• The co-founders of Samourai Wallet, a cryptocurrency mixing service that facilitated over $237 million in illegal transactions, have been sentenced to prison following their conviction on money laundering and conspiracy charges. Keonne Rodriguez, 37, the Chief Executive Officer, received a five-year prison sentence on November 6, 2025, while William Lonergan Hill, 67, the Chief Technology […]

    The post Samourai Wallet Founders Jailed for $237M Crypto Laundering appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new global hacking campaign tracked as TamperedChef has emerged, exploiting everyday software names to trick users into installing malicious applications that deliver remote access tools.

    The campaign uses fake installers disguised as common programs like manual readers, PDF editors, and games, all equipped with valid code-signing certificates to appear legitimate.

    These applications are distributed through malvertising and search engine optimization techniques, making them easily discoverable by unsuspecting users searching for everyday tools or product manuals online.

    The attackers behind TamperedChef have built an industrial-scale operation using a network of U.S.-registered shell companies to acquire Extended Validation certificates.

    These disposable fronts allow the threat actors to sign their fake applications with trusted certificates, which helps them bypass security defenses and gain user trust.

    Once a certificate is flagged or revoked, operators quickly register new shell companies under generic names like “Digital Marketing” to maintain continuous operations and keep their malicious software appearing legitimate.

    Acronis security researchers identified the campaign in June 2025, though evidence suggests earlier activity. The operation primarily affects victims in the Americas, with roughly 80 percent concentrated in the United States, though the global infrastructure indicates a broad reach rather than targeted regional focus.

    Healthcare, construction, and manufacturing sectors show the highest concentration of infections, likely because users in these industries frequently search online for specialized equipment manuals, one of the behaviors TamperedChef exploits.

    Bing search results leading to a TamperedChef-controlled download site (Source - Acronis)
    Bing search results leading to a TamperedChef-controlled download site (Source – Acronis)

    The malware’s attack chain begins when users download fake applications from malicious websites that appear in search results or advertisements.

    After installation, these applications drop an XML configuration file used to create a scheduled task for persistence. This task executes a heavily obfuscated JavaScript payload that functions as a backdoor, establishing communication with command-and-control servers over HTTPS.

    The JavaScript payload encrypts data using XOR encryption with a random 16-byte key before encoding it with base64 for transmission.

    Infection Chain and Persistence Mechanism

    The TamperedChef infection process follows a multi-stage execution chain designed to evade detection while maintaining persistent access.

    When users execute the downloaded installer, they encounter a standard license agreement window that mimics legitimate software installation.

    During installation, the malware places a file named “task.xml” either in the installer’s temporary directory or the program installation directory at %APPDATA%\Programs\[Fake Application Name].

    Execution chain (Source - Acronis)
    Execution chain (Source – Acronis)

    This XML file serves as the configuration for creating a scheduled task using the command: schtasks /Create /tn "Scheduled Daily Task" /xml "%APPDATA%\Local\Programs\AnyProductManual\task.xml".

    The task executes immediately after creation and repeats every 24 hours with a random delay of up to 30 minutes.

    This configuration allows extended runtimes, blocks multiple simultaneous instances, and automatically runs any missed schedules, ensuring the JavaScript payload executes consistently without raising suspicion.

    The JavaScript payload itself is heavily obfuscated using tools from obfuscator.io, applying multiple techniques including string and function renaming, control flow flattening, and dead code injection.

    Once executed, the malware establishes communication with hard-coded command-and-control servers that evolved from random domain-generated strings to more recognizable domain names to blend with normal network traffic.

    The payload generates a machine ID to fingerprint devices and performs registry operations for system reconnaissance.

    The malware sends encrypted JSON objects containing event names, session IDs, machine IDs, and metadata to the C2 server. It also possesses remote code execution capabilities, allowing attackers to run commands on compromised systems.

    The campaign’s infrastructure relies on NameCheap for domain registration with one-year registration periods and domain privacy protection to hide ownership, enabling quick infrastructure rebuilding following takedowns.

    Recent discoveries show the operation continues expanding with new shell company signers including Stratus Core Digital LLC, DataX Engine LLC, and Nova Sphere Systems LLC, all following identical attack patterns.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post TamperedChef Hacking Campaign Leverages Common Apps to Deliver Payloads and Gain Remote Access appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • MTI Security researchers have uncovered a new, particularly advanced Android banking trojan, dubbed Sturnus, that targets users’ financial and personal data with an unprecedented level of device control and operational stealth. Distinct from conventional mobile malware, Sturnus not only supports the typical arsenal of credential theft and whole device takeover but also demonstrates the ability […]

    The post Sturnus Malware Hijacks Signal and WhatsApp, Taking Full Device Control appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated cyberattack targeting Oracle E-Business Suite (EBS) customers has exposed critical vulnerabilities in enterprise resource planning systems, compromising an estimated 100 organizations worldwide between July and October 2025.

    The campaign, attributed to the notorious Clop ransomware group and linked to the financially motivated threat actor FIN11, exploited a zero-day vulnerability, CVE-2025-61882, to achieve unauthenticated remote code execution on internet-facing EBS portals.

    With nearly 30 victims publicly named and data leaks containing hundreds of gigabytes to several terabytes of sensitive corporate information, this incident serves as a stark reminder of the evolving threat landscape facing modern enterprises.

    The breach affected prominent organizations, including Harvard University, The Washington Post, Logitech, Schneider Electric, and American Airlines’ subsidiary Envoy Air, exposing financial records, human resources data, supply chain information, and customer details.​

    The Oracle EBS campaign represents a textbook example of how threat actors exploit widely used enterprise software to achieve mass compromise.

    Oracle E-Business Suite serves as the operational backbone for thousands of organizations worldwide, managing critical functions including finance, human resources, supply chain operations, procurement, and customer relationship management.

    By compromising this centralized platform, attackers gained access to the most sensitive data repositories within victim organizations, effectively turning a trusted business tool into an attack vector.​

    Google Threat Intelligence Group (GTIG) and Mandiant researchers traced the earliest exploitation activity to July 10, 2025, with confirmed data theft beginning by August 9, 2025, weeks before Oracle released emergency patches.

    The sophisticated nature of the attack, involving fileless malware and multi-stage payloads, enabled the threat actors to evade traditional file-based detection systems while maintaining persistent access to compromised environments.

    Charles Carmakal, CTO of Mandiant Consulting, emphasized the pre-patch exploitation timeline, noting that attackers leveraged the zero-day vulnerability before defensive measures became available.​

    The campaign surfaced publicly on September 29, 2025, when executives at numerous organizations received extortion emails from actors claiming affiliation with the Clop brand.

    These emails, sent from hundreds of compromised third-party accounts to bypass spam filters, alleged the theft of sensitive data from victims’ Oracle EBS environments and threatened public disclosure unless ransom demands were met.

    The use of stolen credentials from infostealer malware logs represents a sophisticated social engineering tactic designed to add legitimacy to the extortion attempts.​

    Technical Exploitation: A Five-Stage Attack Chain

    CVE-2025-61882, assigned a critical CVSS score of 9.8, enabled unauthenticated attackers to achieve remote code execution on Oracle EBS versions 12.2.3 through 12.2.14 without requiring any user interaction.

    The vulnerability resides in the Oracle Concurrent Processing component and was actively exploited in the wild before patches became available, qualifying it as a true zero-day threat.​

    Security researchers from watchTowr Labs published a comprehensive technical analysis revealing that the exploit chains together five distinct vulnerabilities to achieve pre-authenticated remote code execution.

    The attack begins with a Server-Side Request Forgery (SSRF) vulnerability in the /OA_HTML/configurator/UiServlet endpoint, which accepts XML documents from unauthenticated users via the getUiType parameter.

    When the redirectFromJsp parameter is present, the servlet parses the XML to extract a return_url and creates an outbound HTTP request, allowing attackers to force the server to contact arbitrary hosts.​

    With SSRF control established, attackers inject Carriage-Return Line-Feed (CRLF) sequences into the URL payload to manipulate request framing and insert malicious headers.

    This CRLF injection enables adversaries to convert simple GET requests into crafted POST requests and smuggle additional data to downstream services. The exploit leverages HTTP connection reuse through keep-alive mechanisms, allowing staged requests to be pipelined over the same TCP socket for improved timing reliability.​

    Armed with POST-capable SSRF and header injection, attackers target internal services that are normally unreachable from public interfaces. Oracle EBS installations frequently expose internal HTTP services bound to private IP addresses and ports, commonly on port 7201.

    The exploit uses path-traversal techniques to bypass pathname-based authentication filters and retrieve restricted JSP pages, transforming internal-only resources into attacker-controllable execution paths. Researchers documented this technique by accessing the ieshostedsurvey.jsp endpoint via path manipulation: /OA_HTML/help/../ieshostedsurvey.jsp.​

    Once attackers reach the vulnerable JSP endpoint, the application constructs an XSL stylesheet URL by concatenating the incoming Host header with /ieshostedsurvey.xsl.

    The server creates a URL object and passes it to Java’s XSL processing pipeline, which downloads and executes the stylesheet from the attacker-controlled server.

    Because Java XSLT supports extension functions and can invoke arbitrary Java classes, the attacker-supplied XSL file decodes payloads and invokes javax.script other extensions to execute arbitrary code within the Java Virtual Machine.

    This final unsafe XSLT processing stage grants attackers complete remote code execution capability on the compromised system.​

    Mandiant investigators identified a secondary exploitation chain targeting the /OA_HTML/SyncServlet component in the August 2025 activity. This alternate attack path demonstrated the threat actors’ sophisticated understanding of Oracle EBS architecture and their ability to develop multiple exploitation techniques.

    The malware deployed following exploitation included GOLDVEIN.JAVA, an in-memory Java-based loader that fetches second-stage payloads, showing logical similarities to malware used in suspected Clop campaigns against Cleo managed file transfer systems in late 2024.​

    As of November 2025, the Clop data leak site listed 29 alleged victims spanning multiple sectors, including education, media, manufacturing, aerospace, technology, professional services, mining, construction, insurance, financial services, transportation, automotive, energy, and HVAC industries.

    Confirmed victims who publicly acknowledged the breach include Harvard University, Wits University in South Africa, American Airlines subsidiary Envoy Air, The Washington Post, and Logitech.

    Major industrial corporations named on the leak site include Schneider Electric, Emerson, Cox Enterprises, Pan American Silver, LKQ Corporation, and Copeland, though most have not publicly confirmed the incidents.​

    The Washington Post confirmed on November 6, 2025, that it was among the victims, though the organization declined to share specific details about the compromise. Logitech similarly disclosed a data breach shortly after being named on the Clop leak site.

    In a particularly severe case, GlobalLogic reported on November 11, 2025, that personal information of 10,471 current and former employees was stolen, including names, addresses, phone numbers, emergency contacts, email addresses, dates of birth, nationalities, passport information, tax identifiers, salary information, and bank account details.​

    Cybercriminals leaked data allegedly stolen from 18 victims, with some releases totaling hundreds of gigabytes and others reaching several terabytes. Limited structural analysis conducted by security researchers concluded that the leaked files likely originated from Oracle environments, lending credibility to the threat actors’ claims.

    The extent of data exposure underscores the comprehensive access attackers achieved to victims’ EBS systems, which integrate finance, HR, supply chain, and procurement functions into centralized databases.​

    Shadowserver researchers released data on October 8, 2025, showing 576 potentially vulnerable IP addresses based on internet scanning for the zero-day vulnerability.

    This figure represents only internet-exposed Oracle EBS instances and does not account for organizations that may have been compromised but maintained the systems behind firewalls or other network security controls.​

    Threat Actor Attribution and Tactics

    The campaign bears the hallmarks of the Clop ransomware group, also tracked as FIN11 and TA505, a financially motivated threat actor with a documented history of mass exploitation campaigns targeting enterprise software vulnerabilities.

    To substantiate their extortion claims, threat actors provided legitimate file listings from victim EBS environments to multiple organizations, with data timestamps dating back to mid-August 2025.

    This tactic demonstrates the attackers’ possession of genuine stolen data and serves to pressure victims into negotiating ransom payments. Consistent with modern extortion operations, the threat actors typically specify payment amounts and methods only after victims contact them and indicate authorization to negotiate.​

    The campaign methodology mirrors previous Clop operations, particularly the mass exploitation of vulnerabilities in MOVEit file transfer software in 2023, which affected hundreds of organizations globally.

    The group was also linked to the exploitation of Cleo file transfer software flaws starting in late 2024 and previous attacks on Fortra file transfer products. This pattern of targeting widely deployed enterprise software to simultaneously compromise numerous organizations has become a signature tactic for the threat actor.​

    Mandiant researchers identified overlaps between the Oracle EBS campaign and a leaked exploit code posted on October 3, 2025, by Scattered Lapsus$ Hunters, also known as ShinyHunters, a group linked to social engineering attacks against retailers and other companies.

    The group claimed credit for a recent attack disrupting production at Jaguar Land Rover. However, researchers emphasized they could not definitively assess whether the July exploitation activity involved that specific exploit code or establish direct connections between the early Oracle activity and ShinyHunters.​

    GTIG analysis noted that post-exploitation tooling showed “logical similarities” to malware deployed in other suspected Clop campaigns.

    The use of compromised third-party email accounts for the extortion campaign represents a sophisticated operational security measure, as credentials sourced from infostealer malware logs on underground forums enable threat actors to send messages that bypass spam filters and appear more legitimate to recipients.​

    Oracle’s Response and Patch Timeline

    Oracle’s response to the vulnerability disclosure followed a multi-stage timeline that raised concerns about the gap between initial exploitation and patch availability.

    The company released a Critical Patch Update in July 2025 that addressed several EBS vulnerabilities, but this update predated the emergency patch for CVE-2025-61882 by several months. Security researchers documented suspicious activity potentially related to exploitation dating back to July 10, 2025, even before the July patches were released.​

    On October 2, 2025, Oracle reported that threat actors may have exploited vulnerabilities patched in the July 2025 update and recommended that customers apply the latest Critical Patch Updates.

    Two days later, on October 4, 2025, Oracle released an emergency Security Alert specifically addressing CVE-2025-61882. The advisory confirmed that the vulnerability is remotely exploitable without authentication and, if successfully exploited, may result in remote code execution.

    Oracle strongly recommends that customers apply the updates immediately, emphasizing its longstanding guidance to remain on actively supported versions and to apply all Security Alerts and Critical Patch Updates without delay.​

    The emergency patch carried a critical prerequisite: organizations must first install the October 2023 Critical Patch Update before applying the CVE-2025-61882 patch.

    This requirement can complicate and delay remediation efforts for organizations that do not maintain current patch levels. Oracle updated the guidance on October 11, 2025, with GTIG assessing that Oracle EBS servers updated through this patch were likely no longer vulnerable to known exploitation chains.​

    On October 8, 2025, Oracle released an additional Security Alert for CVE-2025-61884, a high-severity vulnerability affecting the Runtime UI component of Oracle Configurator.

    This vulnerability enables unauthenticated remote attackers with network access via HTTP to compromise Oracle Configurator and access sensitive resources. Rob Duhart, Oracle’s Chief Security Officer, noted that the vulnerability affects “some deployments” of Oracle E-Business Suite, suggesting configuration-dependent exposure.​

    Oracle’s advisories included Indicators of Compromise (IOCs) derived from observed exploitation, including IP addresses, command patterns, and file hashes for suspected exploit scripts.

    The publication of these IOCs enabled defensive teams to hunt for evidence of compromise in their environments, though the fileless nature of the malware complicated detection efforts.​

    Zero-Day Exploitation Before Patches

    The timeline between initial exploitation and patch availability represents one of the most concerning aspects of the Oracle EBS campaign. Mandiant confirmed that threat actors exploited CVE-2025-61882 as a zero-day vulnerability against Oracle EBS customers as early as August 9, 2025, with additional suspicious activity potentially dating back to July 10, 2025.

    Oracle did not release the emergency patch until October 4, 2025, creating a window of approximately eight weeks between confirmed exploitation and patch availability, during which victims had no vendor-supplied defensive measures.​

    This exploitation timeline highlights a fundamental challenge in enterprise software security: the asymmetry between attacker capabilities and defender readiness.

    Sophisticated threat actors invest significant resources in vulnerability research and exploit development, often discovering flaws before vendors or security researchers identify them.

    Once weaponized, these zero-day vulnerabilities give attackers a critical advantage, enabling them to compromise systems before defenses are in place.​

    Charles Carmakal emphasized the gravity of the pre-patch exploitation timeline in his LinkedIn post, warning that organizations should proactively investigate for signs of compromise regardless of their current patching status.

    This guidance recognizes that applying patches remediates future exploitation of vulnerabilities but does not address existing compromises that occurred during the zero-day window.​

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-61882 to its Known Exploited Vulnerabilities (KEV) catalog on October 6, 2025, confirming active exploitation in ransomware campaigns.

    This designation triggers binding operational directive requirements for federal agencies to patch affected systems within specified timeframes and serves as a strong signal to private sector organizations about the critical nature of the threat.​

    Several security experts recommend migrating from on-premises Oracle EBS to cloud-based Oracle Fusion Cloud Applications to enhance security.

    SaaS models like Oracle Fusion shift some security responsibilities to the vendor, who continuously updates security controls. The Oracle Fusion Cloud Supply Chain Management platform integrates security measures and supports decision-making during disruptions.

    Organizations on EBS should adopt a “security-first mindset” from the design phase, embedding security into architecture, access controls, and patch management. Regular security assessments, including vulnerability scanning and penetration testing, help identify weaknesses before they can be exploited.

    The Oracle EBS campaign affecting around 30 organizations highlights systemic challenges against sophisticated threats. The exploitation of zero-day vulnerabilities and fileless malware showcases modern cyber threats, indicating that organizations must limit internet exposure, maintain patch discipline, and implement defense-in-depth strategies.

    The impact of this campaign may reach beyond the identified victims, with assessments suggesting over 100 organizations could be affected. Organizations using specific Oracle EBS versions should check their patch status, look for indicators of compromise, and ensure their security controls are up to date.

    This incident underscores the necessity of collective security responsibility among vendors, customers, and researchers. Organizations must evolve their defensive strategies from reactive to proactive, treating this event as an opportunity for significant security transformation.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Lessons from Oracle E-Business Suite Hack That Allegedly Compromises Nearly 30 Organizations Worldwide appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Trustwave SpiderLabs researchers have identified a sophisticated banking trojan called Eternidade Stealer that spreads through WhatsApp hijacking and social engineering tactics.

    The malware, written in Delphi, represents a significant evolution in Brazil’s cybercriminal landscape, combining advanced contact harvesting with credential theft targeting financial institutions.

    The threat emerges from a multi-stage infection chain that begins with an obfuscated VBScript sent via WhatsApp messages.

    The message received via WhatsApp during the preparation of the current report (Source - Trustwave)
    The message received via WhatsApp during the preparation of the current report (Source – Trustwave)

    When executed, the script downloads a batch file containing two primary payloads: a Python-based WhatsApp worm and an MSI installer that deploys the banking trojan.

    This distribution method exploits the messaging platform’s trusted nature, making users more likely to interact with malicious attachments shared by contacts whose accounts have been compromised.

    Trustwave security analysts noted that the malware demonstrates remarkable sophistication in targeting Brazilian victims specifically.

    The trojan uses geolocation checks to verify the operating system language is Brazilian Portuguese before proceeding with infection.

    If the system language doesn’t match, the malware displays an error message and terminates, preventing accidental infections outside its intended target region and avoiding sandbox detection.

    The Contact Harvesting Mechanism

    The core functionality of Eternidade Stealer involves stealing entire WhatsApp contact lists through the obter_contatos() function, which executes JavaScript code using the WPP.contact.list() API.

    The malware intelligently filters out groups, business contacts, and broadcast lists, focusing specifically on individual personal contacts more likely to fall victim to phishing messages.

    Each stolen contact record includes the full WhatsApp ID, contact name, phone number, and whether the contact is saved.

    Eternidade Stealer’s attack chain (Source - Trustwave)
    Eternidade Stealer’s attack chain (Source – Trustwave)

    After collection, the malware immediately sends this data to the command-and-control server via HTTP POST requests without user interaction.

    What makes Eternidade Stealer particularly dangerous is its dual-layer persistence mechanism. The trojan uses hardcoded credentials to connect via IMAP to an email account controlled by threat actors.

    It extracts the command-and-control server address from email subjects and bodies, allowing attackers to update their infrastructure dynamically and maintain connections even if specific domains are seized.

    The malware targets over 40 Brazilian financial institutions, payment services like MercadoPago, and cryptocurrency exchanges, including Binance and Coinbase.

    When a victim accesses a targeted banking application, the trojan activates its overlay capability, displaying fake login screens designed to steal credentials seamlessly.

    System reconnaissance capabilities collect information, including OS details, installed antivirus software, public and local IP addresses, and running processes.

    This reconnaissance helps threat actors determine whether to proceed with credential theft or banking overlay deployment.

    The investigation revealed that one threat actor’s infrastructure recorded 454 connection attempts globally, with significant traffic from the United States and European countries, suggesting broader attack ambitions beyond Brazil’s borders.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Malware Via WhatsApp Exfiltrate Contacts to Attack Server and Deploys Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting Google Chrome to its Known Exploited Vulnerabilities (KEV) catalog, warning of active exploitation in the wild. The flaw, tracked as CVE-2025-13223, resides in Google Chromium’s V8 JavaScript engine and poses an immediate threat to millions of users worldwide. Understanding the Vulnerability CVE-2025-13223 […]

    The post CISA Alerts Users to Active Attacks on Chrome 0-Day Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ransomware is shifting from traditional systems to cloud environments, fundamentally redefining its impact on cloud-native data. As organizations increasingly migrate to cloud platforms, threat actors are adapting their tactics moving away from traditional encryption-based malware to exploit the unique architecture and misconfiguration vulnerabilities inherent in cloud storage services. Cloud storage services like Amazon Simple Storage […]

    The post Emerging Ransomware Variants Exploit Amazon S3 Misconfigurations appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals are rapidly embracing generative AI to transform the way they operate scams, making fraud operations faster, more convincing, and dramatically easier to scale.

    According to recent research, what once required months of work and specialized technical skills can now be accomplished in just a few hours by anyone with basic computer knowledge.

    The shift marks a critical turning point in the digital fraud landscape, where artificial intelligence has essentially removed the barriers that used to protect consumers from well-crafted scams.

    In the past, fraudsters faced a fundamental limitation: their operations looked obviously fake. Spelling mistakes, ungrammatical text, poorly designed websites, and awkward phone calls gave scams away instantly. Today, generative AI has changed this dynamic entirely.

    These tools can now produce convincing product photos with authentic branding, flawless language, realistic voice clips, and lifelike videos within minutes.

    This advancement means anyone determined to commit fraud can launch scalable scam campaigns with content that looks real enough to fool even cautious internet users.

    GenAI security analysts and researchers at Trend Micro have documented this transformation through continuous monitoring of the threat landscape.

    Their findings reveal that cybercriminals are actively using AI to supercharge scam operations, making them significantly harder to detect while simultaneously eroding consumer trust and brand confidence.

    Understanding the AI-Powered Scam Assembly Line

    The sophistication of modern fraud operations lies in automation and modular design. Researchers demonstrated how threat actors can leverage open-source automation platforms like n8n to create agentic workflows that operate nearly autonomously.

    The n8n workflow that Trend Research set up for its test (Source - Trend Micro)
    The n8n workflow that Trend Research set up for its test (Source – Trend Micro)

    These systems function as assembly lines where each AI component handles a specific task, then automatically passes the result to the next stage.

    The process begins with image generation, where fraudsters take genuine product photos and use AI models to modify them into fake “limited edition” luxury items.

    The workflow then automatically removes backgrounds, composites the fake products into stock avatar photos, and generates synchronized AI voices for promotional videos.

    Microsoft Azure image editing, OpenAI language models, and text-to-speech services work together seamlessly. The entire pipeline produces professional-quality, ready-to-use scam content with minimal human intervention.

    What makes this particularly dangerous is the scale and speed. A single person can now generate hundreds of unique product variations within hours.

    Because these systems use commercial cloud services for rendering, they produce professional-grade results while keeping criminal activities hidden.

    The modular nature means scammers can simply swap prompts, images, or templates to create entirely different variations of the same basic fraud scheme.

    The financial impact is substantial. Between June and September 2025, romance impostor scams accounted for over 77% of reported incidents, while merchandise scams ranked second at approximately 16%.

    This data underscores how AI-enhanced social engineering is becoming the dominant fraud method in the current threat landscape.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post GenAI Makes it Easier for Cybercriminals to Successfully Lure Victims into Scams appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Acronis Threat Research Unit has uncovered a sophisticated global malvertising campaign called TamperedChef that disguises malware as legitimate everyday applications to compromise systems worldwide. The operation uses social engineering, search engine optimization tactics, and fraudulently obtained digital certificates to trick users into installing backdoors that grant attackers remote access and control over infected machines. […]

    The post TamperedChef Campaign Exploits Everyday Apps to Deploy Malware and Enable Remote Access appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • This week has been crazy in the world of hacking and online security. From Thailand to London to the US, we’ve seen arrests, spies at work, and big power moves online. Hackers are getting caught. Spies are getting better at their jobs. Even simple things like browser add-ons and smart home gadgets are being used to attack people. Every day, there’s a new story that shows how quickly things are

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶