• Developers are unintentionally exposing passwords, API keys, and sensitive data in production information into online formatting tools such as JSONFormatter and CodeBeautify.

    New research from watchTowr shows that thousands of secrets from critical organizations have been publicly accessible for years through these seemingly harmless utilities.

    Online code and JSON formatters are popular among developers who want to tidy up messy data quickly. Users paste in JSON blobs, configuration files, or scripts and get neatly formatted output.

    The problem begins when they use additional features, such as the “Save” button, which stores the data and generates a shareable URL.

    Many users appear unaware that this means their content is permanently stored and publicly accessible to anyone with the link – and that these links are easy to enumerate.

    “Recent Links” pages
    “Recent Links” pages

    By crawling the “Recent Links” pages and related endpoints on JSONFormatter and CodeBeautify, watchTowr collected more than 80,000 saved JSON submissions over several years.

    JSONFormatter key Exposed
    JSONFormatter key Exposed

    They then parsed this 5 GB dataset to detect secrets, credentials, and personal data automatically.

    The results were alarming: thousands of exposed items, including Active Directory credentials, database passwords, cloud keys, private keys, API tokens, CI/CD credentials, SSH session data, card payment gateway credentials, and extensive PII.

    The exposed data did not come solely from small hobby projects.

    The researchers found leaks from a wide range of sectors, including critical national infrastructure, government, banking and finance, insurance, technology, cybersecurity vendors, retail, aerospace, telecoms, healthcare, education, and travel.

    In some cases, entire exports of secrets from tools like AWS Secrets Manager appeared to have been pasted into these services.

    Examples highlighted in the research include encrypted Jenkins credentials tied to a MITRE collaboration environment, lengthy PowerShell deployment scripts from a government organisation, and configuration files from a well-known “Datalake-as-a-Service” provider containing Docker, Grafana, JFrog, and database credentials.

    Powershell key exposed
    Powershell key exposed

    Even a publicly listed cybersecurity company was found to have uploaded encrypted credentials and internal configuration details for sensitive systems.

    Beyond credentials, the dataset also contained highly sensitive personal data. In one case, watchTower identified multiple uploads of complete Know Your Customer (KYC) records for a bank in a specific country.

    These JSON blobs included names, addresses, emails, usernames, phone numbers, IP addresses, ISPs, and URLs to recorded KYC video interviews hosted on the bank’s domain.

    WatchTowr says it worked with national CERTs and notified affected organizations where possible, but response rates were mixed. Many entities did not reply despite multiple contact attempts.

    The core issue is not a sophisticated exploit but basic misuse of tools: developers pasting live production data into untrusted third‑party websites and then using “Save” and share links without understanding the exposure.

    The incident underscores the need for stricter internal policies, developer training, and safer workflows, such as using offline or self-hosted formatting tools and ensuring that real secrets and PII never leave controlled environments.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Developers Expose Passwords and API Keys via Online Tools like JSONFormatter appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • North Korean-aligned threat actors are leveraging convincing fake job recruitment websites to deceive macOS users into executing malicious Terminal commands that deliver the FlexibleFerret malware, according to recent analysis from Jamf Threat Labs. The campaign, attributed to the Contagious Interview operation, represents a refined iteration of social engineering tactics designed to bypass macOS security protections, […]

    The post Hackers Trick macOS Users into Running Terminal Commands to Install FlexibleFerret Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Tor Project has begun replacing its legacy relay encryption system, known as tor1, with a modern design called Counter Galois Onion (CGO). This upgrade targets key weaknesses in Tor’s circuit traffic protection, enhancing anonymity for users worldwide.​ Tor routes user data through multiple relays, each peeling off one layer of encryption like an onion. […]

    The post Tor Network Adopts Galois Onion Encryption To Strengthen User Protection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers at watchTowr Labs uncovered a massive leak of sensitive credentials after scanning popular online JSON formatting tools. Developers and administrators have been pasting passwords, API keys, database credentials, and personally identifiable information (PII) into sites like jsonformatter.org and codebeautify.org, where “save” features create publicly shareable links. By crawling “Recent Links” pages and extracting […]

    The post Developers Are Exposing Passwords and API Keys Through Online Code Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. “This is the first time that a RomCom payload has been observed being distributed by SocGholish,” Arctic Wolf Labs researcher Jacob Faires said in a Tuesday report. The activity has been attributed with medium-to-high

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers at Cato CTRL have discovered a new indirect prompt injection technique called HashJack, which weaponises legitimate websites to manipulate AI browser assistants.

    The attack conceals malicious instructions after the “#” symbol within trusted URLs, enabling threat actors to conduct a wide range of attacks without compromising any website.

    How HashJack Works

    The technique exploits a fundamental design flaw in how AI browsers handle URL fragments. When users visit a URL containing hidden prompts after the “#” symbol, the AI browser sends the whole URL, including the fragment, to its AI assistant.

    The attack chain
    The attack chain

    Since URL fragments never leave the client-side, traditional network and server defences cannot detect them.

    This creates a dangerous blind spot. Server logs only record the clean base URL, and intrusion detection systems cannot see the malicious payload.

    Even security-conscious users are fooled because the AI assistant’s suggestions appear native to the trusted website they are visiting.

    Google classified the issue as “Won’t Fix (Intended Behaviour)” despite acknowledging the report. Microsoft responded promptly and applied a fix within two months of disclosure.

    Six Attack Scenarios Identified

    According to Cato Networks, researchers outlined six dangerous scenarios enabled by HashJack.

    These include callback phishing, where fake support numbers appear in AI responses; data exfiltration in agentic browsers like Comet; and misinformation through fabricated financial news.

    Cato CTRL tested HashJack against three major AI browsers:

    AI BrowserVendorStatus
    CometPerplexityFixed (November 18, 2025)
    Copilot for EdgeMicrosoftFixed (October 27, 2025)
    Gemini for ChromeGoogleUnresolved

    The technique also enables malware guidance with step-by-step installation instructions, medical harm through dangerous dosage misinformation, and credential theft via injected login links.

    The agentic capabilities of Perplexity’s Comet browser proved especially concerning.

    During testing, the browser automatically sent user data, including account names, transaction history, and contact details, to attacker-controlled endpoints.

    HashJack represents a significant shift in the AI threat landscape. Unlike traditional phishing attacks that rely on fake websites, this technique abuses user trust in legitimate domains.

    Any website can be weaponised without being compromised. The attacker needs to share a crafted URL containing the malicious fragment.

    As AI browser assistants gain access to sensitive data and system controls, the risk of context manipulation will continue growing.

    Security experts urge AI browser vendors to implement robust defences before widespread adoption makes these attacks inevitable in real-world scenarios.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post HashJack: New Attack Technique Tricks AI Browsers Using a Simple ‘#’ appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Olymp Loader has emerged as a sophisticated Malware-as-a-Service (MaaS) platform since its public debut in June 2025, quickly establishing itself as a notable threat across underground cybercriminal forums and Telegram channels. Marketed under the alias “OLYMPO,” this malware represents a concerning convergence of advanced evasion capabilities, multi-purpose functionality, and aggressive distribution tactics that significantly lower […]

    The post New Malware-as-a-Service ‘Olymp Loader’ Emerges on Hacker Forums With Advanced Anti-Analysis Features appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Multilateral Sanctions Monitoring Team (MSMT) has released a comprehensive report documenting systematic violations of UN sanctions by North Korea. Between 2024 and 2025, North Korean cyber operations have achieved unprecedented scale in cryptocurrency theft. In 2024 alone, DPRK-linked actors stole approximately USD 1.19 billion a 50 percent year-on-year increase. Revealing how the Democratic People’s […]

    The post North Korean Hackers Evade UN Sanctions Through Cyber Operations and Crypto Schemes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Tor Project has announced a significant cryptographic overhaul, retiring its legacy relay encryption algorithm after decades of service and replacing it with Counter Galois Onion (CGO).

    This research-backed encryption design defends against a broader class of sophisticated online attackers.

    Tor’s relay encryption serves a specialized function distinct from the standard TLS protocol used between relays and clients.

    This algorithm encrypts user data as it traverses multiple relays in a circuit, with clients sharing symmetric keys with each relay and progressively removing encryption layers.

    The current system, now designated “tor1,” dates back to Tor’s early years when modern cryptographic practices were still emerging.

    While functional, tor1’s design exhibits several vulnerabilities that researchers have successfully exploited in controlled settings.

    Critical Vulnerabilities Addressed

    The most severe threat is tagging attacks, in which active adversaries modify encrypted traffic at a single network point and observe predictable changes elsewhere.

    Tor1’s reliance on AES-128-CTR encryption without hop-by-hop authentication creates a malleable ciphertext.

    Attackers can XOR patterns into encrypted cells, knowing that modifications will persist through decryption layers.

    By controlling both circuit endpoints, adversaries can inject identifiers such as IP addresses that traverse the entire path undetected.

    This represents an “Internal Covert Channel” attack, enabling definite deanonymization before any application traffic flows.

    Beyond tagging vulnerabilities, tor1 suffers from limited forward secrecy. Keys persist throughout a circuit’s lifetime, meaning stolen keys compromise all historical traffic.

    The algorithm also employs only a 4-byte authentication digest roughly a 1-in-4-billion forgery probability relying on path-bias detection rather than cryptographic strength.

    Additionally, tor1 uses SHA-1, an increasingly compromised hashing function.

    Developed by cryptographers Jean Paul Degabriele, Alessandro Melloni, Jean-Pierre Münch, and Martijn Stam, CGO implements a Rugged Pseudorandom Permutation (RPRP) construction explicitly designed for Tor’s asymmetric encryption model.

    Unlike full Strong Pseudorandom Permutations, which require two passes over the data, the UIV+ foundation enables one-directional tagging resistance at reduced computational cost.

    Originating a CGO message
    Originating a CGO message

    CGO addresses all identified vulnerabilities. Wide-block construction ensures that any tampering renders the entire message unrecoverable.

    Chaining authentication tags across cells means that single-cell modifications garble all subsequent messages.

    Immediate forward secrecy is provided by the Update algorithm, which irreversibly transforms keys after each cell, preventing decryption of historical traffic. Authentication now uses a robust 16-byte authenticator, replacing the deprecated digest.

    The Tor Project has implemented CGO in Arti (Rust) and in C for relay compatibility. Development required extensive refactoring to eliminate assumptions about relay cell structure.

    Next steps include enabling CGO by default in Arti, implementing onion service negotiation protocols, and optimizing performance for modern CPUs.

    While CGO represents a relatively new cryptographic design still undergoing academic scrutiny, researchers emphasize that identified weaknesses are unlikely to exceed tor1’s vulnerabilities.

    Adoption means a methodical progression toward stronger anonymity protections for millions of Tor users worldwide.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Tor Adopts Galois Onion Encryption to Strengthen Defense Against Online Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft Teams is set to launch a key update for its Windows desktop client, introducing a new child process, ms-teams_modulehost.exe, to boost the performance of calling features and reduce startup times. This change separates the calling stack from the primary ms-teams.exe process, allowing better resource management and smoother meetings without altering user interfaces or workflows. […]

    The post Microsoft Teams Rolls Out New Feature For Faster Startup and Better Performance appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶