-
Cybersecurity researchers have flagged a new security issue in agentic web browsers like OpenAI ChatGPT Atlas that exposes underlying artificial intelligence (AI) models to context poisoning attacks. In the attack devised by AI security company SPLX, a bad actor can set up websites that serve different content to browsers and AI crawlers run by ChatGPT and Perplexity. The technique has been
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The npm ecosystem faces a sophisticated new threat as ten malicious packages have emerged, each designed to automatically execute during installation and deploy a comprehensive credential harvesting operation.
This attack campaign represents a significant evolution in supply chain compromises, combining multiple layers of obfuscation with cross-platform compatibility to target developers across Windows, Linux, and macOS environments.
The malware employs typosquatting techniques to mimic popular JavaScript libraries, making detection particularly challenging for unsuspecting developers.
Published on July 4, 2025, these packages have remained active for over four months, accumulating more than 9,900 downloads collectively before Socket.dev analysts identified their malicious nature.
The threat actor, operating under the alias andrew_r1 with the email address parvlhonor@gmx[.]com, crafted each package to closely resemble legitimate libraries including discord.js, ethers.js, TypeScript, and other commonly used development dependencies.
This typosquatting approach capitalizes on common spelling mistakes and variations that developers might inadvertently introduce when installing packages.
Each malicious package leverages npm’s postinstall lifecycle hook to execute immediately upon installation, launching in a new terminal window to avoid detection during the installation process.
The malware’s design ensures it runs independently of the npm install command, minimizing the likelihood that developers will notice unusual activity.
The packages include sophisticated platform detection capabilities, automatically identifying the victim’s operating system and deploying the appropriate execution method for Windows command prompts, Linux terminals, or macOS Terminal.app.
The campaign demonstrates advanced technical capabilities through its implementation of four distinct obfuscation layers.
These include a self-decoding eval wrapper that prevents cursory code inspection, XOR decryption with dynamically generated keys based on the decoder function’s source code, URL encoding of payload strings, and control flow obfuscation using switch-case state machines with mixed hexadecimal and octal arithmetic.
This multi-layered approach makes static analysis extremely difficult without full JavaScript evaluation.
Upon successful installation, the malware presents victims with a fake CAPTCHA prompt designed as a social engineering component.
This element serves multiple purposes: making the package appear legitimate, delaying execution to obscure its connection to npm install, requiring user interaction that may bypass automated security scans, and convincing developers they are interacting with a reputable security measure.
Multi-Stage Infection and Credential Harvesting Mechanism
The malware’s infection mechanism operates through a carefully orchestrated multi-stage process that combines deception with sophisticated data extraction capabilities.
Following the fake CAPTCHA presentation, the system performs IP fingerprinting by sending the victim’s address to http://195[.]133[.]79[.]43/get_current_ip, enabling the threat actor to log installations, potentially filter by geographical location, and track security researcher activity.
Once the victim interacts with the CAPTCHA prompt, the malware automatically downloads and executes a 24MB PyInstaller-packaged binary called data_extracter.
.webp)
Wireshark capture showing HTTP GET request to 195[.]133[.]79[.]43 get_current_ip (Source – Socket.dev) This cross-platform information stealer targets multiple credential storage mechanisms across all major operating systems.
The binary includes platform-specific implementations for Linux SecretService D-Bus API and GNOME Keyring, macOS Keychain Services API, and Windows Credential Manager, ensuring comprehensive credential extraction regardless of the victim’s environment.
// Detects platform and spawns new terminal window const platform = os.platform(); if (platform == 'win32') { exec('start cmd /k "node app.js"'); } else if (platform == 'linux') { exec('gnome-terminal -- bash -c "node app.js"', (error) => { if (error) exec('x-terminal-emulator -e "bash -c \'node app.js\'"'); }); } else if (platform == 'Darwin') { exec(`osascript -e 'tell app "Terminal" do script "node '$(pwd)/app.js'" end tell'`, () => {}); }The data_extracter binary performs extensive file system reconnaissance, systematically scanning for credential stores in browser profile directories, SSH key directories, AWS credentials files, Kubernetes configuration files, and Docker registry credentials.
It targets SQLite databases containing browser cookies and passwords, JSON configuration files with API keys, SSH private keys for Git authentication, and OAuth/JWT tokens that provide long-term access to cloud services and development platforms.
This comprehensive approach ensures the attacker captures not only interactive credentials but also service account credentials and automation keys used in modern development workflows.
Upon completion of credential harvesting, the malware packages all extracted data into a compressed archive that is transmitted back to the threat actor’s command and control server at 195[.]133[.]79[.]43.
The stolen credentials provide immediate access to corporate email systems, cloud infrastructure, internal networks, production databases, and authenticated web applications, while session cookies enable account takeover without triggering password reset notifications.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A public exploit code demonstrating how attackers could exploit CVE-2025-40778, a critical vulnerability in BIND 9 that enables DNS cache poisoning.
The Internet Systems Consortium (ISC) initially disclosed this flaw on October 22, revealing a dangerous weakness in the world’s most widely used DNS software.
The vulnerability allows remote, unauthenticated attackers to inject forged DNS records into resolver caches, potentially redirecting millions of users to malicious infrastructure without any user interaction or special network access.
DNS Cache Poisoning Vulnerability Bypasses
The flaw affects supported BIND 9 versions ranging from 9.11.0 through 9.21.14, impacting any resolver performing recursive queries. Fortunately, authoritative-only servers remain unaffected by this issue.
The vulnerability exploits BIND’s handling of unsolicited resource records, allowing attackers to bypass modern DNS security defenses that were implemented following the infamous 2008 Kaminsky vulnerability.
That earlier flaw led to randomized query IDs and source ports, protections that CVE-2025-40778 circumvents entirely.
CVE Details Information CVE ID CVE-2025-40778 Affected Versions BIND 9.11.0 through 9.21.12 Vulnerability Type DNS Cache Poisoning CVSS v3.1 Score 8.6 (High) By crafting specially formatted DNS responses, attackers can poison resolver caches and redirect legitimate traffic to attacker-controlled servers.
The attack carries a CVSS 3.1 severity score of 8.6, classified as high severity, reflecting its potential for widespread impact across internet infrastructure.
The consequences of successful exploitation could be severe. Attackers could redirect all DNS traffic from an affected resolver to malicious endpoints, enabling phishing campaigns, malware distribution, and traffic interception.
Given BIND’s ubiquitous role in internet operations, a single compromised resolver could affect thousands or millions of downstream users and systems. ISC has released patched versions addressing this vulnerability: version 9.18.41, 9.20.15, and 9.21.14.
The company responsible coordinated disclosure through a responsible timeline, issuing early notifications on October 8, revising patch details on October 15, and finalizing disclosure on October 22. Unfortunately, no known workarounds exist for this vulnerability, making immediate patching the only effective mitigation strategy.
As of October 28, no active exploitation in the wild has been confirmed, though the public release of exploit code significantly increases the likelihood of opportunistic attacks.
Security administrators managing recursive DNS resolvers should prioritize immediate upgrades to patched versions matching their deployed BIND installations.
Organizations should implement Domain Name System Security Extensions (DNSSEC) where feasible and conduct comprehensive audits of resolver configurations to ensure recursive queries are disabled on authoritative-only servers.
Network monitoring for anomalous DNS behavior and rapid deployment of security patches remain critical for minimizing exposure to this threat.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft Exchange servers in Germany are still running without security updates, just weeks after the official end of support for key versions.
The Federal Office for Information Security (BSI) issued a stark warning on October 28, 2025, revealing that 92% of approximately 33,000 known on-premise Exchange servers with internet-exposed Outlook Web Access (OWA) are running version 2019 or older.
This vulnerability leaves critical infrastructure across sectors such as healthcare, education, and public administration at heightened risk of cyberattacks.
The BSI’s analysis reveals a troubling picture of widespread non-compliance with end-of-support deadlines.
Support for Exchange Server 2016 and 2019 officially ended on October 14, 2025, meaning Microsoft will no longer provide patches for bugs or security flaws.
Of the monitored servers, over 45% run version 2019 and about 40% use 2016, with only a fraction, around 2,500, upgraded to the supported Exchange Server Subscription Edition (SE).
These outdated systems are predominantly found in hospitals, doctors’ offices, schools, universities, social services, law firms, utilities, and municipal governments, amplifying the potential for widespread disruption.
The BSI’s CERT-Bund team has long notified operators about older versions like 2010 and 2013, and now extends alerts to 2016 and 2019 instances exposed online.
Looming Risks Of Unpatched Systems
The implications are severe, as any new critical vulnerability similar to past exploits like ProxyLogon or Hafnium cannot be remediated, potentially forcing servers offline and crippling email communications.
Compromised Exchange servers often lead to full network breaches due to flat architectures and poor segmentation, enabling data exfiltration, ransomware deployment, and prolonged outages.
Historical incidents underscore this danger; in 2021, thousands of global Exchange servers, including over 20,000 in Germany, fell victim to state-sponsored hacks exploiting unpatched flaws.
Moreover, processing personal data on these servers violates the General Data Protection Regulation (GDPR), exposing organizations to legal penalties.
To avert disaster, the BSI urges immediate upgrades to Exchange Server SE or migration to cloud alternatives like Exchange Online.
Microsoft’s Extended Security Updates (ESU) program offers paid patches for critical issues until April 14, 2026, but this merely delays the inevitable at additional cost.
Beyond upgrades, the agency recommends restricting OWA access via IP whitelisting or VPNs, avoiding direct internet exposure, and consulting BSI’s IT-Grundschutz guidelines for email security.
With attackers constantly probing for weaknesses, German organizations must prioritize these steps to safeguard operations and data integrity in an increasingly hostile digital environment.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Thousands of Exchange Servers in Germany Still Running with Out-of-Support Versions appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The threat landscape continues to evolve as Gunra ransomware emerged in April 2025, establishing itself as a significant threat to organizations worldwide.
This dual-platform attack group has demonstrated a systematic approach to compromising both Windows and Linux environments, making their campaign one of the more noteworthy distributed ransomware operations in recent months.
Organizations across multiple industries and sectors have reported successful infection attempts, with damage cases extending into the Asia-Pacific region, including South Korea.
Gunra operates with a familiar yet effective ransomware model: encrypt critical files on infected systems, exfiltrate sensitive data from compromised organizations, and demand ransom payments with threats of public disclosure if demands are not met.
What distinguishes Gunra from other ransomware operators is its deliberate development of platform-specific variants. The group distributes their malware in two distinct formats: executable files for Windows environments and ELF binaries for Linux systems.
.webp)
Encryption key storage method according to the –store argument value (Source – ASEC) This strategic approach allows them to maximize their attack surface and penetrate diverse infrastructure environments that many organizations maintain.
ASEC analysts identified that the Gunra ransomware operates through a command-line interface requiring multiple parameters to execute its encryption routines.
The malware performs validity checks on provided arguments before initializing its main execution routine, ensuring all necessary parameters are present and valid.
This structured approach demonstrates the sophistication and careful engineering behind the campaign.
Cryptographic Weakness and Decryption Vulnerability
The technical analysis reveals a critical vulnerability in the ELF version of Gunra ransomware that fundamentally weakens its encryption scheme.
ASEC researchers discovered that the malware utilizes the ChaCha20 encryption algorithm with a cryptographically insecure random number generation function.
The vulnerability stems from the seed generation process, which relies on the time() function to create predictable values for the rand() function.
The flaw becomes apparent when examining how the 32-byte encryption key and 12-byte nonce values are generated. When multiple encryption iterations occur within extremely short time intervals, the seed value remains identical across different execution threads.
This causes the rand() function to produce identical byte sequences, resulting in encryption keys and nonce arrays containing repeated byte patterns.
Consequently, the ChaCha20 keys become cryptographically weak and susceptible to brute-force attacks across 256 possible byte values.
.webp)
The ChaCha20 encryption algorithm (Source – ASEC) This cryptographic oversight enables file decryption with high probability using brute-force techniques based on byte values ranging from 0x00 to 0xFF.
In stark contrast, the Windows EXE version implements ChaCha8 encryption with key generation through the CryptGenRandom() API, employing cryptographically secure random number generation that makes decryption virtually impossible.
This disparity between implementations highlights the varying security postures across different platforms.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post Gunra Ransomware Leveraging Attacking Windows and Linux Systems with Two Encryption Methods appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A critical security vulnerability was discovered when a complete 4-terabyte SQL Server backup belonging to Ernst & Young (EY), one of the world’s Big Four accounting firms, was found publicly accessible on Microsoft Azure. The exposure was identified by security researchers during routine internet mapping operations and has since been remediated following responsible disclosure protocols. […]
The post Massive 4TB EY Database Backup Found Publicly Accessible on Azure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Russian-linked attackers have intensified their targeting of Ukrainian organizations through sophisticated intrusions that rely heavily on legitimate Windows tools rather than malware. The attackers demonstrated remarkable restraint in their malware deployment, instead leveraging living-off-the-land tactics and dual-use tools to evade detection while accomplishing their objectives. A recent investigation by our Threat Hunter Team revealed two […]
The post Russian Hackers Target Government with Stealthy “Living-Off-the-Land” Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In response to escalating threats of credential theft, Google, through its Mandiant cybersecurity division, has unveiled a detailed guide to help defenders monitor and secure privileged accounts across modern IT environments.
This resource emphasizes practical strategies to mitigate risks posed by stolen credentials, which accounted for 16% of intrusions in 2024, according to Mandiant’s M-Trends report.
As cloud migrations expand attack surfaces with human and non-human identities, the guide positions privileged access management (PAM) as a cornerstone of organizational resilience.
The guide highlights how adversaries increasingly exploit privileged accounts for initial access, lateral movement, and mission completion, often via infostealer malware or social engineering enhanced by AI.
Stolen credentials enable breaches with a median dwell time of 11 days, underscoring the need for an assume-breach mindset.
Google’s Guide for Defenders
Mandiant structures its recommendations around three pillars: prevention through securing access pathways, detection via visibility engineering, and response with rapid remediation tactics.
Prevention starts with defining privileged accounts broadly, encompassing service accounts, API keys, and developers’ cloud access beyond traditional domain admins.
It advocates tiering accounts by impact (T0 for crown jewels like domain controllers, T1 for core platforms, T2 for workstations) and mapping dependencies like jump servers.
Organizations are urged to advance PAM maturity from uninitiated (manual, spreadsheet-based tracking) to an iterative, automated, analytics-driven approach.
Key controls include multifactor authentication (MFA) on all admin paths, just-in-time/just-enough administration (JIT/JEA), and privileged access workstations (PAWs) on segmented networks.
Dedicated PAM tools like CyberArk or Google’s own Privileged Access Manager are recommended for vaulting credentials, enforcing rotations, and session recording.
For detection, the guide stresses high-fidelity monitoring in tools like Google SecOps, distinguishing privileged anomalies from general IAM abuse through behavioral analytics and machine learning.
Specific hunts target brute-force on Tier-0 accounts, GPO modifications, and service account deviations. In incidents, immediate isolation network pulls, token revocation pairs with coordinated credential resets via PAM.
Remediation involves enterprise-wide password rotations and forensics on attack paths, including malware scans on developer systems. Recovery planning covers hardening virtualization (e.g., ESXi Lockdown Mode) and backups with immutable storage.
By integrating SoD, zero-standing privileges, and automated responses, the guide equips defenders to shrink blast radii and comply with standards like NIST and PCI DSS.
Released amid rising insider and third-party risks, this framework empowers security teams to protect the “keys to the kingdom” effectively.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Google Unveils Guide for Defenders to Monitor Privileged User Accounts appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Google has released comprehensive guidance on protecting privileged accounts, recognizing that stolen credentials have become one of the most dangerous attack vectors facing modern organizations. The new recommendations address how attackers increasingly exploit these “keys to the kingdom” to breach sensitive systems and steal valuable data. According to recent threat intelligence, stolen credentials now rank […]
The post Google Publishes New Guide to Help Defenders Monitor Privileged Accounts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new remote access trojan called Atroposia has emerged as one of the most concerning threats in the cybercriminal underground, offering an unprecedented combination of stealth capabilities and attack features.
This modular malware operates as a turnkey criminal toolkit designed specifically to lower the technical barrier for threat actors of varying skill levels.
Priced aggressively at approximately $200 monthly or $900 for six months, Atroposia democratizes sophisticated cyberattacks in ways previously reserved for advanced persistent threat groups.
.webp)
Atroposia portal (Source – Varonis) The malware represents a troubling trend in how modern cybercriminals bundle multiple offensive capabilities into user-friendly platforms.
Similar to contemporaneous tools like SpamGPT and MatrixPDF, Atroposia packages hidden remote desktop takeover, credential harvesting, cryptocurrency wallet theft, DNS hijacking, and vulnerability scanning alongside encrypted command-and-control communications.
Its intuitive control panel and plugin builder architecture mean even operators with minimal technical expertise can orchestrate complex intrusions against enterprise environments.
The threat landscape shifted notably when Varonis researchers identified Atroposia circulating across underground forums.
Varonis analysts noted the malware automatically escalates privileges through User Access Control bypass mechanisms and installs multiple persistence techniques to maintain access across system reboots.
These capabilities allow attackers to blend seamlessly into compromised systems, evade antivirus software, and maintain long-term presence without triggering security alerts.
Hidden Remote Desktop Access and System Persistence
Atroposia’s most insidious feature centers on its hidden remote desktop protocol implementation, branded as HRDP Connect.
.webp)
Atroposia key features (Source – Varonis) This functionality spawns covert desktop sessions in the background, creating invisible shadow logins that grant attackers complete system interaction capabilities.
When attackers exploit this feature, victims see no on-screen indication of remote control, allowing intruders to surveil activities, access sensitive documents, manipulate workflows, and piggyback on authenticated sessions without detection.
The legitimate user remains entirely unaware of the intrusion occurring in real time.
The hidden RDP capability bypasses traditional remote access monitoring systems since it doesn’t generate standard remote desktop notifications or logged-in user prompts.
Attackers can conduct espionage and data theft activities while operating under the guise of legitimate user sessions.
Combined with Atroposia’s dedicated file manager providing complete remote file system access, operators can exfiltrate sensitive data through fileless techniques that minimize on-disk footprints and evade data loss prevention systems.
The malware’s Grabber module can automatically hunt files by extension or keyword, compress them into password-protected archives, and extract data entirely in memory, leaving minimal forensic traces.
The emergence of Atroposia exemplifies how cybercrime continues evolving into a service industry where sophisticated attack capabilities no longer depend on threat actor expertise but rather financial access and market availability.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post New Atroposia RAT with Stealthy Remote Desktop, Vulnerability Scanner and Persistence Mechanisms appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


