• A senior advisor and former deputy to the Pentagon’s undersecretary for policy told senators on Thursday that his office “neither ordered nor even recommended a pause to any weapons shipments to Ukraine” over the summer, contrary to the press reporting from the time, but also in contrast to testimony from his colleague on Tuesday and statements from the Pentagon on July 2.

    For a second day, members of the Senate Armed Services Committee tried to find some clarity on recent Pentagon moves that took both Congress—and in at least one case, the White House—by surprise, during a confirmation hearing that included Alex Velez-Green, who was formally nominated in June to become Elbridge Colby’s deputy.

    “Again, what I am aware of is that there were brief disruptions to delivery of weapons associated with the implementation of the capabilities review that Mr. Parnell was discussing at that time,” Velez-Green said.

    His version of events was different than that of his colleague on Tuesday to the same committee.

    “I'm not aware of any pause in that aid,” Austin Dahmer, who is currently “performing the duties” in the position Velez-Green is nominated for, said during a confirmation hearing for a different Pentagon position. “I think there's been some I'm aware of, a lot of inaccurate reporting in the public on this, but I'm not aware of any pause.”

    Two Pentagon spokespeople did not respond to a request from Defense One for clarification. One of those spokespeople, Sean Parnell, told reporters during a briefing on July 2 that there was indeed a pause to weapons shipments, as a result of a review of weapons stockpiles that had reportedly been recommended by Colby.

    “Proactive engagement from us would have been helpful, at least, to share our side of what we understood to have happened, and that's something I do take on board and if confirmed and committed to addressing in a forthright manner,” Velez-Green said Thursday.

    The lack of clarity over aid to Ukraine is one example of the Pentagon making moves without  coordinating with Congress ahead of time—a trend that lawmakers on both sides of the aisle have publicly derided this week. 

    Republican senators on Tuesday lamented how difficult it is to get in contact with the policy office, with Arkansas Sen. Tom Cotton at one point comparing the shop’s lack of communication and coordination to Pigpen, the messy Peanuts character.

    “Do you agree that meaningfully engaging with Congress is necessary for the department to ultimately receive the authorities and the funding that are needed to implement ‘peace through strength?’” Sen. Deb Fischer, R-Neb., asked Velez-Green. “If we do have areas of disagreement —for example, how best to support our allies, our partners—would you agree that a healthy discussion with members of this committee would still be valuable?”

    The lack of notification or coordination on a host of moves, including a review of the AUKUS agreement and the cancelation of a rotational Army deployment to Romania, has led to lawmakers learning about them in the press.

    In some cases, media reports were “the opposite of reality,” Velez-Green said, specifically pointing to a June story from Semafor that reported Colby’s office opposed deploying an additional carrier strike group to the Middle East in support of Operation Midnight Hammer.

    At the time, Parnell told Semafor that Colby was “totally synced up” with the administration.

    More generally, the Pentagon has broken with norms in not consulting members of the Armed Services Committees during the development of the forthcoming National Defense Strategy, a document required by law.

    “I believe we developed that document in direct coordination with the secretary's front office for his direction and intent,” Velez-Green said. “With respect to interagency coordination or notification, there were discussions, but I’m afraid it wouldn’t be appropriate for me to discuss the particulars in this setting.”

    He added that he would provide documentation of those discussions in a classified meeting.

    Sen. Ted Budd, R-N.C., asked Velez-Green to agree that he would personally respond to requests for information from lawmakers, rather than relying on the office of legislative affairs, as a recent Pentagon memo requires for communication between defense officials and Congress.

    “I do quite recognize the frustrations voiced today, as well as earlier this week,” Velez-Green said, after agreeing to communicate personally. “If confirmed, you have my commitment to lean as far forward in engaging proactively with Congress, including on matters of consultation and not just coordination, while doing my part to protect the secretary’s and president's decision space.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A previously unidentified Iranian threat actor has emerged with sophisticated social engineering tactics aimed at academics and foreign policy experts across the United States.

    Operating between June and August 2025, this campaign demonstrates the evolving landscape of state-sponsored cyber espionage, where attackers blend traditional phishing techniques with legitimate remote management tools to compromise high-value targets.

    The operation, tracked as UNK_SmudgedSerpent, represents a concerning development in Iranian cyber operations, showcasing advanced technical capabilities and patient reconnaissance methods.

    The threat actor initiated contact through seemingly benign emails discussing sensitive topics such as Iran’s economic crisis, societal reform, and IRGC militarization.

    These carefully crafted messages impersonated prominent figures like Dr. Suzanne Maloney from the Brookings Institution and Patrick Clawson from the Washington Institute, using freemail accounts with slight misspellings to evade detection.

    Targets received collaboration requests on research projects examining domestic Iranian political developments, designed to establish trust before transitioning to malicious activities.

    Proofpoint security researchers identified UNK_SmudgedSerpent after investigating suspicious email activity targeting over 20 individuals at a US-based think tank.

    The campaign revealed overlapping tactics with known Iranian groups including TA455, TA453, and TA450, creating attribution challenges.

    Researchers noted the actor’s use of health-themed infrastructure domains such as thebesthomehealth[.]com and mosaichealthsolutions[.]com, along with OnlyOffice file-hosting platform spoofs to deliver malicious payloads.

    These domains functioned as redirection points, masquerading as legitimate cloud collaboration services.

    The infection chain began with credential harvesting attempts using customized Microsoft 365 login pages that pre-loaded victim information.

    When initial phishing attempts failed, the attackers adapted their approach, removing password requirements and presenting spoofed OnlyOffice login portals.

    Once targets accessed these fraudulent pages, they encountered document repositories hosting seemingly legitimate PDFs alongside malicious ZIP archives containing MSI files.

    Dual RMM Deployment and Persistent Access

    The technical execution revealed a sophisticated multi-stage approach centered on remote management and monitoring software abuse.

    Upon downloading and executing the malicious MSI file from the compromised OnlyOffice spoof, victims unknowingly installed PDQConnect, a legitimate RMM tool commonly used for IT administration.

    Infection chain with known actor overlaps (Source - Proofpoint)
    Infection chain with known actor overlaps (Source – Proofpoint)

    This initial deployment established baseline access to victim systems, allowing threat actors to conduct reconnaissance and assess target value.

    Following the PDQConnect installation, researchers observed suspected hands-on-keyboard activity where attackers leveraged their initial access to deploy a secondary RMM solution called ISL Online.

    This sequential deployment strategy remains partially understood, though analysts suggest it may serve as redundancy or specialized functionality for different operational phases.

    The use of legitimate commercial RMM tools, rather than custom malware, provides operational security advantages by blending malicious traffic with normal IT management activities and evading signature-based detection systems.

    ISL Online RMM pop-up (Source - Proofpoint)
    ISL Online RMM pop-up (Source – Proofpoint)

    The campaign’s infrastructure analysis revealed server configuration similarities between UNK_SmudgedSerpent domains and previously identified TA455 operations, particularly the career-themed domain ebixcareers[.]com displaying fake Teams portals.

    Additional investigation uncovered files hosted on related infrastructure, including TA455’s custom backdoor MiniJunk and another MSI loader for PDQConnect, further complicating attribution.

    Since early August 2025, no additional activity from this actor has been observed, though related infrastructure likely remains operational for future campaigns targeting Iranian foreign policy experts and academic institutions.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Iranian Hackers Targeting Academics and Foreign Policy Experts Using RMM Tools appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • North Korean threat actors are evolving their attack strategies by leveraging developer-focused tools as infection vectors.

    Recent security discoveries reveal that Kimsuky, a nation-state group operating since 2012, has been utilizing JavaScript-based malware to infiltrate systems and establish persistent command and control infrastructure.

    The threat group traditionally focuses on espionage operations against government entities, think tanks, and subject matter experts, but this latest campaign demonstrates their expanding technical capabilities and supply chain targeting sophistication.

    The attack chain begins with a simple yet effective delivery mechanism: a JavaScript file named Themes.js that serves as the initial dropper.

    Unlike heavily obfuscated malware, this sample employs straightforward code wrapped in a try-catch block, prioritizing functionality over stealth.

    The file initiates contact with an adversary-controlled infrastructure hosted on medianewsonline[.]com, a domain infrastructure service that allows threat actors to create subdomains for malicious purposes.

    Landing page of medianewsonline[.]com (Source – Pulsedive)

    This infrastructure choice reflects the attacker’s understanding of legitimate hosting services that security systems often whitelist or overlook.

    Pulsedive security researchers noted the sophistication of the multi-stage attack architecture during their analysis of the infection chain.

    The malware operates through a cascading payload delivery system, where each stage downloads and executes subsequent components.

    The initial JavaScript file sends a GET request to iuh234[.]medianewsonline[.]com/dwnkl.php, transmitting the compromised machine’s hostname and a hardcoded authentication key.

    This reconnaissance phase allows attackers to identify high-value targets before deploying additional payloads to selected systems.

    Dissecting the Infection Chain

    The second stage represents the reconnaissance backbone of the campaign, collecting critical system information for further exploitation.

    When the C2 server responds to the initial GET request, it delivers another JavaScript payload containing five functions that systematically enumerate the infected system’s environment.

    The malware executes commands to gather system information, including hardware specifications and network configuration details.

    It then retrieves a comprehensive list of all running processes, providing attackers with insight into installed security software and legitimate applications that might interfere with payload execution.

    The reconnaissance phase also enumerates files within C:\Users directory, targeting user profiles and identifying potentially valuable data or configuration files.

    Each command’s output gets packaged into cabinet (.cab) files and exfiltrated via POST requests to the same C2 server.

    The malware demonstrates technical sophistication by modifying the HKCU\Console\CodePage registry key to UTF-8 encoding, ensuring proper text handling during data collection.

    Temporary files are systematically deleted after exfiltration, implementing basic operational security practices that hinder forensic analysis.

    Persistence mechanisms reveal the attackers’ commitment to long-term access.

    The malware writes itself to %APPDATA%\Microsoft\Windows\Themes\Themes.js and creates a scheduled task named Windows Theme Manager that executes the JavaScript dropper every minute using wscript.exe.

    This approach leverages legitimate Windows scheduling utilities to maintain command and control connectivity without requiring elevated privileges, making detection more difficult for defenders relying on privilege escalation alerts.

    The campaign’s final stage introduces a Word document delivery component, potentially serving as a social engineering lure.

    However, security researchers found the document remained empty without embedded macros, suggesting it may function as a placeholder or secondary infection vector for specific targets.

    The complete infection chain demonstrates calculated malware engineering designed to evade traditional detection while establishing resilient persistence across multiple execution mechanisms.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors May Abuse VS Code Extensions to Deploy Ransomware and Use GitHub as C2 Server appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The cybercrime landscape has undergone a dramatic transformation in 2025, with artificial intelligence emerging as a cornerstone technology for malicious actors operating in underground forums.

    According to Google’s Threat Intelligence Group (GTIG), the underground marketplace for illicit AI tools has matured significantly this year, with multiple offerings of multifunctional tools designed to support various stages of the attack lifecycle.

    This evolution has fundamentally altered the accessibility and sophistication of cybercrime, lowering barriers to entry for less technical threat actors while amplifying the capabilities of experienced criminals.​

    The underground AI marketplace has witnessed explosive growth throughout 2024 and 2025. Security researchers from KELA documented a 200% increase in mentions of malicious AI tools across cybercrime forums in 2024 compared to the previous year, with the trend continuing to accelerate into 2025.

    AI Tools Promoted on Underground Forums

    This surge represents not just increased chatter, but a fundamental shift in how cybercriminals conduct operations. Among the most prominent tools advertised in English and Russian-language underground forums are WormGPT, FraudGPT, Evil-GPT, Xanthorox AI, and NYTHEON AI, each offering distinct capabilities tailored to different aspects of cybercrime.​

    AI Tools Promoted by Threat Actors (Source: Google)

    WormGPT stands as one of the earliest and most widely recognized malicious AI tools in the underground ecosystem. Built on the GPT-J language model and promoted since July 2023, WormGPT was marketed as a “blackhat alternative” to commercial AI systems, specifically designed to support business email compromise (BEC) attacks and phishing campaigns.

    The tool gained notoriety for its ability to generate convincing phishing emails that bypass spam filters, with pricing models ranging from $100 per month to $5,000 for private server setups.

    Researchers demonstrated that WormGPT could craft strategically clever and exceedingly convincing emails impersonating company executives, a capability that significantly elevated the threat posed by less sophisticated actors.​

    Following closely behind WormGPT, FraudGPT emerged in late July 2023 as an even more ambitious platform. Promoted by the user “CanadianKingpin12” across multiple forums and Telegram channels, FraudGPT offered subscription-based access at $200 per month or $1,700 annually.

    The tool claimed capabilities extending beyond phishing to include writing malicious code, creating undetectable malware, discovering vulnerabilities, finding compromised credentials, and providing hacking tutorials.

    This subscription model mirrored legitimate software-as-a-service offerings, complete with tiered pricing structures that unlocked additional features such as image generation, API access, and Discord integration at higher price points.​

    By 2025, the underground AI marketplace will have evolved beyond simple jailbroken models to encompass sophisticated, multi-functional platforms. Xanthorox AI represents this next generation of malicious tools, marketing itself as the “Killer of WormGPT and all EvilGPT variants”.

    First detected in Q1 2025, Xanthorox distinguishes itself through its modular, self-hosted architecture that operates entirely on private servers rather than relying on public cloud infrastructure.

    This design drastically reduces detection and traceability risks while offering an all-in-one solution for phishing, social engineering, malware creation, deepfake generation, and vulnerability research.​

    NYTHEON AI emerged as another sophisticated platform, leveraging multiple legitimate open-source models to provide comprehensive GenAI-as-a-service capabilities for cybercriminals.

    Operated on the dark web and advertised through Telegram channels and Russian forums, NYTHEON consists of six specialized models, including Nytheon Coder for malicious code generation, Nytheon Vision for image recognition, and Nytheon R1 for reasoning tasks.

    This integration of purpose-built AI models sets NYTHEON apart from earlier single-function tools, demonstrating the increasing sophistication of underground AI services.​

    Cyberattacks Surge With Malicious AI platforms

    Analysis of underground advertisements reveals striking commonalities across malicious AI platforms. Most notably, nearly every notable tool advertised in underground forums emphasized its ability to support phishing campaigns.

    This universal focus reflects phishing’s continued dominance as the leading attack vector, with AI-generated phishing representing the top enterprise threat of 2025.

    Security analysts documented a 1,265% surge in phishing attacks driven by generative AI capabilities, with AI-written phishing proving just as effective as human-crafted lures while requiring significantly less time and skill.​

    Beyond phishing, underground AI tools commonly advertised capabilities spanning malware development, vulnerability research, technical support for code generation, and reconnaissance operations.

    Several platforms, including WormGPT, FraudGPT, and MalwareGPT, promoted their ability to generate polymorphic malware that constantly changes to evade antivirus detection.

    This capability represents a significant escalation in threat sophistication, as Google researchers recently identified five new malware families using AI to regenerate their own code and hide from security software.​

    The pricing structures for illicit AI services closely mirror those of conventional cybercrime tools and legitimate software offerings. Underground developers have adopted familiar subscription-based models with tiered pricing that add technical features at higher price points.

    Many platforms offer free versions with embedded advertisements, allowing potential customers to test capabilities before committing to paid subscriptions.

    This approach, combined with developer-provided technical support and regular updates, creates an ecosystem that operates remarkably similarly to legitimate software markets.​

    The low barrier to entry exemplified by tools like Evil-GPT, priced at just $10 per copy, demonstrates how AI has democratized sophisticated cybercrime capabilities.

    This accessibility enables financially motivated threat actors with limited technical expertise to conduct operations that previously required years of training.

    The FBI and multiple cybersecurity agencies have warned that AI greatly increases the speed, scale, and automation of phishing schemes while helping fraudsters craft highly convincing messages tailored to specific recipients.​

    GTIG assesses with high confidence that financially motivated threat actors and others in the underground community will continue augmenting their operations with AI tools.

    Given the increasing accessibility of these applications and growing AI discourse in underground forums, threat activity leveraging AI will increasingly become commonplace among cybercriminals.

    By early 2025, AI-supported phishing campaigns reportedly represented more than 80% of observed social engineering activity worldwide, underscoring the transformation already underway.

    As the underground AI marketplace continues to mature, organizations face an evolving threat landscape where sophisticated attack capabilities are available to anyone willing to pay modest subscription fees, fundamentally reshaping the cybersecurity challenge for the foreseeable future.​

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have uncovered a sophisticated new malware family targeting enterprise environments through a supply chain compromise.

    The malware, tracked as Airstalk, represents a significant shift in how attackers exploit legitimate enterprise management tools to evade detection and maintain persistent access to compromised systems.

    This discovery highlights the growing vulnerability of business process outsourcing organizations and third-party vendors who manage critical infrastructure on behalf of larger enterprises.

    Airstalk operates in two distinct variants, PowerShell and .NET, with both versions leveraging the AirWatch API, now known as VMware Workspace ONE Unified Endpoint Management.

    The malware’s primary distinction lies in its abuse of legitimate mobile device management infrastructure to establish command-and-control communications, allowing attackers to remain invisible to traditional security monitoring systems.

    This technique enables adversaries to hide malicious traffic within legitimate management API calls, effectively bypassing network-based detection mechanisms that organizations typically rely on.

    Palo Alto Networks security analysts identified the malware after discovering evidence suggesting a possible nation-state threat actor deployed Airstalk through a carefully orchestrated supply chain attack.

    The research team created the threat activity cluster CL-STA-1009 to track ongoing activities related to this malware family.

    The malware’s sophisticated design and multi-threaded architecture suggest substantial investment in development resources, consistent with nation-state threat actors who prioritize long-term persistence over quick operational gains.

    The discovered samples demonstrate advanced capabilities including data exfiltration of sensitive browser information, screenshot capture, and sophisticated persistence mechanisms.

    Both variants target Google Chrome, though the more advanced .NET variant extends its reach to Microsoft Edge and Island Browser.

    The malware creates a modular framework where threat actors can selectively implement or disable specific functions, providing flexibility in operations and potentially serving as a development platform for future variants.

    Covert C2 Communication Through AirWatch Dead Drop Mechanism

    The most innovative aspect of Airstalk involves its implementation of a dead drop communication channel using the AirWatch MDM API’s custom device attributes feature.

    C2 execution flow of Airstalk's PowerShell variant (Source - Palo Alto Networks)
    C2 execution flow of Airstalk’s PowerShell variant (Source – Palo Alto Networks)

    Rather than establishing direct connections to attacker infrastructure, the malware exchanges JSON-formatted messages through the legitimate MDM platform, effectively using enterprise management tools as intermediaries for command transmission and exfiltration.

    The communication protocol operates through specific API endpoints, with the malware querying the devices endpoint (/api/mdm/devices/) to retrieve and store command information.

    Messages contain required fields including CLIENT_UUID, derived from Windows Management Instrumentation data, and SERIALIZED_MESSAGE, containing Base64-encoded JSON payloads.

    This design allows the malware to maintain operational security by avoiding direct network connections to suspicious infrastructure.

    The C2 protocol uses message types for different operational stages, including CONNECT for initial communication, CONNECTED for acknowledgment, ACTIONS for task retrieval, and RESULT for exfiltration.

    The malware also leverages the AirWatch blob upload endpoint (/api/mam/blobs/uploadblob) for transferring larger data sets, such as screenshots and stolen credentials, further obscuring malicious activity within routine management operations.

    This sophisticated approach transforms trusted enterprise tools into channels for espionage, presenting organizations with an unprecedented detection challenge.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Airstalk Malware Leverages AirWatch API MDM Platform to Establish Covert C2 Communication appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ValleyRAT has emerged as a sophisticated multi-stage remote access trojan targeting Windows systems, with particular focus on Chinese-language users and organizations.

    First observed in early 2023, this malware employs a carefully orchestrated infection chain that progresses through multiple components—downloader, loader, injector, and final payload—making detection and removal significantly challenging for security teams.

    The threat actors behind ValleyRAT distribute the malware through phishing campaigns and trojanized installers, exploiting trust relationships common in Chinese business environments.

    What distinguishes this malware is its geographic kill switch mechanism that queries the Windows Registry for specific applications before execution.

    The malware specifically searches for WeChat (HKCU\Software\Tencent\WeChat) and DingTalk (HKCU\Software\DingTalk) registry entries, terminating immediately if neither is found.

    Picussecurity security analysts identified the malware’s advanced evasion capabilities, noting its aggressive approach to bypassing system defenses.

    ValleyRAT employs multiple User Account Control (UAC) bypass techniques targeting Windows executables like Fodhelper.exe and Event Viewer, while simultaneously manipulating security tokens to gain SeDebugPrivilege access.

    This privilege enables the malware to interact with processes at higher integrity levels, effectively granting system-wide control.

    The malware’s creators implemented extensive anti-analysis measures to evade detection in virtualized environments.

    ValleyRAT performs CPUID instruction checks to verify genuine Intel or AMD processors, examining vendor strings that virtual environments often fail to replicate correctly.

    Additionally, it enumerates active windows searching for analysis tools including Wireshark, Fiddler, and other security research applications.

    Infection Mechanism and Payload Delivery

    ValleyRAT’s loader component utilizes .NET executables containing 3DES-encrypted resources that decrypt and execute entirely in memory.

    The malware leverages MSBuild.exe, a legitimate Microsoft build engine binary, as its execution host through process masquerading techniques.

    This Living-off-the-Land Binary (LOLBin) approach allows ValleyRAT to blend malicious activities with normal system operations.

    The cryptographic implementation employs TripleDES decryption with MD5-hashed keys derived from BigEndianUnicode encoding.

    The malware constructs obfuscated strings using .Replace methods, Strings.StrReverse functions, and Unicode escape sequences to evade static analysis.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Experts see promise, risk in draft of Pentagon acquisition reforms. A six-page draft memo to military leaders is circulating ahead of Defense Secretary Pete Hegseth’s planned Friday speech about acquisition reform, and experts, industry figures, and current and former procurement officials have thoughts. 

    Some see promise, like Arnold Punaro: "If fully implemented, these reforms will finally break the long-standing paradigm that has defined and constrained defense acquisition for decades…”

    Others have concerns, like Todd Harrison, who says that the “time-indexed incentives” espoused in the memo are “a big shift towards holding contractors responsible for keeping to schedule, but it comes with some big risks. It may incentivize companies to deliver poor-quality products before they are ready for prime time just to stay on schedule and not be penalized for being late.” Defense One’s Thomas Novelly, Lauren C. Williams, and Patrick Tucker have many more reactions, here.

    Who’s coming to hear Hegseth’s speech? A draft list of 34 attendees includes defense giants and younger startups, plus notable consumer tech companies like Facebook parent company Meta and consumer AI company Anthropic. Find that, from Tucker, here.

    Boat-strike briefing fails to allay Hill concerns. On Wednesday, Secretary of State Marco Rubio and Defense Secretary Pete Hegseth briefed a group of lawmakers—a bipartisan one this time—in a bid to persuade them that the deadly strikes on alleged drug-smuggling boats in the Caribbean Sea and the Pacific Ocean are lawful. Emerging from the meeting, Democrats said the administration officials did not provide clear answers about the legal basis, scope or objective of the mission. The New York Times reports, here.

    This afternoon, the Senate is to vote on a motion for a resolution that would direct the removal of U.S. armed forces from hostilities “within or against Venezuela that have not been authorized by Congress.” Washington Examiner: “The measure backed by Sens. Tim Kaine (D-VA), Rand Paul (R-KY), and Adam Schiff (D-CA) comes as the U.S. aircraft carrier USS Gerald R Ford is steaming toward Venezuela, amid increasing indications President Trump is considering airstrikes against drug cartel targets.”

    Paul: “These are small outboards with no fentanyl and no path to Florida. To kill indiscriminately is akin to summary execution!…Everyone should get a trial because sometimes the system gets it wrong. Even the worst of the worst in our country get due process.”

    Also: Rep. Brian Mast, R-Mich., says the White House is drafting “concepts of operations” for military action against Venezuela, the former Army explosives disposal tech told Fox on Wednesday. 

    Legal input: “There is no obvious legal argument to support President Trump's expanding campaign of strikes against alleged drug boats in the Caribbean Sea and Pacific Ocean. And the implications are even scarier,” national security law professor Steve Vladeck of Georgetown University wrote Thursday on Substack.  

    These U.S. military attacks “are, near as I can tell, blatantly unlawful as a matter of U.S. domestic law—and a quickly spreading stain on whatever is left of the executive branch’s commitment to the rule of law,” argues Vladeck, using five guiding questions to frame his response. 

    One notable consideration: Trump’s Pentagon has been attacking “boats that, to all appearances, lack both the ability and the intent to even reach the United States (or U.S. targets overseas), let alone to attack them,” which would seem to fly in the face of the president’s apparent claims of self-defense in authorizing these strikes, Vladeck explains. 

    Perhaps most concerning: “[I]f this President doesn’t have to justify what’s happening right now in the Caribbean and the Pacific, it’s terrifying to think of what other uses of force he and his successors wouldn’t have to justify next—in contexts far closer, both literally and metaphorically, to home,” Vladeck warns. “Extrajudicial killings should be reserved for extraordinary cases in which we are as sure as we can be that the target is who we think it is; where the law authorizes the use of force against them; and where there’s no other means of incapacitating them. Whatever else is happening in these strikes, it sure ain’t any of that.” Read the rest, here

    Q. Should the U.S. military attack Nigeria, as Trump suggested over the weekend, and attempt to institute regime change? Former football coach and Senate Armed Services Committee member Tommy Tuberville, R. Ala., says yes. Speaking to Fox on Wednesday, Tuberville was asked by John Harwood, “Would you support U.S. troops going into Nigeria?” Tuberville responded, “You bet I would. It wouldn't be like going into Russia, China, North Korea, or Iran. This would be helping innocent people who could take back over the country.”

    At least one key congressional leader is unhappy with SecDef Hegseth’s new bottleneck on Pentagon communications with lawmakers. CNN reported this week that Hegseth has forbidden military officials from discussing a wide array of subjects with lawmakers without prior approval. Rep. Joe Courtney, D-Conn., and ranking member of the House Seapower and Projection Forces Subcommittee, cited a notable precedent in his criticism of Hegseth’s clampdown on Wednesday. 

    “Looking back at history, the success of the U.S. nuclear submarine program is a direct result of unrestricted communication between mid-level naval officials and Congress,” Courtney said in a statement. “Admiral Hyman G. Rickover, the originator of the nuclear submarine program, met directly with Senators and Members of Congress without permission from Navy brass to establish the nuclear propulsion technology for the U.S. submarine fleet. Over the objections of his superiors, he presented his iconoclastic ideas to key Congressional committees that overruled Pentagon leadership and funded his plan. Without Rickover’s direct communication to Congress, the U.S. would not wield the generational advantage we have in the undersea domain today.” 

    “This is just one of the many examples of where a free flow of communication with Congress benefitted our nation.” He continued, “Secretary Hegseth’s restriction of DoD experts and personnel to have these discussions with Members of Congress, committees, and staff will hamstring our historic collaboration and delay getting the men and women of our armed forces what they need.”

    What Pacific forces say they need: The deputy commander of Pacific Air Forces said their recent REFORPAC exercise in the Pacific“identified the capabilities that we need to win in this theater.” Speaking at the AFCEA TechNet Indo-Pacific conference, Lt. Gen. Laura Lenderman said they were artificial intelligence, autonomy, machine learning; improved command and control capabilities; and resilient cyber networks “that can communicate securely in expeditionary environments and survive relentless attacks.” Defense One’s Jennifer Hlad has more, here.


    Welcome to this Thursday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson and Bradley Peniston. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1971, the U.S. tested its largest underground hydrogen bomb on Amchitka Island in the Aleutians.

    Around the world

    Developing: The U.S. military is planning to stage some troops at a Syrian airbase in Damascus, Reuters reported Thursday—which is almost a year since dictator Bashar al-Assad fled the country, allowing former al-Qaeda branch leader Abu Mohammad al-Jolani (now referred to as Syrian President Ahmed al-Sharaa) of the rebel group Hayat Tahrir al-Sham to take over. 

    “The base sits at the gateway to parts of southern Syria that are expected to make up a demilitarised zone as part of a non-aggression pact between Israel and Syria,” the wire service reports ahead of a meeting between Trump and al-Sharaa at the White House on Monday. Already a U.S. military C-130 has landed nearby to ensure the runways are suitable. 

    If this sounds familiar, that’s because it’s very similar to other deals Trump officials have forged with Lebanon and Israel to have U.S. troops monitor tenuous ceasefire agreements involving the Israeli military in the region. 

    Panning out: “The U.S. has been working for months to reach a security pact between Israel and Syria, two longtime foes,” Reuters writes. “It had hoped to announce a deal at the United Nations General Assembly in September but talks hit a last-minute snag.”

    By the way: Israeli jets are still attacking alleged Hezbollah positions inside southern Lebanon despite a ceasefire signed last November, the Associated Press reported Thursday from Beirut. “Lebanon’s health ministry has reported more than 270 people killed and around 850 wounded by Israeli military actions since the ceasefire took effect…107 of those killed were civilians or noncombatants,” AP reports, citing United Nations monitors. “No Israelis have been killed by fire from Lebanon since the ceasefire,” AP adds. 

    Related reading: Sudan’s paramilitary group said it agrees on truce proposed by U.S.-led mediator group,” AP reported Thursday from Cairo. 

    Meanwhile in the Pacific region, China tested a “mini drone carrier” at sea last week, according to footage aired on state-run television, The War Zone reported Wednesday. 

    The “size and configuration of the flight deck, especially a trapezoidal section on the starboard side toward the stern, as well as its markings, match up directly with the design of a ship that was launched at the Jiangsu Dayang Marine shipyard back in 2022…which is approximately 328 feet (100 meters) long and some 82 feet (25 meters) across, and has a small island on the starboard side toward the bow,” TWZ writes. More, here

    Elsewhere in the region, Japanese soldiers have been deployed to help reduce bear attacks in the northern region of Akita. “Since April, more than 100 people have been injured and at least 12 killed in bear attacks across Japan,” AP reports from Tokyo. 

    What will the soldiers do? The Defense Ministry plans for them to “set box traps with food, transport local hunters and help dispose of dead bears,” but they will not use their weapons to kill the bears, AP reports. Read more, here

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated Remote Access Trojan labeled EndClient RAT has emerged as a significant threat targeting human rights defenders in North Korea, marking another escalation in advanced malware operations attributed to the Kimsuky threat group.

    This newly discovered malware represents a concerning shift in attack sophistication, utilizing stolen code-signing certificates to evade antivirus protections and bypass Windows SmartScreen warnings.

    The threat was first identified when a prominent North Korean human rights activist reported suspicious activity on her compromised account, triggering a broader investigation that uncovered the campaign’s scope and technical capabilities.

    The attack chain demonstrates meticulous social engineering tactics combined with legitimate-looking delivery mechanisms.

    The malware arrives through a deceptively named Microsoft Installer package titled “StressClear.msi,” which had been code-signed using stolen credentials from Chengdu Huifenghe Science and Technology Co Ltd, a Chinese mineral excavation company.

    The threat actors engaged in direct, methodical conversations with targeted individuals, instructing them to download and execute the MSI file.

    This approach proved effective, with at least 40 confirmed targets identified across the human rights community, though the full scope of the campaign remains unknown due to minimal antivirus detection rates.

    A control flow image of the EndClient RAT (Source – 0x0v1)

    0x0v1 security analysts and researchers noted that the malware demonstrates a blend of genuine software components alongside malicious payloads, creating an intricate deception that complicates detection and analysis.

    Upon execution, the MSI bundle installs a legitimate South Korean banking authentication module called Delfino from WIZVERA VeraPort, potentially serving as a decoy to establish legitimacy.

    Concurrently, the installer deploys a heavily obfuscated AutoIT script wrapped within the genuine AutoIt3.exe binary, allowing the malware to execute in memory while maintaining a low profile against security tools.

    The combination of trusted processes and stolen signatures essentially grants the malware unauthorized system access without triggering conventional security alerts.

    Technical Persistence and Detection Evasion

    The EndClient RAT employs multiple layers of persistence mechanisms designed to survive system reboots and resist removal attempts.

    Once installed, the malware establishes persistence through a scheduled task named “IoKlTr” that executes every minute from the Public\Music directory.

    The malware creates a globally named mutex identifier (Global\AB732E15-D8DD-87A1-7464-CE6698819E701) to prevent multiple instances from running simultaneously, preventing resource exhaustion that might trigger detection.

    When the malware detects Avast antivirus presence, it generates polymorphic variations of itself by injecting garbage data and creating new filenames, demonstrating adaptive evasion capabilities.

    The malware also registers a startup link that launches the malicious AutoIT payload during user login, ensuring consistent execution across restarts.

    Communication with command-and-control infrastructure occurs through TCP socket connections using a custom protocol with JSON-based messaging framed by sentinel markers (“endClient9688” and “endServer9688”), allowing the malware to receive commands for shell execution, file downloads, and data exfiltration.

    This technical architecture reveals sophisticated understanding of Windows internals and demonstrates how modern malware continues to abuse legitimate tools and signing mechanisms to bypass security defenses that organizations depend upon for protection.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New EndClient RAT Attacking Users by Leveraging Stolen Code-Signing to Bypass AV Detections appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing attacks targeting Ukrainian entities. The campaign, detected in May 2025, is tracked by the security outfit under the moniker InedibleOchotense, describing it as Russia-aligned. “InedibleOchotense sent spear-phishing emails and Signal text messages, containing a link

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco on Wednesday disclosed that it became aware of a new attack variant that’s designed to target devices running Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software releases that are susceptible to CVE-2025-20333 and CVE-2025-20362. “This attack can cause unpatched devices to unexpectedly reload, leading to denial-of-service

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶