• APT24, a sophisticated cyber espionage group linked to China’s People’s Republic, has launched a relentless three-year campaign delivering BadAudio, a highly obfuscated first-stage downloader that enables persistent network access to targeted organizations.

    The threat actor has demonstrated remarkable adaptability by shifting from broad strategic web compromises to precision-targeted attacks focusing on Taiwan-based entities.

    The group’s operational evolution showcases an alarming trend of combining multiple attack vectors, including supply chain compromises targeting regional digital marketing firms and spear-phishing campaigns designed to exploit organizational trust.

    The emergence of BadAudio represents a significant escalation in APT24’s technical capabilities. Beginning in November 2022, the group weaponized over twenty legitimate websites by injecting malicious JavaScript payloads that redirected unsuspecting visitors to attacker-controlled infrastructure.

    BADAUDIO campaign overview (Source - Google Cloud)
    BADAUDIO campaign overview (Source – Google Cloud)

    This watering hole approach demonstrates the group’s willingness to cast a wide net while selectively targeting victims identified through advanced fingerprinting techniques.

    The malware’s deployment methodology has continuously evolved, reflecting the threat actor’s commitment to maintaining operational effectiveness against increasingly sophisticated defensive measures.

    Google Cloud security analysts identified the BadAudio malware after recognizing patterns consistent with previous APT24 campaigns.

    Researchers noted that the malware operates as a custom first-stage downloader written in C++, designed to download, decrypt, and execute AES-encrypted payloads from hardcoded command-and-control servers.

    The malware quietly collects basic system information, including hostname, username, and system architecture, then encrypts this data and embeds it within cookie parameters sent to attacker-controlled endpoints.

    Strategic web compromise attack flow (Source - Google Cloud)
    Strategic web compromise attack flow (Source – Google Cloud)

    This subtle beaconing technique complicates traditional network-based detection approaches, enabling prolonged persistence without triggering security alerts.

    Technical sophistication

    The technical sophistication embedded within BadAudio demonstrates control flow flattening, an advanced obfuscation technique that systematically dismantles a program’s natural logic structure.

    The malware manifests primarily as a malicious Dynamic Link Library leveraging DLL Search Order Hijacking to gain execution through legitimate applications.

    Recent variants employ encrypted archives containing BadAudio DLLs alongside VBS, BAT, and LNK files that automate placement and persistence mechanisms through legitimate executable startup entries.

    Compromised JS supply chain attack (Source - Google Cloud)
    Compromised JS supply chain attack (Source – Google Cloud)

    Upon execution, subsequent payloads decrypted using hardcoded AES keys have been confirmed as Cobalt Strike Beacon in identified instances, providing full remote access capabilities to compromised networks.

    APT24 has recently pivoted toward more targeted delivery mechanisms rather than broad opportunistic attacks. Supply chain compromises targeting regional digital marketing firms in Taiwan have enabled the group to conduct sophisticated attacks affecting multiple organizations simultaneously.

    Phishing campaigns leveraging social engineering tactics, including misleading emails purporting to originate from animal rescue organizations, drive direct malware downloads from attacker-controlled infrastructure.

    The group has exploited legitimate cloud storage platforms including Google Drive and OneDrive to distribute encrypted archives, demonstrating their willingness to abuse trusted services for malicious purposes.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post China-linked APT24 Hackers New BadAudio Compromised Legitimate Public Websites to Attack Users appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The underground labor market has undergone a significant transformation. According to new research analyzing 2,225 job-related posts collected from shadow forums between January 2023 and June 2025. The dark web job market now emphasizes practical skills and real-world experience over traditional credentials, marking a notable shift from previous patterns and reflecting broader global employment trends.​ […]

    The post Dark Web Job Market Evolved – Prioritizes Practical Skills Over Formal Education appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cl0p ransomware group has claimed responsibility for infiltrating Broadcom’s internal systems as part of an ongoing exploitation campaign targeting Oracle E-Business Suite vulnerabilities.

    The hack uses a critical zero-day vulnerability (CVE-2025-61882) rated 9.8 on the CVSS scale, allowing attackers to execute arbitrary code without authentication.​

    Broadcom, a major semiconductor and infrastructure software provider, becomes the latest high-profile victim in a massive extortion campaign that began in late September 2025.

    Zero-Day Flaw Enables Unauthorized Access

    The threat actors claim to have accessed internal enterprise resource planning (ERP) archives, design documentation, and sensitive semiconductor records.

    Given Broadcom’s influence across telecommunications, data centers, and AI accelerator manufacturing. The potential exposure of internal documentation raises concerns for supply chain integrity and partner ecosystems.​

    Security researchers from Google Threat Intelligence Group and Mandiant traced the underlying breach activity back to July 10, 2025, with confirmed exploitation beginning August 9, 2025, weeks before Oracle released patches.

    The Cl0p group gathered information and moved through victim networks before starting a coordinated email blackmail campaign in September, hitting executives at many companies at the same time.

    warning and cyber situational awareness
    warning and cyber situational awareness

    The attack exploited Oracle E-Business Suite’s Business Intelligence Publisher integration within the Concurrent Processing component, granting attackers complete system control.

    Cl0p supplemented the zero-day with additional previously patched vulnerabilities to maximize its foothold across enterprise networks.​

    The broader campaign has reportedly compromised at least 29 organizations, according to recent postings on the Cl0p data-leak site.

    The attackers used hacked third-party email accounts purchased from infostealer markets to bypass spam filters and make their extortion emails appear more believable.

    Oracle released emergency patches in October 2024, though organizations running older E-Business Suite versions remain vulnerable if patches haven’t been applied.

    Security experts recommend immediate patching and enhanced monitoring for suspicious POST requests to the/OA_HTML/SyncServlet endpoints, which are high-fidelity compromise indicators.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Broadcom Allegedly Breached by Clop Ransomware via E-Business Suite 0-Day Hack appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Grafana Labs has disclosed a critical security vulnerability affecting Grafana Enterprise that could allow attackers to escalate privileges and impersonate users.

    The flaw, tracked as CVE-2025-41115, has received the maximum CVSS score of 10.0, making it one of the most severe vulnerabilities discovered in recent times.

    The vulnerability exists in Grafana’s SCIM (System for Cross-domain Identity Management) setup feature, which was introduced in April 2025 to help organizations automate user lifecycle management.

    The issue affects Grafana Enterprise versions 12.0.0 through 12.2.1, where SCIM setup is enabled and configured.

    According to Grafana Labs, the vulnerability stems from incorrect handling of user identities. A malicious or compromised SCIM client could provision a user with a numeric externalId, potentially overriding internal user IDs.

    AttributeDetails
    CVE IDCVE-2025-41115
    Vulnerability TypeIncorrect Privilege Assignment / User Impersonation
    CVSS Score10.0
    SeverityCritical
    Affected ProductsGrafana Enterprise (with SCIM provisioning enabled)
    Affected VersionsGrafana Enterprise 12.0.0 to 12.2.1

    This could allow attackers to impersonate existing users, including administrators, leading to complete system compromise.

    The flaw affects only systems where both the enableSCIM feature flag and the user_sync_enabled configuration option are set to true. This vulnerability does not impact Grafana OSS users.

    Grafana Labs discovered the vulnerability during internal security audits on November 4, 2025, and immediately declared an internal incident.

    The company confirmed no exploitation occurred in Grafana Cloud environments and released patches within days.

    Organizations running affected versions should upgrade immediately to patched versions, including Grafana Enterprise 12.3.0, 12.2.1, 12.1.3, or 12.0.6.

    Grafana Cloud customers and managed service users on Amazon and Azure platforms have already received automatic security updates.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical Grafana Vulnerability Let Attackers Escalate Privilege appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for modern work—but with mobility comes risk. IT admins, like you, juggle protecting sensitive data while keeping teams productive. That’s why more enterprises are turning to Samsung for mobile security. Hey—you’re busy, so here’s a quick-read article on what

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent remote access to compromised networks as part of a nearly three-year campaign. “While earlier operations relied on broad strategic web compromises to compromise legitimate websites, APT24 has recently pivoted to using more sophisticated vectors targeting

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • North Korea’s two most formidable APT groups Kimsuky and Lazarus have established a coordinated operational framework that combines intelligence gathering with large-scale cryptocurrency theft. According to a comprehensive Trend Micro analysis, this collaboration poses an unprecedented threat to critical infrastructure worldwide, with attacks targeting the military, financial, blockchain, energy, and healthcare sectors across the United […]

    The post North Korean Kimsuky and Lazarus Teams Target Critical Sectors with Zero-Day Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security vulnerability has been discovered in ASUSTOR backup and synchronization software, allowing attackers to execute malicious code with elevated system privileges.

    The flaw, tracked as CVE-2025-13051, affects two widely used ASUSTOR applications and poses a significant risk to users running outdated versions.

    The DLL Hijacking Vulnerability

    The vulnerability stems from a DLL hijacking weakness that occurs when ASUSTOR Backup Plan (ABP) and ASUSTOR EZSync (AES) services are installed in directories accessible to non-administrative users.

    Attackers can exploit this flaw by replacing legitimate dynamic link library (DLL) files with malicious versions that share the same filename as those loaded by the service.

    When the affected service restarts, the malicious DLL is automatically loaded and executed.

    FieldDetails
    CVE IDCVE-2025-13051
    SeverityCritical
    CVSS 4.0 Score9.3
    Attack VectorLocal
    Affected ProductsABP ≤2.0.7.9050, AES ≤1.0.6.8290

    Under the LocalSystem account, granting attackers unauthorized code execution with the highest level of system privileges.

    This type of attack can lead to complete system compromise, allowing threat actors to install malware, steal sensitive data, or establish constant backdoor access.

    The bug affects ABP version 2.0.7.9050 and all older versions, and AES version 1.0.6.8290 and all earlier releases.

    ASUSTOR has released security patches to address this critical flaw. Users should immediately upgrade to ABP version 2.0.7.10171 or higher, and to AES version 1.1.0.10312 or higher, to protect their systems from potential exploitation.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical ASUSTOR Vulnerability Let Attackers Execute Malicious Code with Elevated Privileges appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has announced a significant Windows 11 update that will prevent the Blue Screen of Death (BSOD) and other system error messages from appearing on public-facing screens. The new feature, called Digital Signage mode, addresses a critical business continuity challenge faced by restaurants, airports, retail stores, and other organizations that rely on public displays. Digital Signage […]

    The post Windows 11 to Prevent BSOD Error Messages from Showing Publicly appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new breed of browser-based cyberattack is sweeping the threat landscape, as BlackFog researchers have uncovered. Dubbed Matrix Push C2, this command-and-control framework arms cybercriminals with the means to launch fileless malware and phishing campaigns that exploit web browsers as their delivery vehicle. By abusing browser push notifications a legitimate, built-in feature spanning Windows, Mac, […]

    The post Hackers Adopt Matrix Push C2 for Browser-Based Malware and Phishing Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶