• In 2025, the complexity of cyberattacks demands more than just a quick fix; it requires a deep dive into the digital footprint left by adversaries and a methodical approach to recovery. For organizations facing such threats, partnering with the Best DFIR Companies is crucial. These specialized firms offer a comprehensive suite of services, from initial […]

    The post Top 10 Best Digital Forensics And Incident Response (DFIR) Firms in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage operations targeting Linux-based systems of Indian military and defense organizations.

    The campaign, initially documented in July 2025 by CYFIRMA with activity traced back to June 2025, has evolved significantly with the development of a sophisticated Golang-based remote access trojan dubbed DeskRAT.

    This malware represents a notable escalation in the group’s technical capabilities, demonstrating their commitment to maintaining strategic cyber dominance against Indian defense interests.

    The attack campaign employs a deceptively simple yet effective multi-stage delivery mechanism that begins with phishing emails containing malicious ZIP archives.

    These archives are disguised with innocuous-sounding names such as “MoM_regarding_Defence_Sectors_by_Secy_Defence” to evade initial detection.

    Upon extraction, the archives reveal a DESKTOP file that masquerades as a legitimate PDF document, complete with a PDF icon to reinforce the deception.

    When executed by unsuspecting users, the file triggers a complex infection chain that ultimately establishes persistent remote access to compromised systems.

    Sekoia analysts identified and analyzed the evolution of this campaign through their threat detection systems, discovering new samples in August and September 2025 that revealed an updated infection chain.

    Infection chain leading to the installation of DeskRAT (Source – Sekoia)

    The researchers implemented multiple YARA rules to track the activity and found samples that were previously unknown to other security vendors, indicating the group’s efforts to stay ahead of conventional detection mechanisms.

    This discovery underscores the sophistication and evolving nature of TransparentTribe’s operations.

    The technical infrastructure supporting this campaign has also undergone refinement. Initial phishing emails directed targets to ZIP files hosted on legitimate cloud services such as Google Drive, but the operation has since shifted to dedicated staging servers.

    This evolution demonstrates operational security awareness and an attempt to avoid reliance on third-party platforms that could be more easily monitored or suspended by security teams.

    Deceptive Infection Mechanism Through Embedded Obfuscation

    The DESKTOP file employed in this campaign contains a particularly ingenious obfuscation technique that hides malicious Bash commands within thousands of lines of commented PNG image data.

    The actual [Desktop Entry] section containing the malware execution instructions is strategically placed between two massive blocks of PNG data, effectively concealing the payload from casual inspection.

    This layering technique exploits the fact that a typical user reviewing the file would encounter overwhelming amounts of image data before discovering the embedded commands.

    The Bash one-liner executed upon file activation orchestrates a sophisticated multi-stage payload delivery.

    The command first generates a unique filename in the /tmp/ directory using a timestamp, then downloads an encoded binary from the remote staging server using curl with specific error-handling flags.

    The downloaded content undergoes dual decoding: initial hexadecimal conversion using xxd, followed by Base64 decryption.

    Once decoded, the payload executes directly through eval, gaining immediate control of the system.

    Simultaneously, the infection chain launches Firefox to display a decoy PDF document hosted on the attacker’s server, creating the illusion of a legitimate document opening while the RAT silently establishes its presence.

    This coordinated execution provides social engineering cover for the malware installation.

    DeskRAT itself maintains command and control communications through WebSocket connections, enabling real-time interaction between the attackers and compromised systems.

    The malware’s Golang implementation provides cross-platform compatibility and enhanced persistence capabilities, making it particularly effective against the diverse Linux environments deployed throughout Indian military infrastructure.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • “When the new month flips over,” said a Defense Department civilian employee based in Germany, “I have no idea what I’m going to do.” 

    For civilian federal employees stationed overseas, the government shutdown—poised to enter its fourth week after a weekend of inactivity in Congress—is bringing a range of unique challenges. Among them: losing not just their pay but their various government-provided housing allowances and other stipends. 

    The Germany-based Army civilian had sufficient savings to pay his October rent, even though Defense employees abroad have not received their housing allowances since Sept. 22. The workers received pay through Sept. 30, the last day before the shutdown began, but their stipends cut off early. The employee, who requested anonymity to protect himself from retaliation, said he does not yet have a plan for paying his German landlord. 

    “I’ve been holding off,” the worker said. “I haven’t had that conversation with him yet.” He added he has not made the call in part because he is “not looking forward to it.” 

    President Trump has, without congressional authorization, shifted funds to ensure troops in uniform receive their pay on time. Civilians—both those furloughed and working through the shutdown, like the Army civilian—are now missing paychecks.

    Some Defense employees abroad have received letters from the department to share with landlords and others explaining the situation and that back pay is guaranteed. One such letter viewed by Government Executive said that employees would receive back by after the shutdown, though the Trump administration has publicly argued that such back pay is not guaranteed). Some workers said they received no guidance, while those who did said it does not always help. 

    “Our German landlords and German utility companies are not being very nice,” said another Defense civilian whose spouse is also a federal employee stationed with her in Germany. The creditors said, “This is a U.S. issue, not a German one,” she added. 

    The employees abroad also have fewer options than those based domestically might. Furloughed federal workers in the U.S. can apply for unemployment benefits. They have to repay them once they receive back pay, but it remains an option as an effective no-interest loan in the meantime. Employees stationed overseas said they did not have that option. Many federal workers have said they started working second jobs to make ends meet, but employees abroad said that is not an option given their visa status and, in some cases, their security clearances. 

    “Even if [we were] furloughed, we wouldn't be able to seek outside employment, since there would be prohibitions against that in the foreign countries in which we work,” said one foreign service officer who is working during the shutdown for the State Department. 

    That employee noted that even if they could work, they would not be able to given the full-time nature of their day job. The second Germany-based civilian similarly said both she and her spouse are working 10- to 12-hour days for the government, so they could not seek out part-time work. Her family is therefore without any income for as long as the shutdown lasts. 

    Most foreign service officers reside in government-owned or leased buildings and therefore do not receive allowances from State. Still, Rohit Nepal, an FSO and the American Foreign Service Association’s State Department vice president, noted that many of his colleagues are still waiting on significant reimbursements through travel vouchers that are not getting processed.

    Employees are also not receiving new travel orders or getting their belongings shipped in a timely manner, he said. Nepal said the difficulties inherent to moving internationally every few years means most FSO households have only one income, so the lack of paychecks hits harder. Employees overseas also do not have the same support network and, in many cases, charitable offerings, as those enduring the shutdown domestically. 

    In addition to housing and utility costs, employees abroad often receive a cost-of-living allowance that compensates them for the difference in the prices of goods and services where they are stationed compared to the United States. Others in dangerous locations receive hardship pay, as well as education allowances for the costs of educating children abroad. 

    None of those payments are being delivered, at least to Defense civilians. 

    An employee based in the Middle East who is furloughed said his last paycheck, which was missing the first few days of October and all of his allowances, was just 40% of its normal amount. He still plans to pay his November rent on time—he noted he has been carefully saving since President Trump came into office, given the disruption the chief executive has brought to the federal workforce writ large—but said most of his colleagues would simply not make any payment and hope for the best. 

    The civilian worker said he has not gone on any vacations this year or bought a new car to prepare for a situation like this one. He was hoping to be somewhere else than his current Middle East deployment by now, but his assignment has been extended three times due to the government-wide hiring freeze. 

    “It’s been stressful,” he said, adding that his options in navigating the shutdown have been particularly limited. “We’re overseas, what do we do?” 

    Kevin Hassett, Trump’s director of the National Economic Council, on Friday said federal employees should work with their agencies to avoid any personal financial hardship during the shutdown. 

    “We really urge the folks who are in that situation to talk to their supervisors because the supervisors have methods to help,” Hassett said. 

    The State Department, for example, has furnished a letter for employees to provide to financial institutions to explain why employees have not been paid. 

    “This lapse in appropriations is beyond our employees' control,” wrote Jason Evans, State’s undersecretary for management. “We appreciate your organization's understanding and flexibility toward State Department employees until this situation is resolved.” 

    Some employees said such letters have not been helpful, as foreign landlords either do not fully grasp the situation or are unmoved by their pleas. 

    Employees also expressed concern about the work that is not getting done. The furloughed Defense civilian said his team was preparing for a must-pass biennial inspection of their cyber operations, but he is no longer there to oversee that work. The State employee noted they cannot provide off-site services, meaning they cannot support passport acceptance events for Americans abroad to submit their passport applications and could lose transportation to visit U.S. citizens in foreign prisons.

    Nepal, the foreign service officer, said his colleagues will continue reporting to work because they believe in the mission, but that motivation is starting to wane. 

    “They believe in service, believe in representing the American people as best they can,” he said. “It’s times like this that it’s difficult to do that.” 

    The Germany-based Army worker said he and his kids are still eating, noting there are “many people worse off.” He has struggled to figure out what he will do if the shutdown continues, however. 

    “What’s my plan? I don’t know,” he said.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on digital gift card systems.

    The Jingle Thief campaign, orchestrated by financially motivated threat actors based in Morocco, has emerged as a notorious campaign exploiting seasonal vulnerabilities to steal and monetize gift cards at scale.

    By leveraging tailored phishing and smishing campaigns, the attackers set their sights on major retailers and large enterprises operating cloud-based infrastructures, particularly those reliant on Microsoft 365 and similar services.

    Their goal: compromise user credentials, gain unauthorized access, and exploit gift card systems during periods of heightened activity and reduced vigilance.

    The operation begins with carefully crafted phishing emails and SMS messages that entice victims into providing their login details via deceptive portals mimicking legitimate Microsoft 365 interfaces.

    These counterfeit sites, uniquely branded to mirror the targeted organization’s style, harvest credentials while evading routine detection.

    Attackers often send out these lures using self-hosted PHP mailer scripts running from compromised WordPress servers, effectively obscuring their own infrastructure.

    Once inside, they proceed with extensive reconnaissance, pivoting laterally through SharePoint and OneDrive accounts to locate internal documentation and gift card issuance workflows.

    Their sophistication lies not merely in the initial compromise but in their ability to remain undetected—sometimes for months—while orchestrating repeated fraud attempts across multiple gift card issuance applications.

    Palo Alto Networks analysts tracked the Jingle Thief campaign under cluster CLCRI1032, linking it to known threat entities such as Atlas Lion and STORM-0539.

    Their research uncovered advanced operational tactics focused on maintaining persistence and operational patience.

    Attacks observed in early 2025 saw over 60 user accounts compromised within a single global organization, with threat actors demonstrating adaptable methods to subvert defensive controls, including mailbox manipulation and identity infrastructure abuse.

    Jingle Thief phishing attack chain across Microsoft 365 (Source – Palo Alto Networks)

    The attack lifecycle showcases how initial access via phishing evolves toward long-term persistence through rogue device registration.

    Infection Mechanism: Persistence through Device Registration

    A striking element of the Jingle Thief campaign is its method of establishing persistent, malware-resistant access.

    After credential theft, threat actors exploit Microsoft Entra ID’s self-service and device enrollment features, registering attacker-controlled devices and rogue authenticator apps.

    This approach subverts multi-factor authentication (MFA), allowing them continuous access—even after password resets.

    The attackers have been observed silently enrolling smartphones using the native onboarding process:-

    # Example: Rogue Device Enrollment – Simulated Python workflow
    import requests
    url = "https://entra.microsoft.com/device/register"
    data = {"user_id": compromised_id, "device_info": attacker_device}
    requests.post(url, json=data)
    Device registration flow in Microsoft Entra ID (Source – Palo Alto Networks)

    This illustrating how the adversary leverages legitimate MFA onboarding to entrench in the environment, making detection extremely challenging.

    Through these advanced techniques, Jingle Thief attackers reliably evade conventional security controls, rendering typical remediation measures ineffective until full identification and infrastructure clean-up are achieved.

    Cybersecurity teams are urged to prioritize identity-based monitoring and behavioral anomaly detection, especially during festive seasons when such threats intensify.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Organizations face a relentless onslaught of highly targeted, evasive, and economically motivated cyber threats. To combat this, they are increasingly relying on Cyber Threat Intelligence Companies. To effectively combat this dynamic landscape, simply reacting to incidents is no longer sufficient. Proactive defense demands foresight, context, and a deep understanding of the adversary’s intent and capabilities. […]

    The post Top 10 Best Cyber Threat Intelligence Companies in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • As defense spending looks up in the U.S. and abroad, some defense firms are betting on “self-funded” prototypes. And while it’s not a new practice, there seems to be renewed emphasis with new-to-defense companies and some primes looking to preempt threats and programs of record. 

    Lockheed Martin CEO James Taiclet said the company is reaching the crescendo phase of a five-year shift in its research and development strategy that focuses more on corporate-level initiatives, such as the development of autonomous Black Hawks and space-based interceptors that could be used for the Trump administration’s proposed Golden Dome initiative. 

    “We are building prototypes, full-up operational prototypes. Not things in labs, not stuff on test stands. Things that will go into space or in the air or fly across a missile range. These are real devices that will work and that can be produced at scale. So the space-based interceptor is one we've been pursuing already. And that's all I can say about that,” Taiclet said Tuesday during the company’s earnings call. 

    Taiclet said the company has submitted proposals for space-based interceptors, but the goal is to build prototypes for the government that work and can be produced en masse alongside new entrants in defense tech. And by 2028, Lockheed wants to put on a “real on-orbit space-based interceptor demonstration,” Taiclet said. 

    “[W]e are actually building prototype vehicles to demonstrate to the government, perhaps alongside with the new entrants, you could look at it that way, where we can show them a working vehicle that we can produce at scale that they can rely on. We’re pivoting our company’s approach to that,” he said. “We're gonna keep answering RFPs and RFIs in the traditional way as well. But we are now in the business of self-funding prototypes at the corporate level which we can actually demonstrate real capability, leapfrogs to our customers.”

    Over the past two years, Northrop Grumman has put more than $2 billion into its independent research and development, or IRAD, as a way to bring technology to the market faster, particularly as international sales grow, CEO Kathy Warden said during the company’s earnings call Tuesday.

    “We are exploring creative ways to bring solutions to market faster and focusing on priority areas, such as the development and fielding of multi-function sensors, new and innovative ways to incorporate AI into our solutions, and developing and fielding new, smarter weapon systems that bring unmatched superiority on the battlefield…to name just a few,” Warden said. “Allied nations are prioritizing investments in air and missile defense, ground-based radars, airborne ISR, and other advanced weapon systems to enhance their ability to deter and defend against conflict. This growing demand presents substantial opportunities for our company, and…contributed to our international sales growing 20 percent year-to-date.”

    The comments come as consensus builds around better integrating defense companies’ research and development efforts with the Pentagon’s, potentially filling funding gaps as threats and technologies rapidly evolve.

    The Pentagon has increased its research and development funding in recent years. But it still struggles to field prototypes broadly, let alone convert them into programs of record—which can take about 12 years. And while companies often fund their own development of new technologies, it could be growing in popularity as new entrants look to prove themselves before a contract takes shape. 

    Next summer, Apex, an L.A.-based manufacturing startup that specializes in satellite buses, plans to launch a prototype for a platform that could be integral for space-based interceptors. 

    “In under a year, we are launching the host platform for space-based interceptors, called an orbital magazine, which will deploy multiple prototype missile interceptors in orbit,” Apex CEO Ian Cinnamon said in a statement announcing the initiative called Project Shadow. “Apex isn’t waiting for handouts or contracts; we are developing this orbital magazine technology on our own dime and moving incredibly fast.”

    That “orbital magazine” is the “centerpiece” for space-based interceptors, Cinnamon told Defense One in a statement. 

    “The key pieces of these SBIs exist, but integrating them together is a technical challenge,” Cinnamon said. “Given the timeline required to ensure space-based interceptors are fielded soon enough to protect the U.S., waiting for a government contract isn’t feasible—using private money to accelerate the research and development is simply the right thing to do.”

    But the risks are significant, he added, especially when it comes to the amount of money involved and the “short timeline” for the underlying technology to mature. 

    That drive to move quickly contrasts with how the major weapons programs often get their start, typically with Pentagon R&D funding for a prototype before becoming a pilot program. That is often where they get stuck, creating a mismatch between how much the Pentagon spends on research versus procurement, a Center for a New American Security report evaluating defense innovation spending points out. 

    “Traditionally, both initial steps are funded by the [Defense Department’s] research, development, test, and evaluation (RDTE) budget, although new defense companies are attempting to disrupt this process by building prototypes without formal requirements or DOD funds,” Carlton Haelig and Philip Sheers, CNAS fellow and research associate wrote in the report released this week. 

    As research and development costs grow, “overall procurement spending has remained stagnant, with many prototypes not yet entering full-scale production and fulfilling their procurement potential. In other words, the department is increasingly investing in research for sophisticated, leap-forward capabilities, but many such programs, from the Constellation-class frigate to the upgraded F-35, have fallen into a developmental cul-de-sac, failing to transition into procurement in large enough numbers to make a difference for U.S. warfighters,” the report states.

    To break that cycle, some companies are working with the military, taking technologies directly to the operators who use them. It’s a tactic Textron is leaning into with its unmanned offerings despite the Army canceling key programs, including Future Tactical Unmanned Aerial Systems.

    “With that program not happening, at least in the way it was envisioned—that was a hit. But look, the reality is these brigades need ISR,” Textron CEO Scott Donnelly said during Thursday’s earnings call. 

    Donnelly said the plan is to “take these systems directly to the brigades, and they'll drive that demand” per directions from Army Chief of Staff Gen. Randy George. 

    “So that's what we're doing right now. And that's why I say, while FTUAS didn't happen as a program, I do think that we will see a number of opportunities as we go out and sell that technology directly out to the warfighter,” he said, noting international interest and potential opportunities with U.S. Customs and Border Patrol. 

    “There's a lot of interest in a lot of the technology we've developed around FTUAS, and so that stuff will play out.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The threat actors behind a large-scale, ongoing smishing campaign have been attributed to more than 194,000 malicious domains since January 1, 2024, targeting a broad range of services across the world, according to new findings from Palo Alto Networks Unit 42. “Although these domains are registered through a Hong Kong-based registrar and use Chinese nameservers, the attack infrastructure is

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with Warlock ransomware began exploiting a critical zero-day vulnerability in Microsoft SharePoint.

    Discovered on July 19, 2025, the ToolShell vulnerability, tracked as CVE-2025-53770, became a primary vector for deploying the notorious Warlock ransomware across multiple organizations globally.

    This exploitation marked a notable escalation in the threat landscape, introducing a sophisticated attack methodology that combines known exploitation techniques with emerging malware tactics.

    Warlock’s emergence traces back to June 2025, though its initial prominence remained limited until the ToolShell zero-day attacks commenced.

    The ransomware distinguishes itself through its China-based operational framework, a departure from the traditional Russian-centric ransomware ecosystem.

    What began as a localized threat rapidly evolved into a coordinated attack campaign targeting organizations across diverse sectors, from engineering firms in the Middle East to financial institutions in the United States.

    Symantec analysts and Carbon Black researchers identified a sophisticated operational structure behind Warlock’s deployment.

    The investigation revealed that the threat group, known as Storm-2603 to Microsoft threat intelligence teams, deployed Warlock alongside multiple ransomware payloads including LockBit 3.0.

    This polyglot approach demonstrated operational flexibility and suggested a broader arsenal of cyber-attack capabilities.

    Understanding the Infection Mechanism and Persistence Tactics

    The infection mechanism employed by Warlock actors showcases considerable technical sophistication.

    The attackers utilized DLL sideloading as their primary execution method, leveraging the legitimate 7-Zip application (7z.exe) to load a malicious payload named 7z.dll.

    This technique, widely adopted by Chinese threat actors, bypassed conventional security detections by disguising malicious code within legitimate application processes.

    Once executed, Warlock implemented aggressive file encryption using the .x2anylock extension for encrypted files.

    Security researchers observed that Warlock appeared to be a rebrand of the older Anylock payload, though it incorporated modifications derived from LockBit 3.0 source code.

    The ransomware deployed a custom command and control framework designated ak47c2, enabling the attackers to maintain persistent communication channels with infected systems.

    Additionally, the threat actors deployed custom defense evasion tools signed with a stolen certificate from coolschool, utilizing Bring Your Own Vulnerable Driver (BYOVD) techniques to disable security software and establish system dominance.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Put your furloughed nuclear-security staff back to work, 27 lawmakers urged Energy Department leaders in a Thursday letter.

    The Oct. 20 idling of nearly 80% of National Nuclear Security Administration personnel encourages foreign enemies and endangers the United States, the House members said in a letter written by Rep. Dina Titus, D-Nev., to Energy Secretary Chris Wright and National Nuclear Security Administrator Brandon Williams.

    “These federal employees play a critical oversight role in ensuring that the work required to maintain nuclear security is carried out in accordance with long-standing policy and the law", Titus said in the letter, who’s state is home to the Nevada National Security Site. “Undermining the agency’s workforce at such a challenging time for U.S. global leadership diminishes our credible deterrence, emboldens our international adversaries, and makes the world a more dangerous place.”

    Wright announced the furloughs Monday while visiting the Nevada National Security Site, which conducts subcritical experiments and manages stockpile stewardship programs for the nation’s nuclear arsenal. The Energy Secretary said the NNSA expended its funding for federal personnel this week, though the agency was “able to do some gymnastics” to help maintain funding for contractors.

    “This has never happened before,” he said. “The NNSA, our umbrella organization, it’s been grouped together for 25 years. We’ve never furloughed workers in the NNSA, this should not happen, but this was a long as we could stretch the funding for the federal workers.”

    In her letter, Titus asserted that while the NNSA did not deem the bulk of its workforce as excepted, its collaborators in the Defense Department have maintained “nearly every program associated with nuclear modernization, leaving the Navy and Air Force without counterparts to continue this critical work.”

    She alluded to the potential that the furloughs were more a political calculation by the White House rather than the result of a budget shortfall, noting that the NNSA already faced the wrath of the Department of Government Efficiency earlier this year, when more than 300 NNSA probationary employees were laid off before the agency rescinded most of the dismissals. 

    “This is the fourth shutdown President Trump has presided over, but the NNSA has never furloughed employees during prior shutdowns. It begs the question why this step was necessary now and why more NNSA employees were not deemed essential, given the gravity of their duties,” she said.

    Titus requested that Wright and Williams provide answers to Congress regarding the legal basis for declaring nearly 1,400 NNSA employees as not excepted, as well as information on how many employees were furloughed in total, how many remain on duty and which offices were impacted by Nov. 7.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as a legitimate Minecraft client to compromise unsuspecting users.

    The malware, identified as a multi-function RAT, leverages the Telegram Bot API as its command and control infrastructure, enabling attackers to exfiltrate stolen data and remotely interact with victim machines.

    By masquerading as “Nursultan Client,” a name associated with a legitimate Minecraft modification popular among Eastern-European and Russian gaming communities, the threat successfully deceives users into executing the malicious payload.

    The malware was packaged using PyInstaller, resulting in an unusually large 68.5 MB executable file.

    This inflation serves a dual purpose: accommodating Python dependencies while evading security tools configured to bypass files exceeding certain size thresholds.

    Upon execution, the sample immediately conceals its presence by hiding the console window on Windows systems while displaying a fake installation progress bar to maintain the illusion of legitimate software installation.

    Fake installation progress bar (Source – Netskope)

    Netskope researchers identified the threat during routine threat hunting activities, discovering the executable with SHA256 hash 847ef096af4226f657cdd5c8b9c9e2c924d0dbab24bb9804d4b3afaf2ddf5a61.

    The analysis revealed that the malware attempts to establish persistence by creating a registry key named “NursultanClient” in the Windows startup path. However, this persistence mechanism contains critical flaws that will likely cause it to fail.

    The malware incorrectly constructs the startup command for the compiled executable, as it was designed for a raw Python script rather than a PyInstaller application.

    Additionally, the temporary directory created during execution is deleted once the process exits, preventing the malware from running on subsequent system startups.

    Telegram-Based Command and Control Infrastructure

    The malware’s core operation centers on its abuse of Telegram as a covert command and control channel.

    The script contains a hardcoded Telegram Bot Token (8362039368:AAGj_jyw6oYftV2QQYiYoUslJOmXq6bsAYs) and a restricted list of allowed Telegram user IDs (6804277757), ensuring only the authorized attacker can issue commands to infected machines.

    This design suggests a Malware-as-a-Service distribution model, where the hardcoded user ID functions as a basic licensing mechanism.

    The threat actor can easily modify this single identifier for each buyer, recompile the executable, and distribute personalized copies that only individual purchasers can control.

    The malware signature “by fifetka” embedded within system reconnaissance reports further supports this commercialized approach, indicating an operation designed to attract low-level threat actors rather than representing a single attacker’s campaign.

    The RAT includes extensive information-stealing capabilities targeting Discord authentication tokens across multiple platforms, including stable, PTB, and Canary builds.

    It scans local storage files and user data directories of major web browsers such as Chrome, Edge, Firefox, Opera, and Brave, extracting tokens from both LevelDB and SQLite databases.

    Beyond credential theft, the malware provides comprehensive surveillance features, including screenshot capture, webcam photography, and system reconnaissance capabilities that collect detailed profiles containing computer names, usernames, operating system versions, processor specifications, memory usage, and both local and external IP addresses.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶