• The Gootloader malware campaign has resurfaced with sophisticated evasion techniques that allow it to bypass automated security analysis.

    This persistent threat has been targeting victims for over five years using legal-themed search engine optimization poisoning tactics.

    The malware operators deploy thousands of unique keywords across more than 100 compromised websites to lure unsuspecting users into downloading malicious ZIP archives containing JScript payloads that establish initial access for ransomware deployment.

    The threat actor continues to refine their social engineering approach by using legal terminology such as “contract,” “form,” and “agreement” as bait to attract potential victims through search engines.

    Once a user discovers what appears to be legitimate legal resources through search results, they are directed to compromised websites that host the malicious downloads.

    The campaign’s ultimate objective remains unchanged: convincing victims to execute malicious JScript files that open the door for subsequent attacks.

    Security researchers at Huntress identified this new variant during active threat hunting operations in early November 2025. The discovery revealed significant technical modifications to the malware’s delivery mechanism and persistence strategy.

    The research team, led by analyst RussianPanda, documented the evolution of Gootloader’s tactics and published their findings to warn the security community about the emerging threat.

    The malware’s gated content system creates a split reality where different users see entirely different web pages based on various conditions.

    Users who do not meet specific criteria, such as geographic location, operating system, referrer source, or browsing time, only see harmless blog content generated through language models.

    However, victims who pass these filters encounter convincing reproductions of legitimate websites featuring spoofed domain names using Cyrillic characters that visually resemble Latin letters.

    ZIP Archive Manipulation Technique

    The most significant innovation in this campaign involves manipulating ZIP archives to produce different extraction results depending on the tool used.

    When opened with Windows Explorer, the archive extracts a valid .JS file containing the malicious payload.

    However, automated analysis platforms like VirusTotal, Python’s built-in zip utilities, or 7-Zip unpack the same archive as a harmless .TXT file instead.

    This clever evasion technique exploits inconsistencies in how different decompression engines interpret ZIP file structures, allowing the malware to hide from automated scanning systems while remaining functional for intended victims on Windows systems.

    The persistence mechanism also evolved from scheduled tasks to a chain of .LNK shortcuts, with one placed in the user’s Startup folder pointing to another in AppData that executes a secondary JScript payload.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability discovered across numerous HTTP/2 implementations has exposed a dangerous protocol-level vulnerability that enables threat actors to orchestrate potent denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. Tracked as CVE-2025-8671 and colloquially known as “MadeYouReset,” this vulnerability exploits a fundamental mismatch between the HTTP/2 specification and real-world server implementations. Security researchers from Tel Aviv […]

    The post HTTP/2 ‘MadeYouReset’ Vulnerability Enable Denial-of-Service (DoS) Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The emergence of AI-powered browsers represents a significant shift in how artificial intelligence interacts with web content. However, it has also introduced unprecedented challenges for digital publishers and content creators. Last week, OpenAI released Atlas, joining a growing wave of AI browsers including Perplexity’s Comet and Microsoft’s Copilot mode in Edge, that aim to transform […]

    The post AI Browsers That Beat Paywalls by Imitating Humans appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In the ever-evolving landscape of cyber threats, a new ransomware strain, Midnight, has emerged, echoing the notorious tactics of its predecessor, Babuk. First detected by Gen researchers, Midnight blends familiar ransomware mechanics with novel cryptographic modifications—some of which unintentionally open the door to file recovery. This represents a rare opportunity for victims to reclaim their […]

    The post Critical Bug in Midnight Ransomware Tool Unlocks File Recovery appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SonicWall, a global cybersecurity company, confirmed that state-sponsored hackers were behind a recent incident involving unauthorized access to firewall backup files.

    The breach began in early September, when the company detected suspicious activity involving the download of backup firewall configuration files stored in a cloud environment.

    Upon discovery, SonicWall quickly activated its incident response plan, called in Mandiant, a well-known cybersecurity response firm, and notified partners and customers directly.

    The company maintained frequent and transparent communication, hosting live Q&A sessions and providing tools and guidance to help partners respond effectively.

    SonicWall also offered commercial concessions to support partners as they worked through remediation steps.

    Mandiant Investigation Reveals Cloud-Isolated Attack

    Mandiant’s thorough investigation has now concluded. The results show that the attackers, linked to a state-sponsored threat group, used an API call to access cloud backup files stored in a specific cloud environment.

    According to the findings, this incident did not relate to the recent global Akira ransomware attacks targeting firewalls and edge devices.

    Importantly, SonicWall confirmed that its products, firmware, and other systems, like source code and customer networks, were not impacted or compromised.

    All remediation actions recommended by Mandiant have been implemented, and SonicWall continues to work closely with security experts to strengthen its cloud and network infrastructure further.

    The company emphasized that its long-standing focus on security excellence and partner support remains firm. Earlier in the year, SonicWall launched a Secure by Design modernization initiative.

    This included updates to product architecture, cloud operations, internal cybersecurity practices, and the appointment of a new Chief Information Officer.

    The company also continues to invest in advanced response teams and cutting-edge security tools. SonicWall’s determination to stay ahead is underscored by external validation.

    Even as nation-state threat actors increasingly target security vendors, SonicWall is committed to transparency, strong partnerships, and relentless improvement to safeguard its customers and partners worldwide.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post SonicWall Confirms State-Sponsored Hackers Behind the Massive Firewall Backup Breach appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical remote code execution (RCE) flaw in three official extensions for Anthropic’s Claude Desktop. These vulnerabilities, affecting the Chrome, iMessage, and Apple Notes connectors, stem from unsanitized command injection and carry a high severity score of CVSS 8.9.

    Published and promoted directly by Anthropic at the top of their extension marketplace, the flaws could allow attackers to execute arbitrary code on users’ machines through seemingly innocent interactions with the AI assistant. Fortunately, Anthropic has patched all three issues.

    The discovery from KOI Security highlights the risks in emerging AI ecosystems, where extensions bridge powerful language models and local systems with minimal safeguards.

    Unlike browser add-ons, these tools operate with full system privileges, amplifying the potential damage from basic security oversights.

    Understanding Claude Desktop Extensions

    Claude Desktop Extensions function as packaged MCP servers, distributed as .mcpb bundles, essentially zipped archives with server code and function manifests.

    Extension Source: KOI

    They offer a one-click installation similar to Chrome extensions but lack the sandboxing that protects browser environments. Instead, they run unsandboxed on the host machine, granting access to files, commands, credentials, and system settings.

    This design positions them as privileged intermediaries between Claude’s AI and the operating system, making them potent but perilous.

    The vulnerabilities exploited this trust. Each extension processed user inputs such as URLs or messages via AppleScript commands without proper sanitization.

    For instance, a command to open a URL in Chrome used template literals to insert the input directly, like: tell application “Google Chrome” to open location.

    An attacker could craft a malicious input to escape the string context and inject arbitrary AppleScript, which then triggers shell commands with elevated privileges.

    A simple exploit payload escapes the quotes and executes remote code. This classic command injection flaw, one of the oldest in software security, underscores how fundamental errors can persist in production code.

    Attack Chain (Source : KOI)

    The real danger lies not in users typing malicious commands but in prompt injection via web content. Claude Desktop routinely fetches and analyzes web pages to answer questions, creating an unwitting attack vector, KOI security added.

    An attacker controlling a search result page could detect Claude’s user agent and serve tailored malicious content.

    The AI, interpreting this as helpful instructions, triggers the vulnerable Chrome extension. The injected code runs silently, potentially stealing SSH keys, AWS credentials, browser passwords, or even installing backdoors all without user suspicion.

    This chain, from web content to AI processing to local execution, effectively grants remote attackers shell access. No malware downloads or phishing are needed; a normal AI query suffices.

    These flaws in Anthropic’s own extensions raise concerns about the maturity of the MCP ecosystem. As independent developers flood the marketplace with AI-assisted code under limited review, the risks of full-privilege extensions could escalate.

    Users must treat these tools as high-risk executables, not casual plugins, and prioritize updates.

    Anthropic’s swift fixes mitigate immediate threats, but the incident calls for robust security practices across AI platforms. At Koi, ongoing research aims to spot such issues early, safeguarding users in this rapidly evolving landscape.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical RCE Vulnerabilities in Claude Desktop Let Attackers Execute Malicious Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Proofpoint Threat Research has identified a previously unknown Iranian threat actor, dubbed UNK_SmudgedSerpent, that conducted sophisticated phishing campaigns against academics and foreign policy experts between June and August 2025. The group employed credential harvesting techniques, sophisticated social engineering, and remote management tools to infiltrate targets, revealing a complex web of overlapping tactics reminiscent of established […]

    The post Iranian Hackers Exploit RMM Tools to Target Academics and Foreign-Policy Experts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco has issued a critical warning about ongoing attacks targeting a severe remote code execution vulnerability affecting its Secure Firewall, Adaptive Security Appliance, and Threat Defense Software. The company updated its security advisory on November 5, 2025, revealing that threat actors have discovered a new attack variant capable of fully compromising devices on unpatched systems. […]

    The post Cisco Confirms Active Exploitation of Secure ASA and FTD RCE Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have uncovered a sophisticated attack campaign attributed to Kimsuky, the North Korean-backed threat group known for conducting espionage operations against government entities and think tanks. Recent analysis reveals that threat actors are leveraging Visual Studio Code extensions and GitHub as command-and-control infrastructure to deliver multi-stage malware payloads capable of deploying ransomware and conducting […]

    The post Threat Actors Exploit VS Code Extensions for Ransomware via GitHub C2 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In the early hours of November 3, 2025, Check Point Research’s blockchain threat monitoring systems flagged a suspicious pattern on the Ethereum mainnet. The alert stemmed from Balancer V2’s Vault contract, which soon revealed one of the most devastating DeFi vulnerabilities to date. Before defenders could intervene, attackers had siphoned $128.64 million from Balancer ComposableStablePool […]

    The post Checkpoint Analysis: Dissecting the $128M Balancer Pool Drain in Under 30 Minutes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶