - Medium)
    Temp.Hermit’s Cyber operations against ROK infrastructure (Source – Medium)

    Attackers employ the “ClickFix” technique to trick victims into executing malicious commands. On macOS systems, victims download and run a malicious bash script through curl commands, while Windows users receive a ZIP archive containing a VBS script for execution.

    Kimsuky's cyber operations against the ROK construction sector (Source - Medium)
    Kimsuky’s cyber operations against the ROK construction sector (Source – Medium)

    The InvisibleFerret backdoor establishes persistent access by embedding itself within legitimate system processes.

    Andariel's cyber operations against the ROK defense companies (Source - Medium)
    Andariel’s cyber operations against the ROK defense companies (Source – Medium)

    This allows attackers to maintain long-term surveillance capabilities and exfiltrate sensitive data without triggering security alerts.

    The malware communicates with command-and-control infrastructure using encrypted channels, making network-level detection challenging for security teams.

    DPRK cyber actor and IT worker ties to UN designated entities (Source – Medium)

    DPRK IT workers complement these cyber operations by infiltrating companies worldwide through freelance platforms like Upwork, Freelancer, and Fiverr.

    These workers use AI-generated synthetic faces and forged documents to bypass identity verification, earning an average monthly salary of USD 10,000 while remitting substantial portions to the regime. The MSMT report confirms IT worker deployments across China, Russia, Laos, and several African nations.

    The laundering of stolen cryptocurrency follows a multi-stage process involving token swaps through decentralized exchanges, mixing services like Tornado Cash and Wasabi Wallet, and blockchain bridges before final conversion to fiat currency through over-the-counter brokers.

    This systematic approach to sanctions evasion represents an escalating threat to the global financial ecosystem that demands coordinated international response.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post North Korean Hackers Evade UN Sanctions Leveraging Cyber Capabilities, IT Workers and Crypto Activities appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Space Force officials declined to name winners of the first space-based missile defense prototypes for Golden Dome, further adding to the secrecy that has plagued the project.

    Multiple contracts were awarded to several companies under a competitive “other transaction agreement,” a Space Force spokesperson confirmed Tuesday. Contracts under $9 million and those classified as “other transaction agreements” are not subject to federal acquisition disclosure requirements. 

    “The selection process was robust and thorough. The Space Force will lead a fast-paced effort in partnership with industry to develop, demonstrate, and deliver prototype interceptors,” the spokesperson said in an emailed statement. “The names of the contractors are currently not releasable as they are protected by enhanced security measures.”

    Reuters reported that Lockheed Martin, Northrop Grumman, True Anomaly, and Anduril, were among the companies who netted the awards to develop interceptors to shoot down a missile in its initial launch phase. Defense experts have raised concerns about the secrecy that’s followed Trump’s Jan. 27 executive order initiating the sprawling missile defense initiative. The lack of communication has also led to flurries of questions as the military solicits ideas from industry. 

    Previously reported details from a July Pentagon presentation suggest the awards were somewhere around $120,000, which would be well below the disclosure threshold required by federal guidelines.

    “It must have been a very small amount of money since they aren’t required to report it,” said Todd Harrison, a defense budget expert at the American Enterprise Institute.

    Winners of those small awards will then compete down the line for more lucrative contracts potentially worth billions of dollars. While progress on space-based interceptors continues, Tom Karako, the Center for Strategic and International Studies missile defense project director, argued in an opinion piece earlier this month that Congress, industry, and the American public still need more information about Golden Dome. He wrote that support is crucial, but informing those groups is more difficult amid communication restrictions tied to the project’s rollout imposed by the Pentagon. 

    “The Golden Dome initiative will be real and durable when its logic is understood on a broad, bipartisan, public basis,” Karaoke wrote. “Such understanding can be achieved, but it will require a communication campaign.”

    Other CSIS experts like Heather Williams, the think tank’s project on nuclear issues director, said the lack of details has led to attention from America’s allies and enemies, too. 

    “In the absence of more information, not just our adversaries but also our allies, are going to have a lot of questions about, what is Golden Dome,” Williams said during a Nov. 19 event. 

    Cost estimates for Golden Dome have varied greatly, with the Congressional Budget Office in May estimating a price tag ranging from $542 billion to $831 billion over 20 years. Harrison, in a September report, said costs could range from $252 billion to more than ten times that.

    The defense industry is also curious about the massive project. An October deadline for a Missile Defense Agency proposal for an up-to-$151 billion, 10-year indefinite-quantity, indefinite-delivery contract for Golden Dome was pushed back after “over 1,500 questions from industry” followed, Defense One previously reported.

    Following this week’s initial awards, the Space Force is marching forward with other Golden Dome-related contracts. On Thursday, the service posted a presolicitation notice on SAM.gov seeking prototype ideas for a space-based “kinetic midcourse interceptor,” meaning something that would destroy a missile mid-flight with a direct collision, not an explosive warhead. 

    The Space Force plans to issue that prototype request Dec. 7, the notice said. Similar to the contract awards for the other interceptors this week, they will be under a competitive other transaction agreement.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶