-
Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New York (SDNY) against China-based hackers who are behind a massive Phishing-as-a-Service (PhaaS) platform called Lighthouse that has ensnared over 1 million users across 120 countries. The PhaaS kit is used to conduct large-scale SMS phishing attacks that exploit trusted brands like E-ZPass and USPS to
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity leaders now face an impossible equation: you need intelligence that’s comprehensive enough to protect your organisation, fresh enough to stop emerging threats, and manageable enough that your team doesn’t drown in false positives.
Most solutions force you to choose. Some prove you don’t have to.
The Intelligence Paradox: Too Much and Never Enough
Every CISO knows the struggle. Deploy too few threat feeds, and you’re flying blind, missing critical indicators that could prevent the next breach.
Deploy too many, and your SOC analysts spend their days buried in alerts, chasing false positives, and burning out before they can focus on genuine threats.
This isn’t just an operational headache. It’s a business risk. When analysts are overwhelmed, response times slow. When threat data arrives too late, attackers have already moved.
When intelligence lacks context, your team wastes hours investigating benign activity while real threats slip through undetected.
The balance seems impossible: you need data that’s simultaneously comprehensive and curated, real-time and actionable, detailed and digestible.
Business Resilience Happens When Context Meets Speed
ANY.RUN’s Threat Intelligence Feeds are made with the key principle in mind. Quality feeds don’t just add data — they transform how your entire cybersecurity operation functions.
Think of them as your early warning system, your threat hunting compass, and your analyst productivity accelerator rolled into one.

ANY.RUN’s TI Feeds: data sources, features, benefits
Or, probably, imagine combining a microscope with a telegraph. One gives you perfect detail; the other gives you instant transmission. Individually useful, but together? Transformative.But enough with metaphors. ANY.RUN’s TI Feeds solve the data paradox.
Powered by data from over 15,000 SOCs and researchers using ANY.RUN’s interactive malware sandbox, the feeds deliver live intelligence on real attacks happening right now. Each record is backed by behavioral analysis and real-world evidence.Build resilience with live, contextual intelligence from 15K teams -> Request your TI Feeds trial
This combination of context and freshness is critical for decision-makers. It means your analysts don’t waste time chasing false positives or outdated data. They can prioritize real threats, act early, and protect the organization’s assets before risk turns into loss.
They integrate seamlessly with your SIEM, EDR, firewall, and other security tools, automatically enriching alerts with context and enabling automated response workflows.They shift your posture from reactive to proactive, allowing you to block threats before they reach your network rather than scrambling after the breach.

For MSSPs managing security across multiple clients, feeds become even more critical. They enable you to scale protection without scaling headcount proportionally, applying lessons learned from one customer’s threat landscape to protect all others instantly.
Why Context Matters for Your Bottom Line
Context transforms raw data into actionable intelligence. When your SIEM flags a suspicious IP address, generic feeds tell you “this is malicious.”
ANY.RUN’s feeds tell you how it’s malicious, what malware family it’s associated with, which attack techniques it employs, and what IOCs you should look for across your environment.
For security teams, this means:
- Faster triage: Analysts immediately understand threat severity and scope;
- Accurate prioritization: Distinguish between critical incidents and low-risk events;
- Effective response: Know exactly which containment measures to deploy;
- Reduced burnout: Spend time hunting real threats, not chasing shadows.
For business leaders, context transforms into:
- Lower operational costs: Less time wasted on false positives means better ROI on your security investment;
- Faster time-to-resolution: Contextual intelligence accelerates incident response from hours to minutes;
- Informed decision-making: Understand your actual risk exposure, not just a list of scary-sounding indicators.
When your intelligence reflects the experience of 15,000 SOCs worldwide, you’re no longer reacting in isolation — you’re part of a collective defense network.
Why Freshness Is Non-Negotiable
Threat actors evolve their techniques daily, launching new campaigns, rotating infrastructure, and modifying malware to evade detection.
ANY.RUN’s TI Feeds deliver intelligence with up-to-the-minute freshness because they’re derived from live analysis happening right now — as security teams worldwide investigate active threats using ANY.RUN’s Interactive Sandbox.
This real-time advantage means:
- Proactive blocking: Stop emerging threats before they become widespread;
- Reduced dwell time: Detect active compromises faster with the latest IOCs;
- Instant awareness: Gain visibility into novel attack techniques as they emerge;
- Competitive protection: Access intelligence that attackers haven’t yet adapted to evade.
For MSSPs, this freshness is a competitive differentiator. You can promise clients protection against threats that other providers won’t detect for days—because by the time those threats appear in slower feeds, you’ve already blocked them.
Make your next security decision data-driven, turn live threat data into strategic advantage -> Start you trial of ANY.RUN’s TI Feeds
TI Feeds: Business Objectives Met
ANY.RUN’s Threat Intelligence Feeds deliver business value across multiple dimensions:
- Real-World Threat Visibility: You’re receiving data about actual incidents and attacks that are impacting other companies right now. The threats currently investigated by 15,000 SOCs using ANY.RUN’s Interactive Sandbox.
- Cost-Effective Scale: ANY.RUN’s Feeds give you enterprise-grade intelligence without enterprise-level overhead.
- Regulatory Compliance and Due Diligence: Demonstrate to auditors, board members, and customers that you’re using current, comprehensive threat intelligence.
- Improved Detection Rates: Enrich your existing security tools with high-fidelity indicators that dramatically reduce false negatives. Catch threats that generic signature-based detection misses.
- Accelerated Incident Response: When a threat is detected, contextual intelligence means your team already knows the attack chain, associated IOCs, and effective countermeasures.
- Strategic Planning Support: Aggregate intelligence helps security leaders identify trends, understand your industry’s threat landscape, and make informed decisions about security investments and priorities.
- Reduced Analyst Fatigue: Analysts spend time doing interesting, meaningful work instead of drowning in noise.
- Interoperability: The feeds integrate seamlessly with your existing security infrastructure: SIEM platforms, threat intelligence platforms, EDR solutions, firewalls, and more.
Conclusion
Cyber resilience isn’t about having more data — it’s about having the right data at the right moment. ANY.RUN’s Threat Intelligence Feeds provide exactly that: live, contextual insights from real incidents across the globe.
They help organizations cut through noise, reduce uncertainty, and make every security decision count.
The post Why your Business Need Live Threat Intel from 15k SOCs appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated backdoor malware campaign has emerged targeting Windows users through a weaponized version of SteamCleaner, a legitimate open-source utility designed to clean junk files from the Steam gaming platform.
The malware establishes persistent access to compromised systems by deploying malicious Node.js scripts that maintain continuous communication with command-and-control servers, enabling attackers to execute arbitrary commands remotely.
The threat actors have weaponized the legitimate SteamCleaner tool, which has not received updates since September 2018, by injecting malicious code into the original source and distributing it through fraudulent websites posing as illegal software repositories.
Users seeking cracked software or keygens are redirected to GitHub repositories hosting the malware, which is delivered as Setup.exe.
The malicious installer is signed with a valid digital certificate from Taiyuan Jiankang Technology Co., Ltd., lending false legitimacy to the 4.66MB package and allowing it to bypass initial security scrutiny.
Upon execution, the malware installs itself in the C:\Program Files\Steam Cleaner\ directory, deploying multiple components including Steam Cleaner.exe (3,472KB), configuration files, and batch scripts.
.webp)
SteamCleaner source code released on Github (Source – ASEC) ASEC security researchers identified that the attackers maintained the original SteamCleaner functionality while incorporating sophisticated anti-sandbox detection mechanisms.
The malware performs extensive environmental checks including system information analysis, port enumeration, WMI queries, and process monitoring.
When a sandboxed environment is detected, the malware executes only the legitimate cleaning functionality without triggering malicious behavior.
The payload delivery mechanism relies on encrypted PowerShell commands embedded within the malware.
.webp)
Malware signature and attribute information (Source – ASEC) These commands orchestrate the installation of Node.js on the victim’s system and subsequently download two distinct malicious scripts from separate command-and-control infrastructure.
Both scripts are registered with the Windows Task Scheduler to ensure persistence, executing automatically at system startup and repeating every hour thereafter.
Command-and-Control Communication Protocol
The two Node.js scripts establish bidirectional communication channels with their respective C2 servers through structured JSON payloads.
When connecting to the C2 infrastructure, the malware transmits comprehensive system reconnaissance data including OS type and version, hostname, system architecture, and a unique machine identifier derived from the device GUID.
The first script, installed at C:\WCM{UUID}\UUID and registered as Microsoft/Windows/WCM/WiFiSpeedScheduler, connects to multiple C2 domains including rt-guard[.]com, 4tressx[.]com, kuchiku[.]digital, and screenner[.]com.
This script downloads files from attacker-specified URLs and executes them using CMD or PowerShell processes.
The second script operates from C:\WindowsSetting{UUID}\UUID with the task name Microsoft/Windows/Diagnosis/Recommended DiagnosisScheduler, communicating with aginscore[.]com.
This variant employs more aggressive obfuscation techniques and executes commands directly through Node[.]js’s native shell execution function.
The C2 communication occurs through two primary endpoints: /d for receiving commands and /e for transmitting execution results.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Apache OpenOffice has released version 4.1.16, addressing seven critical security vulnerabilities that enable unauthorized remote document loading and memory corruption attacks.
These flaws represent a significant security risk to users of the popular open-source office suite. The most severe vulnerabilities involve unauthorized remote content loading without user prompts or warnings.
Attackers can exploit these weaknesses to load malicious external documents through multiple attack vectors:
Unauthorized Remote Content Loading
CVE-2025-64401 allows remote document loading via IFrame elements, while CVE-2025-64402 leverages OLE objects for the same purpose.
CVE-2025-64403 exploits the Calc spreadsheet application through external data sources, and CVE-2025-64404 abuses background and bullet images.
Additionally, CVE-2025-64405 manipulates the DDE function to fetch remote content without user interaction.
These remote content-loading vulnerabilities create opportunities for attackers to deliver malware and steal sensitive information.
Conduct targeted phishing campaigns by embedding malicious content in seemingly legitimate office documents.
Memory Corruption and Data Exfiltration
Beyond unauthorized content loading, CVE-2025-64406 introduces a critical memory corruption vulnerability during CSV file imports.
This flaw could enable arbitrary code execution if successfully exploited with specially crafted CSV files. OpenOffice concerning the issue is CVE-2025-64407, which enables URL fetching to extract arbitrary INI file values and environment variables.
This vulnerability enables attackers to extract sensitive configuration data and system information from affected systems.
Users should update to Apache OpenOffice 4.1.16 immediately to patch these vulnerabilities. The affected versions include all installations before 4.1.16.
Organizations relying on OpenOffice for document processing should prioritize this update in their patch management schedules.
The previous version 4.1.15 addressed additional critical issues, including use-after-free vulnerabilities, arbitrary file write capabilities in Base, and macro execution flaws.
These layered fixes demonstrate ongoing security challenges in the OpenOffice codebase. OpenOffice system administrators should implement the following measures: Deploy version 4.1.16 across all systems, restrict macro execution policies.
Disable DDE functions when not required and implement network monitoring to detect suspicious document-loading behavior. Users should exercise caution when opening documents from untrusted sources until updates are fully deployed.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Multiple Apache OpenOffice Vulnerabilities Leads to Memory Corruption and Unauthorized Content Loading appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has disclosed two critical security vulnerabilities in GitHub Copilot and Visual Studio that could allow attackers to bypass essential security features.
Both vulnerabilities were released on November 11, 2025, and have been assigned an Important severity rating.
Path Traversal Vulnerability in Visual Studio
The first vulnerability, tracked as CVE-2025-62449, stems from improper limitations in pathname handling and is classified as a path traversal flaw (CWE-22).
This weakness allows attackers to access files and directories outside of restricted areas on a local system.
With a CVSS score of 6.8, this vulnerability requires low attack complexity and local access with limited privileges.
The threat actor needs user interaction to trigger the vulnerability, but once exploited, could achieve high confidentiality and integrity impact, along with limited availability impact.
The attack vector is local, meaning the attacker must have some level of access to the affected system.
CVE ID Product Impact Weakness CVSS Score CVE-2025-62449 Visual Studio Security Feature Bypass CWE-22: Path Traversal 6.8 CVE-2025-62453 GitHub Copilot Security Feature Bypass CWE-1426: AI Output Validation 5.0 The risk intensifies, as many developers use Visual Studio as their primary development environment, potentially exposing sensitive source code and configuration files to unauthorized access.
AI Output Validation Flaw in GitHub Copilot
The second vulnerability, CVE-2025-62453, involves improper validation of generative AI output (CWE-1426) and a failure in the protection mechanism (CWE-693).
This flaw specifically targets GitHub Copilot’s AI-generated code suggestions.
With a CVSS score of 5.0, this vulnerability could allow attackers to manipulate AI output to bypass security checks or inject malicious code recommendations.
This vulnerability is particularly concerning as developers often trust and implement code suggestions from AI assistants without thorough scrutiny.
Attackers exploiting this flaw could inject backdoors or security flaws directly into projects through compromised code suggestions. Both vulnerabilities require user interaction and local system access, but carry significant risks for development teams.
Microsoft has released patches through official CVE channels, and developers using GitHub Copilot and Visual Studio should apply updates immediately.
The disclosure highlights growing security concerns around AI-assisted development tools and the importance of validating generated code before implementation.
Organizations should review their development practices and security policies surrounding AI code generation tools.
Development teams are advised to check Microsoft’s official security advisories for available patches and to implement proper code review processes for all AI-generated suggestions.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post GitHub Copilot and Visual Studio Vulnerabilities Allow Attacker to Bypass Security Feature appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
An advanced hacking group is actively exploiting zero-day vulnerabilities in Cisco Identity Services Engine (ISE) and Citrix systems. These attacks, spotted in real-world operations, allow hackers to deploy custom webshells and gain deep access to corporate networks.
The findings highlight how attackers are targeting key systems that manage user logins and network controls, putting businesses at high risk.
Cisco and Citrix 0-Days Exploited
The trouble started with Amazon’s MadPot honeypot service, a tool designed to lure and study cyber threats. It caught attempts to exploit a Citrix flaw known as “Citrix Bleed Two” (CVE-2025-5777) before anyone knew about it publicly.
This zero-day lets attackers run code remotely without permission. Digging deeper, Amazon’s experts linked the same hackers to a hidden weakness in Cisco ISE, now called CVE-2025-20337.
This bug uses faulty data handling, or “deserialization,” to let outsiders execute code before even logging in. The result? Full admin control over the affected systems.
What makes this scary is the timing. Hackers were hitting these flaws in the wild on live internet-facing setups before Cisco issued a CVE number or full patches for all versions of ISE.
This “patch-gap” tactic shows the attackers’ smarts: they closely monitor updates and strike fast when defenses are weak. Amazon shared the Cisco details with the company, helping to speed up fixes, but the damage was already underway.
Once inside, the hackers planted a sneaky custom webshell disguised as a normal Cisco part called “IdentityAuditAction.” Unlike basic malware, this one is built just for Cisco ISE.
It runs entirely in the computer’s memory, avoiding files that forensics teams could easily spot. Using tricks like Java reflection, it hooks into the system’s web server (Tomcat) to watch all traffic. To hide commands, it encrypts them with DES and a weird Base64 twist, plus it checks for special web headers to activate.
A peek at the code reveals their cunning. In one routine, it decodes hidden instructions from web requests, swaps characters like “*” for “a,” and uses a secret key (“d384922c”) to unlock the payload. This lets the hackers run arbitrary code without leaving traces, making detection tough.
Amazon’s analysis shows the group was widely blasting these exploits across the internet, not just targeting specific targets. Their tools show deep knowledge of Java apps, Tomcat, and Cisco’s setup, suggesting a well-funded team with insider vuln info or top research skills.
This fits a growing pattern: attackers targeting edge defenses such as identity managers and remote gateways that guard entire networks.
For security pros, this is a wake-up call. Even top-notch systems can fall to pre-login exploits. Amazon urges teams to layer defenses: use firewalls to block access to management portals, watch for unusual web traffic, and build detection for odd behaviors. Quick patching is key, but so is assuming breaches and planning responses.
This campaign reminds us that zero-days in critical tools like Cisco and Citrix can open the door to chaos. Companies must stay vigilant as hackers evolve.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Hackers Actively Exploiting Cisco and Citrix 0-Days in the Wild to Deploy Webshell appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Amazon’s threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two then-zero-day security flaws in Cisco Identity Service Engine (ISE) and Citrix NetScaler ADC products as part of attacks designed to deliver custom malware. “This discovery highlights the trend of threat actors focusing on critical identity and network access control infrastructure –
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The advanced persistent threat group APT-C-08, also known as Manlinghua or BITTER, has launched a sophisticated campaign targeting government organizations across South Asia by exploiting a critical directory traversal vulnerability in WinRAR.
Security researchers have identified the group’s first operational use of CVE-2025-6218, a flaw affecting WinRAR versions 7.11 and earlier that allows attackers to breach file system boundaries and execute malicious code on compromised systems.
APT-C-08 maintains established relationships with South Asian governments and has historically focused on stealing sensitive information from government agencies, the military-industrial complex, overseas institutions, and universities.
The threat group has demonstrated proficiency in weaponizing malicious documents as attack entry points, meticulously crafting socially engineered payloads designed to bypass security awareness.
This latest campaign represents a significant escalation, leveraging a vulnerability that remains difficult to patch due to WinRAR’s inconsistent update mechanisms across enterprise environments.
Security analysts and researchers identified the malware campaign by discovering weaponized RAR archives containing deceptively named files, such as “Provision of Information for Sectoral for AJK.rar.”
The malicious archive exploits CVE-2025-6218 by leveraging specially crafted file paths that contain spaces after directory traversal sequences, a technique that circumvents WinRAR’s path normalization.
When victims extract the archive, the exploit deposits a malicious Normal. dotm macro file into the Windows template directory at C:\Users[username]\AppData\Roaming\Microsoft\Templates, establishing persistence through Microsoft Word’s automatic template loading mechanism.
Infection Mechanism and Code Execution
The attack chain demonstrates a sophisticated understanding of Windows system architecture.
Upon extraction, the malicious Normal.dotm file (MD5: 4bedd8e2b66cc7d64b293493ef5b8942) runs when the victim opens any Word document, triggering VBA macros that execute the “net use” command to map remote directories to the local machine.
Subsequently, the macro launches winnsc.exe from the remote server, establishing command execution capabilities.
This two-stage infection approach ensures that opening the initial document triggers the infection without raising suspicion, allowing operators to maintain stealth while establishing persistent remote access.
The exploit’s low difficulty, combined with its high success rate, has prompted security communities to recommend immediate patching of all WinRAR installations and implementing application allowlisting to restrict macro execution in Microsoft Office templates.
Organizations handling sensitive government information should prioritize threat detection monitoring for suspicious network mapping activities and macro-based indicators of compromise.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post APT-C-08 Hackers Exploiting WinRAR Vulnerability to Attack Government Organizations appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated phishing campaign has emerged, targeting organizations across Central and Eastern Europe by impersonating legitimate global brands to deceive users into surrendering their login credentials.
The attack utilizes self-contained HTML files delivered as email attachments, eliminating the need for external server hosting or suspicious URLs that traditional security systems typically detect.
Once opened, these attachments present convincing fake login pages for brands including Microsoft 365, Adobe, WeTransfer, FedEx, and DHL, creating a seamless user experience designed to bypass conventional email security controls.
The attack methodology demonstrates a clear understanding of regional business practices.
Threat actors distribute phishing emails posing as legitimate customers or business partners, requesting quotations or invoice confirmations through RFC-compliant filenames such as RFQ_4460-INQUIRY.HTML.
This targeted approach focuses on industries with regular procurement workflows, including agriculture, automotive, construction, and education sectors, primarily in the Czech Republic, Slovakia, Hungary, and Germany.
Cyble security analysts identified that the campaign’s success relies on embedded JavaScript within HTML attachments that captures credentials and transmits them directly to attacker-controlled Telegram bots rather than traditional command-and-control servers.
Upon execution, victims encounter a carefully replicated login interface displaying brand-authentic branding with blurred background images for added legitimacy.
Campaign Overview
The credential capture mechanism functions by reading form field values and constructing API requests to send stolen data directly through the Telegram Bot API.
Technical analysis reveals two distinct implementation approaches among analyzed samples. The first variant implements CryptoJS AES encryption for obfuscation while capturing email addresses, passwords, IP addresses, and user-agent information before redirecting victims to legitimate company domains.
.webp)
Campaign Overview (Source – Cyble) The second sample employs more advanced anti-forensics techniques, blocking keyboard combinations including F12, Ctrl+U/S/C/A/X, and right-click context menus to prevent code inspection and analysis.
The exfiltration function demonstrates technical sophistication by utilizing the native Fetch API for cleaner code implementation rather than jQuery dependencies.
The JavaScript constructs POST requests containing harvested credentials sent via HTTPS to api.telegram.org/bot endpoints with hardcoded bot tokens and chat IDs embedded directly in the payload.
This approach deliberately avoids suspicious network patterns while maintaining operational resilience through decentralized bot infrastructure.
Organizations should prioritize deploying HTML attachment controls and implementing content inspection policies to block or sandbox potentially malicious HTML files before delivery to end users.
Security teams are advised to hunt for api.telegram.org POST activity originating from client systems and conduct retroactive threat hunts for identified indicators to assess whether credentials have been compromised.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post New Phishing Attack Leverages Popular Brands to Harvest Login Credentials appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Since Apple removed the popular “right-click and open” Gatekeeper override in August 2024, threat actors have shifted their tactics to deliver malware on macOS. Among emerging techniques, attackers are increasingly leveraging AppleScript (.scpt) files to bypass security controls and distribute credential stealers often disguised as legitimate software updates from popular applications such as Zoom and […]
The post AppleScript Used to Deliver macOS Malware Disguised as Zoom & Teams Updates appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


