• BitLocker keys without PIN protection, where attackers could exploit stolen laptops, researchers now delve into PIN-secured setups, targeting insider threats seeking SYSTEM-level access.

    This technique involves intercepting TPM communications via SPI bus analysis, revealing how even PIN-hardened BitLocker can yield to physical probing with known credentials.

    While no true bypass occurs, the method unlocks drives efficiently, highlighting persistent hardware vulnerabilities in enterprise encryption.

    Unraveling PIN-Protected BitLocker Mechanics

    Unlike TPM-only configurations that auto-unseal keys during boot, PIN-protected BitLocker layers additional safeguards.

    The Full Volume Encryption Key (FVEK) remains on the disk, encrypted by the Volume Master Key (VMK), but the VMK shifts to disk storage, protected by an Intermediate Key (IK).

    This IK, in turn, is TPM-encrypted using a Stretched Key (SK) derived from the user’s PIN, ensuring dual authentication: unsealing the IK and deriving decryption keys.

    PIN Protected
    PIN Protected

    This design thwarts brute-force attacks online via TPM lockouts, offline through randomized intermediates, but assumes secure hardware isolation.

    Experiments by Guillaume Quéré on an HP ProBook 440 G1 revealed a discrete Nuvoton NPCT760HABYX TPM communicating over SPI, a shared bus easily tapped via nearby MX25U memory chip test points.

    No soldering needed; just pins for clock, MOSI, and MISO lines, with CS optional for modern analyzers. Signal capture began pre-PIN entry using a DSLogic Plus analyzer, but quirks emerged: the clock idled high at intermediate voltages, distorting readings.

    A simple 4.7kΩ pulldown resistor grounded it, stabilizing the 33MHz SPI bus. Yet, TIS protocol anomalies persisted double bytes per packet, likely from slow acknowledgments, crippling automated decoders.

    Manual decoding proved essential. Filtering raw MOSI/MISO data with regexes stripped TIS wrappers (e.g., “00 D4 00 18 XX” for master requests), isolating TPM2.0 commands via headers like “80 01” (plain) or “80 02” (authenticated).

    Captures, starting at PIN prompt, narrowed to key exchanges: ReadPublic for TPM keys, Load for objects, GetRandom for nonces, StartAuthSession, PolicyAuthValue/PCR for policies, and crucially, Unseal for the IK blob.

    Interestingly, PINs never transmit to the TPM; they influence only the Unseal HMAC, an undocumented nuance verified across good/bad PIN trials.

    The Unseal response holds the encrypted IK, differing from non-PIN blobs due to PIN-derived SK. Deriving SK involves UTF-16LE PIN hashing, doubled SHA-256, then 1,048,576 rounds with disk salt compute-intensive but feasible.

    AES-CCM decryption with SK yields the IK, which unlocks the VMK from disk metadata via tools like dislocker.

    For the ProBook, Python code stretched the PIN “67851922” against salt “c36496f98842c6fd9841de2ea743d5cf”, decrypting the 44-byte IK payload.

    Dislocker then mounted the volume read-write, enabling backdoors like overwriting sethc.exe with cmd.exe for Shift+5 privilege escalation.

    Automated scripts, such as SPITkey.py or tpm_sniffing_pin.py, streamline this, parsing volumes directly or leveraging dislocker outputs.

    This attack underscores discrete TPMs’ false security; fTPM or PIN-plus-startup keys mitigate sniffing, though insiders remain risks. Enterprises should audit configurations beyond defaults.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity professionals are facing a nightmare scenario. Attackers aren’t using basic methods anymore – they’re deploying AI-powered threats that evolve faster than most security teams can respond.  Here’s the reality check: The NDR market is exploding to $5.82 billion by 2030, growing at 9.6% annually. This growth isn’t just hype. Organizations desperately need better network visibility as attack surfaces multiply exponentially.   We analyzed hundreds […]

    The post Top 5 Network Detection and Response (NDR) Tools to Watch in 2026  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated malware operation has emerged from Brazil, leveraging advanced steganographic techniques to conceal malicious payloads within seemingly harmless image files.

    The Caminho loader, active since at least March 2025, represents a growing threat to organizations across South America, Africa, and Eastern Europe, delivering diverse malware families including REMCOS RAT, XWorm, and Katz Stealer through an intricate multi-stage infection chain.

    The campaign begins with carefully crafted spear-phishing emails containing compressed archives that house JavaScript or VBScript files.

    These initial scripts use business-themed social engineering lures such as fake invoices and quotation requests to trick recipients into executing the malicious code.

    Upon execution, the script retrieves an obfuscated PowerShell payload from Pastebin-style services, which then downloads steganographic images from archive.org, a legitimate non-profit digital archive platform.

    The use of trusted platforms allows the malware to evade traditional security controls that rely on domain reputation and blocklists.

    Arctic Wolf analysts identified the loader’s most notable innovation in its use of Least Significant Bit (LSB) steganography to extract concealed .NET assemblies from image files.

    The PowerShell script searches for a specific BMP header signature within downloaded JPG or PNG files, then iterates through every pixel to extract RGB color channel values that encode the hidden binary data.

    The first four bytes specify the payload length, followed by the Base64-encoded malicious assembly.

    Analysis of 71 Caminho loader samples reveals consistent Portuguese-language code throughout, with variable names like “caminho” (path), “persitencia” (persistence), and “minutos” (minutes), strongly indicating Brazilian origins.

    The extracted loader operates entirely in memory, implementing extensive anti-analysis checks including virtual machine detection, sandbox environment identification, and debugging tool recognition.

    Phishing attack using steganography (Source – Arctic Wolf)

    The malware validates payload architecture before injecting the final payload into legitimate Windows processes such as calc.exe, establishing persistence through scheduled tasks that re-execute the infection chain every minute.

    This fileless execution approach defeats traditional file-based detection mechanisms and leaves minimal forensic artifacts on compromised systems.

    Loader-as-a-Service Business Model

    The operational patterns observed across multiple campaigns strongly suggest Caminho functions as a Loader-as-a-Service operation rather than a single threat actor’s tool.

    The standardized invocation interface accepts arbitrary payload URLs as arguments, enabling multiple customers to deploy different malware families using the same delivery infrastructure.

    Infrastructure analysis reveals the reuse of identical steganographic images across campaigns with varying final payloads, confirming the modular service architecture.

    The diverse payload delivery includes REMCOS RAT deployed via bulletproof hosting command-and-control infrastructure on AS214943 Railnet LLC, XWorm delivered from malicious domains, and Katz Stealer credential-harvesting malware.

    Confirmed victims span Brazil, South Africa, Ukraine, and Poland, with geographic expansion coinciding with the adoption of steganographic techniques in June 2025.

    The campaign demonstrates operational maturity through continuous infrastructure rotation, obfuscation updates, and the abuse of legitimate services for malicious hosting.

    Code snippet demonstrating the LSB extraction technique:-

    $plectonephric = [Drawing.Bitmap]::FromStream($biological);
    $muffin = New-Object Collections.Generic.List[Byte];
    for ($tazias = 0; $tazias -lt $plectonephric.Height; $tazias++) {
        for ($lidger = 0; $lidger -lt $plectonephric.Width; $lidger++) {
            $elayle = $plectonephric.GetPixel($lidger, $tazias);
            $muffin. Add($elayle.R);
            $muffin. Add($elayle.G);
            $muffin. Add($elayle.B)
        }
    };

    Organizations should implement layered security controls including blocking JavaScript and VBScript files within archive attachments, deploying email sandboxing that executes scripts and follows network connections, monitoring PowerShell with encoded commands, and enabling memory scanning capabilities to detect in-memory payloads.

    The extensive use of legitimate platforms like archive.org presents unique challenges for traditional perimeter defenses, as blanket blocking may impact legitimate business operations while selective URL blocking proves ineffective against the operators’ demonstrated infrastructure rotation capabilities.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Caminho Malware Loader Uses LSB Steganography and to Hide .NET Payloads Within Image Files appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The rapid migration to cloud environments – AWS, Azure, and GCP being the dominant players continues unabated in 2025. While cloud providers offer robust underlying infrastructure security, the shared responsibility model dictates that securing everything in the cloud, from configurations to applications and data, remains the customer’s responsibility. This nuanced reality makes cloud penetration testing […]

    The post Top 10 Best Cloud Penetration Testing Providers in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • As digital attack surfaces expand with rapid innovation in cloud, AI, and Web3 technologies, organizations increasingly rely on the collective intelligence of ethical hackers to identify vulnerabilities before malicious actors can exploit them. These platforms facilitate a structured, incentivized approach to security testing, offering unparalleled scalability, diversity of expertise, and cost-effectiveness compared to traditional security […]

    The post Top 10 Best Bug Bounty Platforms in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation of a critical remote code execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS).

    Tracked as CVE-2025-59287, the flaw carries a CVSS score of 9.8, allowing unauthenticated attackers to execute arbitrary code with system-level privileges over a network, potentially compromising entire IT infrastructures.

    This vulnerability, which stems from unsafe deserialization of untrusted data in WSUS, was partially addressed in Microsoft’s October Patch Tuesday but required an urgent out-of-band update released on October 23, 2025, after the initial fix proved insufficient.​

    The threat is escalating rapidly, with security firms reporting real-world attacks as early as October 24, 2025. Dutch cybersecurity company Eye Security detected exploitation attempts at 06:55 a.m. UTC that day, involving a Base64-encoded .NET payload designed to evade logging by executing commands via a custom request header named ‘aaaa’.

    WSUS reconnaissance
    WSUS reconnaissance (Source: Eye Security)

    Proof-of-concept (PoC) exploits, released just days prior by researcher Batuhan Er of HawkTrace, have accelerated malicious activity, enabling attackers to target WSUS servers running under the SYSTEM account.

    CISA’s addition of CVE-2025-59287 to its Known Exploited Vulnerabilities (KEV) Catalog mandates federal agencies to patch by November 14, 2025, underscoring the flaw’s high exploitability and low complexity; no user interaction or authentication is needed.​

    Organizations relying on WSUS for centralized patch management face severe dangers, as a successful breach could let hackers distribute poisoned updates across connected devices.

    The following are the affected systems:

    Affected VersionPatch KB NumberNotes
    Windows Server 2012KB5070887Standard and Server Core
    Windows Server 2012 R2KB5070886Standard and Server Core
    Windows Server 2016KB5070882Standard and Server Core
    Windows Server 2019KB5070883Standard and Server Core
    Windows Server 2022KB5070884Standard and Server Core
    Windows Server 2022, 23H2 EditionKB5070879Server Core installation
    Windows Server 2025KB5070881Standard and Server Core

    The vulnerability exploits a legacy serialization mechanism in the GetCookie() endpoint, where encrypted AuthorizationCookie objects are decrypted using AES-128-CBC and deserialized via BinaryFormatter without type validation, opening the door to full system takeover.

    Security researchers from CODE WHITE GmbH, including Markus Wulftange, and independent experts MEOW and f7d8c52bec79e42795cf15888b85cbad, first identified the issue, crediting their work in Microsoft’s advisory.​

    Microsoft has confirmed that servers without the WSUS Server Role enabled remain unaffected, but for those with it active, especially those exposing ports 8530 or 8531 to the internet, the risks are acute.

    Early indicators suggest attackers are leveraging the PoC to drop malware, with potential for widespread lateral movement in enterprise environments.

    Mitigations

    CISA and Microsoft recommend swift action to neutralize the threat. First, identify vulnerable servers by scanning for those with the WSUS role enabled and open ports 8530/8531.

    Apply the October 23 out-of-band patch immediately, then reboot to ensure full mitigation. Delaying this could expose networks to unauthenticated RCE.

    For those unable to patch right away, temporary workarounds include disabling the WSUS role or blocking inbound traffic to the affected ports at the host firewall; these should not be reversed until the update is installed.​

    Beyond WSUS servers, organizations must update all remaining Windows Servers and reboot them post-installation. Monitoring tools should be deployed to detect anomalous WSUS traffic, such as unusual GetCookie() requests or Base64 payloads.

    Experts warn that unpatched systems could serve as entry points for advanced persistent threats, amplifying damage in hybrid cloud setups.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Organizations are not just adopting cloud; they are embracing multi-cloud and hybrid strategies as the new norm, distributing workloads across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) to optimize for cost, performance, and resilience. While the cloud offers unparalleled agility and innovation, it also introduces a unique set of security challenges. […]

    The post Top 10 Best Cloud Security Companies For AWS, Azure And GCP in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based obfuscation to evade traditional security detection mechanisms.

    The attack represents an evolution in obfuscation techniques, where threat actors fragment malicious code across multiple HTTP cookies and dynamically reconstruct executable functions at runtime.

    This approach makes static analysis significantly more challenging, as the malicious intent remains hidden until all cookie components are assembled and executed.

    The malware has been detected over 30,000 times in September 2025 alone, demonstrating its widespread deployment and continued effectiveness against vulnerable websites.

    The attack vector primarily targets PHP-based web applications, particularly WordPress installations, by injecting backdoor scripts that accept commands through specially crafted cookies.

    Unlike traditional malware that embeds complete malicious payloads within files, this campaign distributes function names and encoded parameters across numbered cookie indices.

    Once deployed, the malware waits for specific cookie configurations before activating, requiring attackers to send precisely structured requests containing all necessary components.

    This conditional execution serves dual purposes: evading automated security scans that may trigger the script without proper cookies, and preventing unauthorized access by other malicious actors who discover the backdoor.

    Wordfence researchers identified multiple variants of this malware family during routine incident response operations, adding samples to their threat intelligence database containing over 4.4 million unique malicious signatures.

    The detection came through analysis of compromised sites where conventional signature-based scanning initially struggled to flag the heavily obfuscated code.

    Analysis revealed that while individual variants differ in implementation details, they share core characteristics including dense obfuscation, excessive array lookups, and deliberate cookie validation checks that act as authentication mechanisms for attackers.

    Technical Implementation and Code Execution Chain

    The malware operates through a multi-stage execution chain that leverages PHP’s variable function capability, where appending parentheses to any variable causes PHP to execute a function matching the variable’s string value.

    In examined samples, the script begins by storing the $_COOKIE superglobal into a local variable and validating that exactly 11 cookies are present, with one containing the specific string “array11”.

    The malware then concatenates cookie values to reconstruct function names, such as combining cookies containing “base64_” and “decode” to form the complete base64_decode function name.

    The execution chain demonstrates sophisticated layering:-

    $locale[79] = $locale[79] . $locale[94];
    $locale[23] = $locale[79]($locale[23]);

    This reconstructs base64_decode, then decodes another cookie containing “Y3JlYXRlX2Z1bmN0aW9u” to produce “create_function”. The malware subsequently uses create_function with attacker-controlled parameters to generate arbitrary executable code.

    Later variants employ string replacement techniques, transforming obfuscated strings like “basx649fxcofx” into “base64_decode” by replacing characters ‘x’, ‘f’, and ‘9’ with ‘e’, ‘d’, and ‘_’ respectively.

    This multi-layered approach defeats pattern-matching detection while maintaining full remote code execution capabilities through serialized payloads delivered via cookie parameters.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics and fraudulent financial aid promises.

    The campaign, dubbed “Vulnerability Vultures,” primarily focuses on older adults who represent lucrative targets for threat actors.

    According to the FBI’s Internet Crime Complaint Center, the 60-plus age group filed the highest number of complaints in 2024, with losses totaling $4.8 billion, nearly double the next highest category.

    Federal Trade Commission data further reveals that adults 70 years or older experience significantly higher median dollar losses compared to younger demographics.

    The scammers leverage major social media platforms as initial contact points, subsequently redirecting victims to fraudulent websites or private messaging channels where they harvest financial details and sensitive personal information.

    These operations demonstrate geographic diversity, with evidence suggesting operators based in Nigeria, South Asia, and the United States.

    The threat actors deliberately target individuals susceptible to offers of physical or financial benefits, including both older adults and previous scam victims who may be seeking restitution.

    Graphika analysts identified that the cross-platform structure of these scam operations enables scalability, anonymity, and effective evasion of platform moderation measures.

    The threat actors deploy inauthentic personas and manipulated media to impersonate trusted figures, institutions, and brands such as the FBI and established news organizations.

    By incorporating AI-generated audio, cloned websites, and repurposed authentic content, the scammers create convincing simulations of legitimacy and authority that deceive even cautious victims.

    Attack Methodology and Social Engineering Tactics

    The operations follow a consistent three-stage attack pattern: building trust through authoritative impersonation, ushering victims to off-platform communication channels, and extracting personal or financial data through registration forms for non-existent relief programs.

    These schemes operate at high volume, deploying identical short-lived advertisements, AI automation, paid promotion, and disposable accounts that maintain operational persistence despite ongoing enforcement efforts from platform providers and law enforcement agencies.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In the rapidly escalating cyber threat landscape of 2025, where attackers are more sophisticated and persistent than ever, a reactive security posture is no longer sufficient. Organizations worldwide are grappling with an expanding attack surface, the proliferation of advanced persistent threats (APTs), and the constant emergence of new zero-day vulnerabilities. Traditional security assessments, such as […]

    The post Top 10 Best Breach And Attack Simulation (BAS) Vendors in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶