• In October 2025, threat researchers at Cyble Research and Intelligence Labs uncovered a sophisticated cyber attack leveraging weaponized military documents to distribute an advanced SSH-Tor backdoor targeting defense sector personnel.

    The campaign centers on a deceptively simple delivery mechanism: a ZIP archive disguised as a Belarusian military document titled “ТЛГ на убытие на переподготовку.pdf” (TLG for departure for retraining), specifically designed to lure Special Operations Command personnel specializing in unmanned aerial vehicle operations.

    The attack represents a significant evolution in state-sponsored cyber espionage techniques, combining social engineering with sophisticated technical countermeasures to establish persistent backdoor access.

    Cyble analysts identified that the malware deploys OpenSSH for Windows alongside a customized Tor hidden service featuring obfs4 traffic obfuscation, granting threat actors anonymous access to SSH, RDP, SFTP, and SMB protocols on compromised systems.

    The researchers successfully connected via SSH to confirm the backdoor’s operational functionality, though no secondary payloads or post-exploitation actions were observed at the time of analysis.

    Threat attribution analysis suggests moderate confidence alignment with UAC-0125/Sandworm (APT44), a Russian-linked advanced persistent threat group known for targeting Ukrainian military and critical infrastructure since 2013.

    Infection chain (Source – Cyble)

    The tactical patterns, infrastructure overlaps, and operational methodologies mirror the December 2024 Army+ campaign, demonstrating Sandworm’s continuous refinement of proven attack techniques.

    Multi-Stage Infection Mechanism and Evasion Strategy

    The attack chain employs nested ZIP archives and LNK file disguises to bypass automated detection systems with remarkable sophistication.

    Upon extraction, victims encounter an LNK file appearing as a legitimate PDF alongside a hidden directory named “FOUND.000” containing an additional archive titled “persistentHandlerHashingEncodingScalable.zip.”

    SSH connection to the victim host (Source – Cyble)

    When the victim attempts opening what appears to be a PDF document, the LNK file executes embedded PowerShell commands, extracting the nested archive to the %appdata%\logicpro directory and retrieving obfuscated PowerShell content for execution.

    Cyble analysts identified critical anti-analysis checks embedded within the second-stage PowerShell script. The malware validates that at least 10 recent LNK files exist on the system and confirms the process count exceeds 50—thresholds rarely met in sandbox environments.

    This environmental awareness mechanism terminates execution in automated analysis systems while proceeding on genuine user workstations.

    Following validation, the script displays a decoy PDF to maintain the illusion of legitimacy while establishing persistence through scheduled tasks configured to execute at logon and daily at 10:21 AM UTC, ensuring continuous access to the compromised infrastructure.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Open VSX team and Eclipse Foundation have addressed a significant security incident involving leaked authentication tokens and malicious extensions on their popular code marketplace. The organization has now contained the situation and outlined concrete steps to prevent future attacks. Earlier this month, security researchers at Wiz identified several developer tokens that had been accidentally […]

    The post Open VSX Registry Responds to Leaked Tokens and Malicious Extension Incident appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have uncovered a severe unauthenticated Remote Code Execution vulnerability in Ubiquiti’s UniFi OS that earned a substantial $25,000 bug bounty reward. Tracked as CVE-2025-52665, this critical flaw allows attackers to gain complete control of UniFi devices without requiring any credentials or user interaction, posing significant risks to organizations using UniFi Dream Machine routers […]

    The post Critical UniFi OS Flaw Enables Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false positives and adjusting detection rules reactively. SOCs often lack the environmental context and relevant threat intelligence needed to quickly verify which alerts are truly malicious. As a result, analysts spend excessive time manually triaging alerts, the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Proton has launched a new initiative called the Data Breach Observatory. This program reveals serious problems that exist on the internet.

    The cybersecurity company revealed that over 300 million stolen credentials are currently circulating on dark web cybercrime markets, putting businesses and individuals at unprecedented risk.

    This massive exposure highlights the growing underground economy built on stolen personal and corporate data. The data paints a disturbing picture for small businesses, which have become prime targets for cybercriminals.

    According to Proton’s research, four out of five small businesses have experienced a data breach recently. The financial impact is devastating, with a single incident potentially costing a small firm over one million dollars.

    Despite these alarming statistics, most breaches go unreported, leaving companies unaware of their vulnerabilities until it’s too late. Traditional breach notification systems often fail to alert affected organizations promptly.

    Small Businesses Face Million-Dollar Threats

    Many businesses only discover they’ve been compromised months or even years after the initial attack. This delayed awareness gives cybercriminals ample time to exploit stolen credentials, leading to further security incidents, financial fraud, and identity theft.

    Proton is taking a proactive approach by directly monitoring dark web marketplaces. The Data Breach Observatory continuously scours underground forums and criminal marketplaces where stolen data is bought and sold.

    By capturing and analyzing these leaks in real time, Proton provides businesses with immediate alerts when their information appears on these platforms. The observatory’s latest findings reveal ten major data breaches from 2025 alone, affecting organizations across multiple industries and countries.

    Among the most significant incidents is the Qantas Airways breach, which exposed information from 11.8 million records, including names, birth dates, addresses, phone numbers, and email addresses.

    The telecommunications sector was particularly hard hit, with Free in France suffering a massive breach affecting over 19 million customers, including sensitive banking information such as IBANs.

    The breaches documented by Proton span multiple continents and industries, from transportation and telecommunications to financial services and technology companies.  

    Allianz Life in Germany saw one million records compromised, including highly sensitive social security numbers. Meanwhile, SkilloVilla in India experienced one of the largest exposures, with over 33 million records containing personal contact information leaked to dark web markets.

    CompanyCountryRecords ExposedCompromised Data
    Qantas AirwaysAustralia11.8 million+Name, date of birth, physical address, phone number, email address
    Allianz LifeGermany1 million+Name, date of birth, physical address, phone number, email address, social security number
    TraceloUnited States1.4 million+Name, physical address, phone number, email address, password
    INTERSPORT FranceFrance105,782Name, physical address, phone number, email address
    FreeFrance19 million+Name, date of birth, phone number, email address, IBAN
    Orange RomaniaRomania3.4 million+Name, date of birth, physical address, phone number, email address, username, ID number
    Zacks Investment ResearchUnited States5.4 million+Name, physical address, phone number, email address, username, password
    SkilloVillaIndia33 million+Name, physical address, phone number, email address
    amaiSingapore10 million+Name, physical address, phone number, email address, password
    PhoneMondoGermany10 million+Name, date of birth, physical address, phone number, email address, username, password, IBAN

    The variety of compromised data types is equally concerning. Beyond basic contact information, cybercriminals have obtained passwords, social security numbers, banking details, and identification numbers. This comprehensive data enables sophisticated identity theft operations and account takeover attacks.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Proton Exposes 300 Million Stolen Credentials Available for Sale on Dark Web Cybercrime Markets appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has released a non-security update for Windows 11 versions 24H2 and 25H2 that introduces an unusual bug affecting one of the operating system’s most essential utilities.

    The update, designated as KB5067036, is causing Task Manager to continue running in the background even after users close the application. This issue has been officially acknowledged by Microsoft as a known problem in the latest optional update.

    The KB5067036 update is part of Microsoft’s routine maintenance releases designed to improve functionality, performance, and reliability across Windows 11 systems.

    This particular update falls under the category of optional non-security preview releases, which are typically made available during the fourth week of each month.

    These updates allow users to receive new features and improvements ahead of the mandatory security updates that roll out on the second Tuesday of every month, commonly known as Patch Tuesday.

    What the Update Brings to Windows 11

    The update includes various improvements to AI components for Copilot Plus PC experiences, with enhanced versions of Image Search, Content Extraction, Semantic Analysis, and Settings Model.

    Additionally, it contains a servicing stack update designated as KB5067035, which ensures that devices can properly receive and install future Windows updates. The servicing stack is a critical component that maintains the reliability and robustness of the Windows update system.

    According to Microsoft’s official documentation, Task Manager may continue operating in the background after users attempt to close the application.

    This behavior represents a disruption from normal functionality, where closing Task Manager should completely terminate the process.

    The issue affects both Windows 11 version 24H2 and the newer 25H2 release, indicating that the problem spans multiple current Windows versions.

    Task Manager is a crucial system utility that allows users to monitor running applications, track system performance, manage startup programs, and terminate unresponsive processes.

    Having it continue running in the background could potentially consume system resources unnecessarily and may cause confusion for users who expect the application to fully close when dismissed.

    The KB5067036 update is available through Windows Update as an optional download. Users can access it by navigating to Start, then Settings, followed by Update and Security, and finally Windows Update.

    The update appears in the Optional Updates Available section, where users can choose to download and install it. For users who install the update and encounter issues, Microsoft has provided removal instructions.

    However, there is an important limitation: while the cumulative update can be removed using the DISM command-line tool with the Remove-Package option, the servicing stack update cannot be removed once installed.

    Users cannot use the Windows Update Standalone Installer with the uninstall switch on the combined package, as this method will not work for packages that include servicing stack updates.

    Microsoft continues to monitor feedback and typically addresses known issues in subsequent updates. Users experiencing the Task Manager problem may want to wait for a resolution before installing this optional update.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Windows 11 24H2/25H2 Update Causes Task Manager to be Active After Closure appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive data from compromised devices. According to CYFIRMA, which analyzed three different samples of BankBot-YNRK, the malware incorporates features to sidestep analysis efforts by first checking its running within a virtualized or emulated environment

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a single victim in South Korea. Gen Digital, which disclosed details of the activity, did not reveal any details on when the incident occurred, but noted that the phishing email contained a ZIP file (“250908_A_HK이노션

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated campaign targeting military personnel across Russia and Belarus has emerged, deploying a complex multi-stage infection chain that establishes covert remote access through Tor-based infrastructure.

    Operation SkyCloak represents a stealth-oriented intrusion effort aimed at the Russian Airborne Forces and Belarusian Special Forces, utilizing legitimate OpenSSH binaries and obfs4 bridges to mask communication channels while maintaining persistence on compromised systems.

    The attack begins with phishing archives containing shortcut files disguised with double extensions, masquerading as official military documents.

    The first lure mimics a nomination letter from Military Unit 71289, referencing the 83rd Separate Guards Airborne Assault Brigade stationed in Ussuriysk.

    The second decoy targets Belarusian Special Forces personnel with training notifications for Military Unit 89417, the 5th Separate Spetsnaz Brigade located near Minsk.

    These carefully crafted documents were weaponized in late September 2025, with archive files uploaded from Belarus between October 15 and October 21.

    Once executed, the shortcut files trigger PowerShell commands that initiate a sophisticated dropper mechanism.

    The malware extracts nested archive files into directories with cryptic naming schemes such as %APPDATA%\dynamicUpdatingHashingScalingContext and %USERPROFILE%\Downloads\incrementalStreamingMerging.

    The multi-stage extraction process deploys payloads into hidden folders including $env:APPDATA\logicpro or $env:APPDATA\reaper, containing multiple executables, XML configuration files, decoy PDFs, and supporting DLLs.

    Infection Chain (Source – Seqrite)

    Seqrite analysts identified this campaign as part of a broader pattern of operations targeting Russian defense infrastructure, noting similarities to previous attacks such as HollowQuill and CargoTalon.

    The researchers observed that the malware employs sophisticated anti-analysis techniques to evade sandbox detection, including checks for legitimate user activity by verifying the presence of more than ten shortcut files in the Windows Recent folder and ensuring process counts exceed 50 before proceeding with execution.

    PowerShell Execution and Persistence Mechanisms

    The PowerShell stage implements multiple evasion and persistence tactics to ensure long-term access to compromised systems.

    The script creates a mutex to prevent multiple instances from running simultaneously, then registers scheduled tasks through XML configuration files that establish daily execution triggers starting at 2025-09-25T01:41:00-08:00.

    These tasks are configured to run hidden, even when the computer is idle, without network connectivity, and with no execution time limits.

    The malware deploys legitimate “OpenSSH for Windows” binaries compiled on December 13, 2023, including githubdesktop.exe and googlemaps.exe as SSH daemons, along with ssh-shellhost.exe for interactive sessions and libcrypto.dll for encryption functions.

    Configuration files specify non-standard port 20321 for SSH services, disable password authentication, and require public key authentication using files with obfuscated names like redundantOptimizingInstanceVariableLogging and incrementalMergingIncrementalImmutableProtocol.

    The campaign exposes multiple services through Tor hidden services, including SSH on port 20322, SMB on port 11435, RDP on port 13893, and additional custom ports.

    Communication occurs through obfs4 pluggable transports using binaries named confluence.exe and rider.exe, which connect to bridge endpoints at 77.20.116.133:8080 and 156.67.24.239:33333.

    The malware generates identification beacons formatted as <username>:<onion-address>:3-yeeifyem and transmits them through the local Tor SOCKS listener on port 9050, waiting for the onion address yuknkap4im65njr3tlprnpqwj4h7aal4hrn2tdieg75rpp6fx25hqbyd.onion to become available before establishing persistent communication channels.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Operation SkyCloak Uses Powershell Tools and Hidden SSH Service to Unblock Traffic appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers at Tier Zero Security have released a specialised Beacon Object File (BOF) tool that exploits a critical weakness in Microsoft Teams cookie encryption, enabling attackers to steal user chat messages and other sensitive communications. The vulnerability stems from how Microsoft Teams handles cookie encryption compared to modern Chromium-based browsers. While contemporary browsers like […]

    The post New BOF Tool Bypasses Microsoft Teams Cookie Encryption to Steal User Chats appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶