• Over the past year, federal agents struggled to uncover who operated a notorious child exploitation site on the dark web. Their search took an unexpected turn when the suspect revealed their use of ChatGPT, marking a significant moment in digital investigations. Federal Warrant Seeks ChatGPT Data Last week, in Maine, a federal search warrant was […]

    The post OpenAI Faces DHS Request to Disclose User’s ChatGPT Prompts in Investigation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat researchers at Netskope have uncovered a sophisticated new Remote Access Trojan (RAT) written in Python that masquerades as “Nursultan Client,” a legitimate Minecraft application popular in Eastern-European and Russian gaming communities. The malware leverages the Telegram Bot API as its command-and-control (C2) channel, enabling attackers to exfiltrate stolen data and maintain persistent access to […]

    The post New Python-Based RAT Disguised as Minecraft App Steals Sensitive User Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The popular Impacket toolkit, a staple in penetration testing and now integrated into the Kali Linux repository, is set for a major upgrade.

    Maintained by Fortra’s cybersecurity team, the forthcoming release, building on version 0.12, addresses long-standing community requests with enhanced relay capabilities, protocol hardening, and new scripting tools.

    This update promises to streamline red team operations against modern Windows environments, making it easier to navigate complex Active Directory setups and relay attacks.

    At the core of the release are powerful additions to ntlmrelayx.py, turning it into a versatile relay operator. Security researchers can now directly serve SCCM Management Points and Distribution Points, enabling the enrollment of rogue clients to extract secret policies or scour packages for sensitive data.

    A new RPC listener and EPM bootstrapper simplify pivots from printer bugs to ADCS exploitation, condensing multi-step attacks into single commands.

    Further innovations include a WinRM relay target that forwards inbound NTLM authentications from sources like SMBv1, LDAP, HTTP, or captured hashes to spawn interactive shells via local TCP ports.

    The SOCKS proxy plugin extends support to LDAP and LDAPS traffic, allowing seamless integration with existing tools without custom rewrites. Logging improvements tie attacks to specific relayed connections, providing granular insights into coerced victims.

    Protocol Hardening and Workflow Boosts

    To counter evolving defenses, Impacket bolsters channel binding and signing across LDAP, Kerberos, and SQL protocols. SASL enhancements ensure compatibility with domains enforcing unsigned binds, while a reworked TDS handshake in mssqlclient.py handles encryption and CBT natively, ditching external dependencies like PyOpenSSL.

    MSSQL workflows see practical upgrades: richer version banners for scripting, fixed uploads on non-English systems, and new CLI command feeding for mssqlclient.py. SMB refactoring resolves sharing violations for live file copies, including event logs, and refines signing to mimic native Windows behavior.

    The release introduces fresh examples like badsuccessor.py for dMSA object manipulation based on Akamai research, enabling inventory and exploitation of vulnerable OUs.

    Other additions include attrib.py and filetime.py for file metadata control, regsecrets.py for remote hive extraction, CheckLDAPStatus.py for auditing signing enforcement, and samedit.py for offline SAM editing.

    Standardized logging and auth parsing across examples reduce boilerplate, with secretsdump.py gaining remote WMI options for NTDS.dit dumps. As Impacket lands in Kali repos, testers are urged to experiment in labs against recent Windows builds.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Department of Homeland Security (DHS) has issued the first known federal search warrant compelling OpenAI to disclose user data tied to ChatGPT prompts.

    The warrant, unsealed last week in Maine and reviewed by cybersecurity outlets, stems from a year-long probe into a dark web site distributing child sexual abuse material (CSAM).

    Federal agents, operating undercover, hit a breakthrough when the site’s administrator casually revealed their use of ChatGPT during online chats.

    The suspect, chatting with investigators posing as site users, shared snippets of interactions with the AI tool.

    One prompt explored a whimsical crossover: “What would happen if Sherlock Holmes met Q from Star Trek?” Another involved requesting a 200,000-word poem, to which ChatGPT responded with a sample a bombastic, self-aggrandizing ode in the style of President Donald Trump praising the Village People’s “Y.M.C.A.”

    The administrator even pasted the full excerpt, unwittingly providing investigators with a digital trail.

    DHS Warrant to OpenAI

    The warrant seen by Forbes directed OpenAI to surrender extensive records on the account behind these prompts.

    This included full transcripts of other ChatGPT conversations, associated names, email addresses, IP logs, and payment details linked to subscriptions.

    Such requests echo past law enforcement demands on search engines like Google for user queries, but mark the debut of generative AI platforms.

    Experts warn this could set a precedent, allowing agencies to reverse-engineer criminal intent from seemingly benign AI interactions.

    OpenAI has not publicly commented on the warrant or its compliance. Privacy advocates, however, raise alarms about the chilling effect on AI users, arguing that innocuous prompts could now flag everyday citizens in broad surveillance nets.

    Ironically, the OpenAI data proved unnecessary for identification. Undercover exchanges revealed the suspect’s ties to the U.S. military: mentions of health assessments, seven years in Germany at Ramstein Air Force Base, and his father’s service in Afghanistan.

    Cross-referencing with Department of Defense records confirmed 36-year-old Drew Hoehner as the administrator.

    Hoehner, who had applied for further DoD roles, faces one count of conspiracy to advertise CSAM. He has yet to enter a plea, and his attorney did not respond to inquiries.

    This case underscores evolving tactics in cybercrime investigations, where AI tools become unwitting informants. As generative platforms proliferate, law enforcement’s reach into user creativity grows, potentially eroding trust in tools like ChatGPT.

    For now, it highlights how a single shared prompt can unravel hidden networks, blending pop culture queries with serious allegations.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post DHS Asks OpenAI To Share Information on ChatGPT Prompts Used By Users appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The notorious SideWinder advanced persistent threat (APT) group has evolved its cyber espionage tactics with a sophisticated new attack method, combining PDF lures with ClickOnce technology to deploy StealerBot malware against diplomatic targets across South Asia. SideWinder orchestrated a carefully planned phishing operation throughout 2025, deploying customized lures designed for specific diplomatic institutions. The campaign’s […]

    The post SideWinder Leverages ClickOnce Installer to Deliver StealerBot Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A severe vulnerability in the async-tar Rust library and its popular forks, including the widely used tokio-tar. Dubbed TARmageddon and tracked as CVE-2025-62518, the bug carries a CVSS score of 8.1, classifying it as high severity.

    It allows attackers to manipulate TAR archive parsing, potentially overwriting critical files like configuration scripts and triggering remote code execution (RCE) in affected systems.

    According to Edra, the flaw stems from a boundary-parsing error that mishandles nested TAR files, especially when PAX extended headers conflict with ustar headers.

    In vulnerable versions, the parser skips over actual file data based on a misleading zero-byte size in the ustar header, while ignoring the correct size in the PAX header.

    This desynchronization lets hidden entries from inner archives “smuggle” into the outer extraction, overwriting files in the target directory.

    Major projects like Astral’s uv Python package manager, testcontainers for container testing, and wasmCloud are at risk, with the vulnerability’s reach extending across millions of downloads due to tokio-tar’s ubiquity in the Rust ecosystem.

    Navigating The Maze Of Abandoned Forks

    Disclosing and patching TARmageddon proved unusually complex because tokio-tar, the most downloaded fork with over 5 million crates.io pulls, appears abandoned, with no active maintainers, no SECURITY.md file, and scant contact info.

    Edera coordinated a decentralized effort across the fork lineage: from the root async-tar to tokio-tar, then to their own krata-tokio-tar (now archived) and Astral’s actively maintained astral-tokio-tar.

    Researchers developed patches for the active forks, shared them under a 60-day embargo starting August 21, 2025, and reached out to downstream projects like binstalk and opa-wasm.

    While Astral swiftly integrated the fix into uv and their fork, responses from others were mixed; some planned to drop the dependency, while uncontacted users remain exposed.

    The original tokio-tar and async-tar lack patches, forcing users to migrate manually. Edera urges immediate upgrades to patched versions or removal of the dependency, with astral-tokio-tar as the recommended alternative.

    The patch enforces PAX header priority for size checks, validates header consistency, and adds boundary safeguards to prevent misalignment.

    For those unable to switch quickly, workarounds include using the synchronous tar crate or runtime checks like manifest validation and sandboxed extractions.

    Attackers could exploit TARmageddon in devious ways. In one scenario, a malicious PyPI package uses an outer TAR with a benign pyproject.toml, but a nested inner TAR overwrites it with a rogue build backend, executing code during installation on developer or CI machines.

    Container frameworks like testcontainers risk poisoning test environments by extracting tainted image layers, introducing backdoors. Security scanners might approve a “clean” outer archive, only for extraction to pull in unscanned malware, bypassing bill-of-materials checks.

    This incident underscores Rust’s limits: while it thwarts memory bugs, logic flaws like this persist in unmaintained code.

    The 60-day timeline from discovery on August 21 to coordinated release on October 21 highlights the inefficiencies of fork-heavy ecosystems.

    Edera notes their own products dodged impact through defense-in-depth, but the episode calls for better maintenance signals and proactive forking in open source.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated with organizations in the retail and consumer services sectors for gift card fraud. “Jingle Thief attackers use phishing and smishing to steal credentials, to compromise organizations that issue gift cards,” Palo Alto Networks Unit 42 researchers

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Oracle has disclosed multiple critical vulnerabilities in its Oracle VM VirtualBox virtualization software, potentially allowing attackers to achieve complete control over the VirtualBox environment.

    These flaws, detailed in the October 2025 Critical Patch Update (CPU), affect the Core component of VirtualBox versions 7.1.12 and 7.2.2, enabling high-privileged local attackers to compromise confidentiality, integrity, and availability with devastating consequences.

    The disclosure highlights the ongoing risks in virtualization platforms, where even local access can lead to broader system impacts due to scope changes.

    Experts warn that these vulnerabilities could facilitate full takeover scenarios, making immediate patching essential for users relying on VirtualBox for development, testing, and secure isolation.

    No evidence of active exploitation has surfaced yet, but the high CVSS scores underscore the urgency.

    Oracle’s advisory emphasizes that while exploitation requires high privileges and local access, the potential for unauthorized data access and denial-of-service attacks remains a severe threat.

    Vulnerability Breakdown And Affected Versions

    The October 2025 CPU addresses nine specific CVEs in VirtualBox’s Core, all classified as local exploits without remote authentication.

    These issues stem from improper privilege handling and unsafe actions, allowing attackers with infrastructure logon to escalate control.

    The most severe, including CVE-2025-62587 through CVE-2025-62590 and CVE-2025-62641, carry a CVSS 3.1 Base Score of 8.2, indicating high risk due to low attack complexity and changed scope.

    For a comprehensive overview, the following table summarizes the CVEs, affected products, scores, and impacts based on Oracle’s risk matrix:

    CVE IDProductComponentRemote Exploit without Auth.?CVSS VERSION 3.1 RISKSupported Versions AffectedNotesBase ScoreAttack VectorAttack ComplexUser Interact
    CVE-2025-62587Oracle VM VirtualBoxCoreNo8.2 Local7.1.12, 7.2.28.2LocalLowNone
    CVE-2025-62588Oracle VM VirtualBoxCoreNo8.2 Local7.1.12, 7.2.28.2LocalLowNone
    CVE-2025-62589Oracle VM VirtualBoxCoreNo8.2 Local7.1.12, 7.2.28.2LocalLowNone
    CVE-2025-62641Oracle VM VirtualBoxCoreNo8.2 Local7.1.12, 7.2.28.2LocalLowNone
    CVE-2025-62590Oracle VM VirtualBoxCoreNo8.2 Local7.1.12, 7.2.28.2LocalLowNone
    CVE-2025-61760Oracle VM VirtualBoxCoreNo7.5 Local7.1.12, 7.2.27.5LocalHighRequired
    CVE-2025-61759Oracle VM VirtualBoxCoreNo6.5 Local7.1.12, 7.2.26.5LocalLowNone
    CVE-2025-62591Oracle VM VirtualBoxCoreNo6.0 Local7.1.12, 7.2.26.0LocalLowNone
    CVE-2025-62592Oracle VM VirtualBoxCoreNo6.0 Local7.1.12, 7.2.26.0LocalLowNone

    Lower-severity flaws like CVE-2025-61759 and CVE-2025-62591 to 62592 score 6.0 to 6.5, focusing on confidentiality breaches without integrity or availability disruption.

    All vulnerabilities require local access but can propagate beyond VirtualBox due to scope changes. Successful exploitation could result in the complete takeover of the VirtualBox environment, exposing sensitive virtual machine data and enabling malware persistence across isolated systems.

    For enterprises using VirtualBox in development pipelines or as a lightweight hypervisor, this poses risks of data leaks, ransomware deployment, or lateral movement in networks.

    Individual developers might face personal data compromise if running untrusted guest OSes. The high integrity and availability impacts (scoring High) could cause crashes or unauthorized modifications, disrupting workflows.

    While no public proofs-of-concept exist, the flaws’ similarity to past virtualization bugs raises concerns about targeted attacks.

    Mitigations

    Oracle urges users to apply the October 2025 CPU patches immediately, available via the official download portal.

    Beyond patching, organizations should enforce least-privilege access, monitor high-privileged accounts, and audit VirtualBox configurations for unnecessary exposures.

    Disabling unused features and isolating VirtualBox instances in segmented networks can mitigate risks. For those unable to patch promptly, temporary workarounds include restricting logon privileges and validating system integrity regularly.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Multiple Oracle VM VirtualBox Vulnerabilities Enables Complete Takeover Of VirtualBox appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Internet Systems Consortium (ISC) has disclosed three critical vulnerabilities in BIND 9, the most widely deployed DNS software globally. All three vulnerabilities were publicly disclosed on October 22, 2025, affecting DNS resolvers and potentially impacting millions of users worldwide. Organizations running affected BIND 9 versions should prioritize immediate patching to prevent exploitation. The three […]

    The post BIND 9 Vulnerabilities Expose DNS Servers to Cache Poisoning and DoS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Edera security team has discovered a critical vulnerability in the async-tar Rust library and its descendants, including the widely-used tokio-tar. Dubbed TARmageddon and assigned CVE-2025-62518, this flaw carries a CVSS score of 8.1 (High) and enables attackers to execute remote code by overwriting configuration files and hijacking critical build systems. Field Details CVE ID CVE-2025-62518 Vulnerability […]

    The post TARmageddon Security Flaw in Rust Library Could Lead to Config Tampering and RCE appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶