• The Metasploit Framework has introduced a new exploit module targeting critical vulnerabilities in Fortinet’s FortiWeb Web Application Firewall (WAF).

    This module chains two recently disclosed flaws, CVE-2025-64446 and CVE-2025-58034, to achieve unauthenticated Remote Code Execution (RCE) with root privileges.

    The release follows reports of active exploitation in the wild, including “silent patches” and subsequent bypasses that have left many appliances exposed.

    The Exploitation Chain

    The new module, identified as exploit/linux/http/fortinet_fortiweb_rce, automates a sophisticated attack chain that bypasses authentication mechanisms before executing arbitrary operating system commands.

    The attack begins with CVE-2025-64446, a critical authentication bypass vulnerability with a CVSS score of 9.1. As analyzed by researchers at watchTowr, this flaw involves a path traversal issue combined with improper handling of the CGIINFO header.

    By manipulating this header and traversing to the fwbcgi executable, an unauthenticated attacker can impersonate the built-in admin user and create a new administrative account without valid credentials.

    Once administrative access is established, the module leverages CVE-2025-58034 to compromise the underlying system. This second vulnerability is an authenticated command injection flaw found in the FortiWeb API and CLI, where special elements in OS commands are not properly neutralized.

    Rapid7 analysis confirms that this flaw allows an authenticated user to escape the intended shell restrictions and execute commands as the root user. By chaining these two issues, the Metasploit module allows an external attacker to go from zero access to full system control in seconds.

    Metasploit Module

    The Metasploit module is designed to be flexible across different attack scenarios. In its default mode, it automatically exploits the authentication bypass (CVE-2025-64446) to provision a random administrator account.

    It then authenticates with these new credentials to trigger the command injection. Alternatively, if an attacker already possesses valid credentials, the module can be configured to skip the bypass phase and directly exploit CVE-2025-58034.

    Technically, the exploit utilizes a chunked upload mechanism to deliver its payload. As seen in the pull request documentation, the module uploads a “bootstrap payload” in multiple parts (e.g., 4 chunks) before amalgamating and executing them.

    This method ensures reliable execution even within the constrained environment of the appliance. Successful exploitation grants a shell with uid=0(root), giving the attacker complete control over the WAF device.

    Fortinet has released patches to address these vulnerabilities, and users are strongly advised to upgrade to FortiWeb version 8.0.2 or later immediately.

    Because CVE-2025-64446 allows for the silent creation of rogue administrators, simply patching is insufficient for potentially compromised devices. Security teams should audit their user lists for unknown accounts and review logs for requests to /api/v2.0/cmdb/system/admin originating from untrusted IP addresses.

    CVE IDVulnerability TypeCVSSAffected Products (Partial List)
    CVE-2025-64446Auth Bypass / Path Traversal9.1FortiWeb 7.4.0-7.4.4, 7.6.0-7.6.4, 8.0.0-8.0.1
    CVE-2025-58034OS Command Injection7.2FortiWeb 8.0.0-8.0.1

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Metasploit Adds Exploit Module for Recently Disclosed FortiWeb 0-Day Vulnerabilities appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A former IT contractor from Ohio has admitted to launching a cyberattack against his employer’s network in retaliation for being terminated, federal prosecutors announced this week.

    Maxwell Schultz, 35, of Columbus, Ohio, pleaded guilty to computer fraud charges after leading a technical attack that locked thousands of employees out of their systems nationwide.

    On May 14, 2021, Schultz was fired from his contract position in the company’s IT department. Rather than accepting the termination, he chose to strike back digitally.

    Shortly after his dismissal, Schultz impersonated another contractor to fraudulently obtain valid login credentials, gaining unauthorized access to the company’s network.

    Once inside the system, Schultz executed a PowerShell script designed to cause maximum disruption.

    The malicious code reset approximately 2,500 employee passwords simultaneously, effectively locking thousands of workers and contractors out of their computers across multiple locations.

    Schultz didn’t stop at password resets. He actively sought methods to delete digital evidence of his unauthorized access, including PowerShell event logs and system logs.

    Despite clearing multiple logs, investigators eventually traced the attack back to him. The company suffered significant financial losses exceeding $862,000.

    These damages included widespread employee downtime, disrupted customer service operations, and extensive labor costs required to restore standard network functionality.

    The ripple effects impacted both internal operations and customer relationships. As part of his guilty plea, Schultz acknowledged that anger over his termination motivated the attack. He now faces serious federal consequences.

    U.S. District Judge Lee Rosenthal will sentence Schultz on January 30, 2026. He faces up to 10 years in federal prison and a maximum fine of $250,000.

    The FBI led the investigation, with Assistant U.S. Attorneys Rodolfo Ramirez and Michael Chu prosecuting the case.

    This case highlights the critical importance of immediately revoking system access for terminated employees, particularly those with administrative privileges.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Rapid7’s Metasploit team has released a new exploit module targeting critical zero-day vulnerabilities in Fortinet’s FortiWeb web application firewall, chaining two security flaws to achieve unauthenticated remote code execution with root privileges.​ CVE ID Vulnerability Type Affected Product Impact CVE-2025-64446 Authentication Bypass Fortinet FortiWeb Administrative account creation, privilege escalation CVE-2025-58034 Command Injection Fortinet FortiWeb Remote […]

    The post Metasploit Releases New Exploit for Fresh FortiWeb 0-Day Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity giant CrowdStrike has confirmed the termination of an insider who allegedly provided sensitive internal system details to a notorious hacking collective.

    The incident, which came to light late Thursday and Friday morning, involved the leak of internal screenshots on a public Telegram channel operated by the threat group known as “Scattered Lapsus$ Hunters.”

    The leaks surfaced when Scattered Lapsus$ Hunters, a self-proclaimed “supergroup” comprising members from Scattered Spider, LAPSUS$, and ShinyHunters, posted images purportedly showing access to CrowdStrike’s internal environment.

    The screenshots, which TechCrunch reviewed, displayed internal dashboards, including an Okta Single Sign-On (SSO) panel used by employees to access corporate applications.

    The hackers claimed these images were proof of a broader compromise achieved through a third-party breach at Gainsight, a customer success platform used by Salesforce clients.​

    However, the reality appears to be less about a technical breach and more about human vulnerability. Reports indicate that the threat actors allegedly offered the insider $25,000 to facilitate access to the network.

    While the hackers claimed to have received authentication cookies, CrowdStrike maintains that its security operations center detected the activity before any malicious access could be fully established.​

    CrowdStrike swiftly addressed the claims, clarifying that the leaked images were the result of an employee sharing pictures of their screen rather than a systemic network intrusion.

    CrowdStrike spokesperson said to Cybersecurity News, “We identified and terminated a suspicious insider last month following an internal investigation that determined he shared pictures of his computer screen externally. Our systems were never compromised, and customers remained protected throughout. We have turned the case over to the relevant law enforcement agencies.”

    This incident is part of a larger, aggressive campaign by Scattered Lapsus$ Hunters, who have recently targeted major corporations by exploiting third-party vendors like Gainsight and Salesloft.

    In October 2025, the group claimed to have exfiltrated nearly 1 billion records from Salesforce customers, listing high-profile victims such as Allianz Life, Qantas, and Stellantis on their data leak site.

    The group’s modus operandi often involves high-pressure social engineering and recruiting insiders to bypass perimeter defenses, a tactic that has become increasingly common in 2025.​

    While CrowdStrike successfully contained this specific insider threat without customer impact, the event highlights the persistent danger posed by recruited employees in high-stakes cybersecurity environments.

    The convergence of sophisticated social engineering with the pooled resources of three major cybercrime gangs represents a significant evolution in the threat landscape facing tech enterprises today.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CrowdStrike Fires Insider for Sharing Internal System Details with Hackers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • If your tools say a link is clean, do you fully trust it? 

    Most SOC leaders don’t anymore, and for good reason. Phishing has become polished, quiet, and built to blend into everyday traffic.

    It slips through filters, lands in inboxes unnoticed, and only reveals its intent after a user interacts. By the time the real behavior appears, your defenses have already stepped aside. 

    That’s the visibility gap attackers are exploiting every day. 

    Here’s how your team can close that gap and finally see what those “clean” links are really doing. 

    Why Phishing Is Harder to Detect Than Ever 

    Phishing rarely looks suspicious anymore. It blends into normal traffic and hides the real danger until the very last moment, long after most tools stop analyzing. 

    Here’s the new phishing reality we’re living in:  

    • It looks clean at first glance: Pages and emails now copy real services almost perfectly. 
    • The bad part appears late: Harmful behavior triggers only after clicks or form inputs. 
    • QR codes bypass filters: Scanners often can’t read what’s behind the code, so threats enter unnoticed. 
    • Redirect chains hide the final payload: Each hop looks harmless, while the real page sits at the end. 
    • Domains rotate constantly: Short-lived infrastructure makes blocklists easy to evade. 

    The Fix: See the Full Phishing Attack, Not the Safe-Looking First Step 

    Many SOC teams have already shifted to advanced behavioral tools, especially interactive sandboxes, because they reveal the parts of phishing attacks that traditional controls never reach.

    Instead of stopping at the first “clean” page, the sandbox follows the entire chain and shows the real behavior in minutes. 

    For example, ANY.RUN’s sandbox can expose 90% of full phishing chains in under 60 seconds, even when the attack hides or uses rediraction as evasion technique. 

    Check real-world example: phishing attack with rediraction techniques 

    Fake phishing login page exposed inside ANY.RUN sandbox in 1 min 

    A recent case showed attackers using ClickUp as the entry point, then quietly redirecting victims through legitimate Microsoft microdomains and finally to an Azure-hosted fake login page. 

    Inside the sandbox, the whole sequence unfolded automatically in 1 minute, including the redirects and credential-harvesting actions. 

    Get clear, real-time visibility into phishing attacks your tools currently miss, and see how your team can investigate faster -> Talk to ANY.RUN experts 

    The Secret of the Fix: Interactivity + Automation 

    Most security tools fail to expose modern phishing for one simple reason: 
    they can automate, or they can imitate a human, but they can’t do both at the same time. 

    That’s exactly the combination today’s evasive attacks are built to defeat. 

    Phishing kits now rely heavily on human-only actions, clicking through pages, solving CAPTCHA gates, opening links from QR codes, triggering behavior with mouse movement, steps that static scanners and automated crawlers never perform. 

    Automation alone stops too early. 

    Manual analysis alone is too slow. 

    The real breakthrough comes from combining both. 

    That’s why solutions built on interactive automation have become essential for SOC teams. For instance, ANY.RUN’s interactive sandbox gives analysts the best of both worlds: 

    • Automation handles the repetitive tasks: 
      It follows redirects, extracts and opens hidden links from QR codes, launches the right browser, and solves CAPTCHA gates automatically. 
    • Interactivity gives analysts control: 
      They can pause the run, follow suspicious paths, click through pages, or trigger actions whenever needed. 

    ANY.RUN identified the link hidden in the QR 

    This combination delivers something most tools can’t: full visibility into the entire phishing chain.  

    It reveals attacks that hide their payload several steps deep, rely on human behavior, or change depending on who’s visiting. And it does it fast enough for analysts to make confident decisions without wasting hours recreating the flow. 

    The Results SOC Leaders Are Already Seeing 

    Teams that added an interactive sandbox into their workflow are seeing measurable improvements across their entire response process. 

    SOC leaders report: 

    • Up to 58% more threats identified overall, including attacks that bypassed other tools. 
    • 94% of users experience faster triage, thanks to clear behavioral reports and instant IOCs. 
    • Up to 20% lower workload for Tier 1, as automation handles the tedious steps. 
    • 30% fewer escalations from Tier 1 to Tier 2, because junior analysts can resolve more cases with richer context. 
    • 95% of SOC teams speed up investigations, supported by collaboration tools and shared behavioral visibility. 

    Talk to ANY.RUN experts to see how an interactive sandbox can strengthen your team’s detection, investigation speed, and response workflow. 

    Free Webinar: SOC Leader’s Playbook – 3 Steps to Faster MTTR 

    If you want a deeper, practical look at how top SOCs accelerate detection and response, ANY.RUN is hosting a one-hour session titled “SOC Leader’s Playbook: 3 Steps to Faster MTTR” on 25 November 2025 at 16:00 CET

    In this session, experts will break down how leading teams: 

    • Cut MTTR by 21 minutes per incident 
    • Detect new threats earlier with intelligence from 15,000 organizations 
    • Achieve a 3× performance boost by reducing false positives 

    Save your seat now to get a clear, proven playbook for speeding up your SOC’s response. 

    The post Phishing Breaks More Defenses Than Ever. Here’s the Fix  appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new wave of malicious Android applications impersonating a well-known Korean delivery service has emerged, featuring advanced obfuscation techniques powered by artificial intelligence.

    These apps work to bypass traditional antivirus detection methods while extracting sensitive user information.

    The threat actors behind this campaign have demonstrated sophisticated knowledge of mobile security vulnerabilities, combining multiple evasion strategies to maintain their operation undetected.

    The malware campaign relies on a clever delivery mechanism that disguises itself as a legitimate package tracking application.

    When users grant the necessary permissions, the app displays an interface resembling the real delivery service by connecting to authentic tracking websites using randomly generated tracking numbers.

    Metadata of the malicious app (Source - ASEC)
    Metadata of the malicious app (Source – ASEC)

    This social engineering approach builds trust while the application performs malicious activities in the background, making it particularly dangerous for unsuspecting victims.

    ASEC security analysts identified this malware after detecting repeated distribution patterns across various channels.

    The investigation revealed that threat actors utilized AI-enhanced obfuscation techniques to disguise the app’s functionality and make reverse engineering significantly more difficult for security researchers.

    Detection Evasion Through Intelligent Obfuscation

    The technical sophistication of these applications lies in their obfuscation implementation. The developers applied AI-powered ProGuard obfuscation, converting all class names, function identifiers, and variable names into meaningless eight-character Korean text strings.

    This approach differs from standard obfuscation because the random Korean characters make pattern-based detection substantially harder for automated security tools.

    Permission request (Source - ASEC)
    Permission request (Source – ASEC)

    The resource names remained unmodified, indicating a selective obfuscation strategy designed specifically to hide the app’s core functionality while maintaining enough structural integrity for it to operate normally.

    Security researchers discovered that after collecting information from infected devices, the malware exfiltrates data through breached legitimate websites repurposed as command-and-control servers.

    The threat actors hardcoded C2 server addresses within blogs hosted on Korean portals, loading them dynamically when the application launches.

    This technique creates an additional detection barrier because the actual malicious servers appear as benign web traffic to network monitoring systems, effectively hiding the data theft operation from security infrastructure.

    The identified samples included five confirmed MD5 hashes, with associated URLs pointing to compromised Korean domains used for data exfiltration.

    Security professionals should prioritize detecting and blocking these samples across their networks while implementing stricter application permission controls for delivery service apps.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post AI-Based Obfuscated Malicious Apps Evading AV Detection to Deploy Malicious Payload appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Xillen Stealer, a sophisticated Python-based information stealer, has emerged as a significant threat in the cybercriminal landscape.

    Originally identified by Cyfirma in September 2025, this cross-platform malware has recently evolved into versions 4 and 5, introducing a dangerous arsenal of features designed to steal sensitive credentials, cryptocurrency wallets, and system information while evading modern security systems.

    The malware targets data across more than 100 browsers and over 70 cryptocurrency wallets, positioning itself as a comprehensive credential harvesting tool marketed through Telegram channels.

    The malware operates through a professional-looking interface that allows attackers to manage exfiltrated data, monitor infections, and view configuration settings.

    Xillen Stealer’s functionality extends far beyond basic information theft.

    It captures browser data including history, cookies, and saved passwords, while simultaneously targeting password managers like OnePass, LastPass, BitWarden, and Dashlane.

    The stealer also focuses on collecting developer credentials, cloud configurations from AWS, GCP, and Azure, alongside SSH keys and database connection information.

    Darktrace security analysts noted that the latest versions introduce an innovative approach to targeting high-value victims.

    The malware includes an AITargetDetection class designed to identify valuable targets based on weighted indicators and specific keywords.

    It searches for cryptocurrency wallets, banking credentials, premium accounts, and developer access, while prioritizing victims in wealthy countries including the United States, United Kingdom, Germany, and Japan.

    Although the implementation currently relies on rule-based pattern matching rather than actual machine learning, it demonstrates how threat actors plan to integrate AI into future campaigns.

    Xillen Stealer

    The most concerning aspect of Xillen Stealer lies in its advanced evasion capabilities. The AIEvasionEngine module employs multiple techniques to bypass security systems.

    Xillen Stealer (Source -Darktrace)
    Xillen Stealer (Source -Darktrace)

    These include behavioral mimicking that simulates legitimate user actions, noise injection to confuse behavioral classifiers, timing randomization with irregular delays, and resource camouflage designed to imitate normal applications.

    The malware further employs API call obfuscation and memory access pattern alterations to defeat machine learning-based detection systems.

    Additionally, the Polymorphic Engine transforms code through instruction substitution, control flow obfuscation, and dead code injection to ensure each sample appears unique, preventing signature-based detection.

    For data exfiltration, Xillen Stealer implements a peer-to-peer command-and-control structure leveraging blockchain transactions, anonymizing networks like Tor and I2P, and distributed file systems.

    The malware creates HTML and TXT reports containing stolen data and sends them to attackers’ Telegram accounts.

    Security professionals must remain vigilant against this evolving threat, as its combination of credential theft, detection evasion, and adaptive targeting capabilities represents a significant risk to both individual users and enterprise environments.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Xillen Stealer With New Advanced Features Evade AI Detection and Steal Sensitive Data from Password Managers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The dark web has transformed into a functioning parallel labor market where cyber specialists find employment through unconventional channels.

    Unlike traditional job boards, this shadow economy operates with distinct recruitment norms and salary expectations that differ significantly from legitimate hiring practices.

    A comprehensive analysis of 2,225 job-related posts collected from dark web forums between January 2023 and June 2025 reveals how this underground employment landscape continues to grow and evolve.

    The market demonstrates that cybercriminals prioritize practical experience and demonstrated technical capability over educational credentials.

    Kaspersky security analysts identified that job seekers increasingly highlight their prior work history within the shadow economy, indicating this environment has become an established career path for many participants.

    Securelist security analysts noted that the dark web job market reflects broader shifts in how criminal enterprises recruit talent.

    The majority of job postings do not specify traditional professional fields, with evidence showing that 69 percent of applicants lack formal educational requirements in their profiles.

    Instead, employers focus on what candidates have actually accomplished in previous roles. This represents a fundamental departure from conventional hiring practices, where degrees and certifications typically serve as filtering mechanisms.

    The market operates with transparent salary structures and defined role expectations, mirroring legitimate employment systems in surprising ways.

    Experience Over Credentials: The New Hiring Standard

    The most significant finding shows that practical experience has become the primary qualification currency. Job seekers consistently emphasize their track record within criminal operations, portfolio work, and demonstrated technical proficiency rather than formal training or certifications.

    Employers posting opportunities actively seek individuals who can provide evidence of previous successful projects or campaigns.

    This shift prioritizes real-world problem-solving and proven results over theoretical knowledge. Candidates who can demonstrate specific technical skills through past work samples receive preferential consideration.

    The dark web job market essentially operates as a pure meritocracy where actions matter more than credentials. Salaries reflect market demand for specific technical expertise, with specialized roles commanding premium compensation.

    This evolution suggests that the underground employment landscape functions as a genuine economic system with recognizable labor dynamics comparable to legitimate industries.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Dark Web Job Market Evolved – Prioritizes Practical Skills Over Formal Education appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Two of North Korea’s most dangerous hacking groups have joined forces to launch a coordinated attack campaign that threatens organizations worldwide.

    The Kimsuky and Lazarus groups are working together to steal sensitive intelligence and cryptocurrencies through a systematic approach that combines social engineering with zero-day exploitation.

    This partnership represents a major shift in how state-sponsored threat actors operate, moving from isolated attacks to carefully coordinated operations.

    The campaign begins with Kimsuky conducting reconnaissance through carefully crafted phishing emails disguised as academic conference invitations or research collaboration requests.

    These messages contain malicious attachments in HWP or MSC formats that deploy the FPSpy backdoor when opened. Once installed, the backdoor activates a keylogger called KLogEXE that captures passwords, email content, and system information.

    This intelligence gathering phase maps out the target’s network architecture and identifies valuable assets before handing off control to Lazarus.

    CN-SEC security researchers noted that Lazarus then exploits zero-day vulnerabilities to gain deeper access to compromised systems.

    The group has weaponized CVE-2024-38193, a Windows privilege escalation flaw, to deploy malicious Node.js packages that appear legitimate.

    When these packages are executed, attackers gain SYSTEM-level privileges and install the InvisibleFerret backdoor, which bypasses endpoint detection tools through the Fudmodule malware component.

    Technical Breakdown of the InvisibleFerret Backdoor

    The InvisibleFerret backdoor represents a significant advancement in evasion capabilities. It disguises its network traffic as normal HTTPS web requests, making detection through traffic analysis extremely difficult for security teams.

    The malware specifically targets blockchain wallets by scanning system memory for private keys and transaction data stored in browser extensions and desktop applications.

    In one documented case, attackers transferred $32 million in cryptocurrency within 48 hours without triggering security alerts.

    The backdoor communicates with command and control servers through encrypted channels that rotate daily using a domain polling strategy. Each C2 domain is disguised as a legitimate e-commerce or news website to avoid suspicion.

    After completing their objectives, both groups coordinate to remove evidence through shared infrastructure.

    They overwrite malicious files with legitimate system processes and delete attack logs. Organizations in defense, finance, energy, and blockchain sectors face the highest risk from this threat.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post North Korean Kimsuky and Lazarus Join Forces to Exploit Zero-Day Vulnerabilities Targeting Critical Sectors Worldwide appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new command-and-control platform called Matrix Push C2 has emerged as a serious threat to web users across all operating systems.

    This browser-based attack framework turns legitimate web browser features into a weapon for delivering malware and phishing attacks.

    Unlike traditional malware that requires file downloads, Matrix Push C2 operates silently through a fileless attack method, making it harder to detect and stop.

    The platform exploits web push notifications, a standard feature in modern browsers, to establish direct communication channels with infected devices.

    Attackers use this connection to deliver fake system alerts, redirect users to malicious websites, monitor victim activity in real time, and even scan for cryptocurrency wallets.

    The beauty of this attack from the cybercriminal’s perspective is that it bypasses many traditional security tools because it appears to come from the browser itself rather than external malware.

    Blackfog security analysts identified the malware’s sophisticated approach to victim targeting and engagement.

    The Matrix Push C2 dashboard provides attackers with detailed analytics showing infected browsers, notification delivery rates, and user interaction data.

    Matrix Push C2 campaign dashboard (Source - Blackfog)
    Matrix Push C2 campaign dashboard (Source – Blackfog)

    With just three test clients, the researchers observed a 100 percent delivery success rate, demonstrating how effective this attack vector could be at scale.

    How the Infection Mechanism Works

    The attack begins with social engineering. Attackers trick users into allowing browser notifications through malicious or compromised websites.

    Once a user subscribes to these notifications, the attacker gains a direct communication line to the victim’s desktop or mobile device.

    From that point forward, the attacker can push out convincing fake error messages and security alerts that look like they come from trusted companies or the operating system itself.

    When users click these deceptive notifications, they are redirected to attacker-controlled websites hosting phishing pages or malware downloads.

    For example, a fake notification might display “Update required! Please update Google Chrome to avoid data loss!” and direct users to download trojanized software.

    The entire attack happens through the browser’s notification system without requiring traditional malware installation.

    Cloudflare-style phishing notification example (Source - Blackfog)
    Cloudflare-style phishing notification example (Source – Blackfog)

    What makes Matrix Push C2 particularly dangerous is its use of brand-themed phishing templates. The platform includes pre-built templates mimicking PayPal, Netflix, Cloudflare, MetaMask, and other trusted services.

    Attackers can customize these templates to match official designs perfectly, exploiting user trust in recognized brands.

    Real-time monitoring capabilities allow attackers to track which notifications were delivered, which users clicked them, and gather valuable device information, creating a complete attack orchestration platform.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶