• Two cybersecurity professionals have been federally charged for orchestrating a sophisticated ransomware campaign targeting multiple American businesses.

    Ryan Clifford Goldberg, 28, of Watkinsville, Georgia, and Kevin Tyler Martin, 31, of Roanoke, Texas, face serious criminal charges related to their alleged deployment of the notorious ALPHV BlackCat ransomware against healthcare, pharmaceutical, manufacturing, and engineering firms across the United States.​

    The indictment, filed in the U.S. District Court for the Southern District of Florida on October 2, 2025, reveals an organized criminal operation that generated millions in extortion payments between May 2023 and April 2025.

    ALPHV/BlackCat emerged as one of the most destructive ransomware variants in late 2021. Attacking hundreds of institutions worldwide and causing tens of millions in cryptocurrency ransom payments, combined with massive operational disruptions.​

    How the Attack Campaign Worked

    According to federal prosecutors, the defendants and an unnamed co-conspirator followed a structured attack methodology that became characteristic of ALPHV BlackCat operations.

    The scheme involved gaining unauthorized access to corporate networks, stealing sensitive data, deploying encryption malware, and then demanding substantial ransom payments.

    The group exploited fear of financial loss and data exposure to coerce payments from victims who faced impossible choices between losing their data or paying cryptocurrency ransoms.​

    The defendants allegedly infiltrated five major companies, causing documented damages exceeding $17.5 million in ransom demands.

    Their victims included a Tampa-based medical device manufacturer from which they extorted approximately $10 million, a Maryland pharmaceutical company, a California doctor’s office, an engineering firm also in California, and a Virginia-based drone manufacturer.

    Over twenty ALPHV BlackCat victims operated in Florida’s Southern District alone, highlighting the campaign’s regional concentration.​

    The federal indictment charges include conspiracy to interfere with interstate commerce through extortion, interference with interstate commerce by extortion, and intentional damage to protected computers.

    Prosecutors also seek compensation of all proceeds derived from the criminal conspiracy, meaning any cryptocurrency or assets purchased with ransom money become subject to government seizure.​

    The charges underscore how cybersecurity expertise turned toward criminal purposes creates devastating consequences for legitimate businesses and their customers who depend on the continuity of services and data security.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated attack technique that exploits Microsoft’s OneDrive application through DLL sideloading, allowing threat actors to execute malicious code while evading detection mechanisms.

    The attack leverages a weaponized version.dll file to hijack legitimate Windows processes and maintain persistence on compromised systems.

    DLL sideloading exploits Windows’ library-loading mechanism by tricking legitimate applications into loading malicious Dynamic Link Libraries instead of authentic ones.

    Understanding the DLL Sideloading Attack

    According to Kas-sec security advisory, the attackers place a crafted version.dll file in the same directory as OneDrive.exe, taking advantage of the application’s dependency search order.

    When OneDrive.exe launches, it automatically loads the malicious DLL from its local directory before searching system directories.

    The technique targets version.dll specifically because many Windows applications, including OneDrive, rely on this library to retrieve file version information.

    By positioning the malicious DLL strategically, attackers can execute code under the trusted context of a digitally signed Microsoft application, effectively bypassing security controls that monitor suspicious processes. To maintain stealth and prevent application crashes, attackers implement DLL proxying techniques.

    The malicious version.dll exports the same functions as the legitimate library, forwarding legitimate function calls to the original Windows System32 version.dll while executing malicious operations in the background.

    This dual functionality ensures OneDrive.exe continues operating normally, reducing the likelihood of detection by users or security software.

    The attack employs an advanced hooking technique that leverages Vectored Exception Handling and the PAGE_GUARD memory protection flag, reads the advisory.

    Instead of traditional inline hooking methods that security tools easily detect, this approach intentionally triggers memory exceptions to intercept API calls.

    When OneDrive.exe attempts to call specific functions like CreateWindowExW, the malicious code captures the execution flow through exception handlers and redirects it to attacker-controlled functions.

    This method proves particularly effective because it avoids persistent code modifications that signature-based detection systems typically identify.

    The hook re-arms itself after each interception using single-step exceptions, maintaining continuous control over targeted API functions.

    Once loaded, the malicious DLL spawns a separate thread to execute arbitrary payloads without blocking the application’s initialization process.

    The proof-of-concept launches additional processes while hiding their windows from view, enabling covert operations on compromised systems.

    Security professionals must implement application whitelisting, monitor DLL loading behaviors, and validate digital signatures of loaded libraries to defend against these sophisticated sideloading attacks targeting trusted applications.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Hackers Exploit OneDrive.exe Through DLL Sideloading to Execute Arbitrary Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated threat actor known as Curly COMrades has demonstrated advanced evasion capabilities by leveraging legitimate Windows virtualization features to establish covert, long-term access to victim networks. Operating to support Russian geopolitical interests, the group has deployed innovative tools and techniques that successfully bypass traditional endpoint detection and response (EDR) solutions. This investigation, conducted in […]

    The post Curly COMrades Hacker Group Deploys New Tools for Stealthy Remote Access on Compromised Windows 10 Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Two individuals with security backgrounds have been federally charged for orchestrating a coordinated ransomware attack campaign against American businesses using the dangerous BlackCat strain. Ryan Clifford Goldberg from Georgia and Kevin Tyler Martin from Texas face serious federal charges including conspiracy to interfere with interstate commerce through extortion, intentional computer damage, and money laundering violations.​ […]

    The post Security Professionals Charged for Using BlackCat Ransomware Against American Businesses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The notorious FIN7 cybercriminal group, also known as Savage Ladybug, continues to rely on a sophisticated Windows SSH backdoor infrastructure with minimal modifications since 2022, according to threat intelligence analysis. The threat actor has maintained operational consistency while using an install.bat script paired with OpenSSH toolsets to establish reverse SSH and SFTP connections for maintaining […]

    The post FIN7 Hackers Leverage Windows SSH Backdoor for Stealthy Remote Access and Persistence appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Silent Lynx, a sophisticated threat group that has been tracked since 2024, continues its relentless espionage campaign against government entities across Central Asia.

    Seqrite analysts identified the group as the first to assign this nomenclature, distinguishing it from multiple overlapping aliases including YoroTrooper, Sturgeon Phisher, and ShadowSilk.

    The group has become notorious for orchestrating spear-phishing campaigns while impersonating government officials, specifically targeting governmental employees with malicious attachments designed to harvest sensitive information.

    The threat group primarily leverages fabricated summit-related communications to distribute its weaponized payload.

    Seqrite researchers noted that Silent Lynx demonstrates a pattern of hastily constructed campaigns targeting diplomatic entities involved in high-level international meetings.

    The group’s operations extend across multiple Central Asian nations including Tajikistan, Azerbaijan, Russia, and China, with strategic focus on nations involved in cross-border infrastructure projects and diplomatic initiatives.

    Seqrite analysts identified two distinct campaigns in 2025, both employing similar attack methodologies but targeting different geopolitical relationships.

    The first campaign, discovered in October 2025, targeted diplomatic entities involved in Russia-Azerbaijan summit preparations, while the second focused on entities associated with China-Central Asian relations.

    The timing and thematic consistency of these campaigns reveal a coordinated espionage operation driven by geopolitical interests rather than financial gain.

    Infection Mechanism and Technical Arsenal

    The infection chain begins with a deceptive RAR archive bearing benign filenames like “План развитие стратегического сотрудничества.pdf.rar” (Plan for Development of Strategic Cooperation).

    When extracted, the archive reveals a malicious Windows shortcut file that abuses PowerShell.exe to download and execute obfuscated scripts from GitHub repositories.

    The LNK file contains working directory metadata pointing to C:\Users\GoBus\OneDrive\Рабочий стол, serving as a pivot point for tracking additional campaigns.

    Infection Chain (Source – Seqrite)

    The downloaded PowerShell script contains Base64-encoded reverse shell code that connects to remote command-and-control servers on port 443.

    The decoded payload establishes a persistent TCP connection where it reads commands from operators, executes them via Invoke-Expression, and returns output across the same channel.

    Seqrite researchers identified three primary implants deployed in these campaigns: Silent Loader (a C++ based downloader), Laplas (a TCP and TLS-based reverse shell), and SilentSweeper (a .NET implant capable of extracting and executing embedded PowerShell scripts).

    The SilentSweeper implant accepts multiple arguments including -extract for writing embedded malicious PowerShell to disk and -debug for troubleshooting.

    It reads a file named qw.ps1 from its Resources section, executes the contents, and downloads additional reverse shell payloads.

    Beyond remote access, Seqrite analysts observed deployment of Ligolo-ng, an open-source tunneling tool, providing operators unrestricted command execution capabilities on compromised systems.

    The multi-stage infection mechanism demonstrates sophisticated operational security awareness despite numerous OPSEC blunders that facilitated attribution and tracking.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Silent Lynx APT New Attack Targeting Governmental Employees Posing as Officials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below – CVE-2025-11371 (CVSS score: 7.5) – A vulnerability in files or directories accessible to

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have discovered a sophisticated attack technique that exploits Microsoft’s OneDrive application to execute malicious code without detection. The method, known as DLL sideloading, leverages the way Windows loads library files to trick legitimate applications into running attacker-controlled software. This technique represents a significant threat to enterprise environments where OneDrive is widely deployed across […]

    The post Hackers Abuse OneDrive.exe via DLL Sideloading to Run Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Seqrite Labs’ APT Team has documented fresh campaigns from Silent Lynx, a sophisticated threat actor group known for orchestrating spear-phishing operations that impersonate government officials to target diplomatic and governmental employees across Central Asia. The group, also tracked under aliases including YoroTrooper, Sturgeon Phisher, and Cavalry Werewolf, continues its espionage-focused activities with minimal operational security […]

    The post Silent Lynx APT New Attack Targeting Governmental Employees Posing as Officials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The HydraPWK project’s latest Apes-T1 snapshot refines its penetration-testing Linux distribution by replacing Elasticsearch with the open-source OpenSearch, resolving licensing issues and enhancing tools for industrial security assessments.

    This update, released shortly after the major Apes version, highlights HydraPWK’s focus on compliance and usability, positioning it as a streamlined rival to the ubiquitous Kali Linux in the ethical hacking community.

    By prioritizing real-time performance and plug-and-play tools, HydraPWK appeals to specialists targeting embedded systems, offering a fresh take on pentesting without the overhead often seen in broader distros.​

    OpenSearch Integration and UI Polish

    Apes-T1 addresses a post-release hiccup where Elasticsearch’s restrictive license led to its removal from the repository, as noted in GitHub issues.

    In its place, OpenSearch a scalable, Apache-licensed search engine now serves as the backend for tools like Arkime, enabling efficient network forensics without proprietary entanglements.

    OpenSearch Dashboards also joins as a custom HydraPWK build, providing visualization capabilities tailored for observability in pentesting workflows.

    An updated hydrapwk-purplizer colorscheme for the Xfce terminal fixes error visibility problems, ensuring clearer output during live operations.​

    These changes maintain HydraPWK’s semi-rolling model, allowing updates via a simple APT command or fresh ISO downloads. The team apologized for the oversight and encouraged honest community feedback over hype, fostering trust in this Debian-based distro aimed at industrial sectors like avionics and drones.​

    HydraPWK vs. Kali Linux

    When stacked against Kali Linux, HydraPWK emerges as a more niche, lightweight contender optimized for physical and real-time pentesting.

    Kali, with over 600 pre-installed tools like Nmap, Metasploit, and Wireshark, excels in general-purpose ethical hacking but can feel bloated and resource-heavy, often requiring manual tweaks for stability in specialized environments.

    HydraPWK, built on Debian’s testing branch with a PREEMPT_RT kernel, loads kernel modules automatically for low-latency interactions with hardware like UAVs or automotive ECUs, reducing setup time compared to Kali’s broader scope.

    Kali’s vast ecosystem supports diverse tasks from wireless attacks to forensics via tools like Aircrack-ng and John the Ripper, but its non-root-by-default approach in recent versions adds configuration layers that HydraPWK bypasses with its out-of-the-box hardening.

    While Kali thrives on community-driven metapackages for customization, HydraPWK’s “+hydrapwk” packages emphasize industrial focus, avoiding Kali’s occasional update-induced instability for a more predictable, plug-and-play experience.

    Users praise HydraPWK’s speed and completeness as potential Kali successors for targeted ops, though Kali remains the gold standard for comprehensive, multi-platform testing.

    As cyber threats target industrial IoT, HydraPWK’s refinements make it a compelling choice for pros seeking efficiency without sacrificing power. Updates are straightforward, keeping the distro agile in a fast-evolving field.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post HydraPWK Penetration Testing OS With Necessary Hacking Tools and Simplified Interface appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶