• In July 2025, cybersecurity firm CYFIRMA uncovered an active phishing campaign targeting Linux-based operating systems used by Indian government and military organisations. This operation, attributed to TransparentTribe (also known as APT36 or Operation C-Major), is the latest in a series of ongoing cyber espionage campaigns supporting Pakistan’s strategic interests. TransparentTribe, a Pakistani-nexus threat group active […]

    The post TransparentTribe Targets Linux Systems in Indian Military to Deploy DeskRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA has issued a critical alert regarding a severe vulnerability in Motex LANSCOPE Endpoint Manager, a popular tool for managing IT assets across networks.

    Dubbed an improper verification of the source of a communication channel flaw, this issue allows attackers to execute arbitrary code simply by sending specially crafted packets.

    The vulnerability, tracked under CVE-2025-61932, has already been exploited in the wild, prompting CISA to add it to its Known Exploited Vulnerabilities (KEV) catalog.

    Organizations using the software are urged to act immediately to prevent potential breaches that could lead to data theft, ransomware deployment, or full system compromise.

    This warning comes amid a surge in endpoint management exploits, as cybercriminals increasingly target administrative tools to gain deeper network access.

    Motex LANSCOPE, developed by Japanese firm Motex, helps IT teams monitor and control devices remotely, making it a prime target for attackers seeking to pivot from individual endpoints to entire infrastructures.

    While specific details on the exploitation campaigns remain limited, security researchers note that the flaw’s remote code execution (RCE) capability makes it particularly dangerous, especially in unpatched environments.

    At its core, the vulnerability stems from inadequate checks on incoming communication packets, allowing malicious actors to impersonate legitimate sources.

    According to the CWE-940 definition, this improper verification can bypass authentication mechanisms, enabling unauthenticated remote access.

    Attackers need only craft packets that mimic trusted traffic, potentially leading to the deployment of malware or backdoors without user interaction.

    CISA’s alert highlights that while the vulnerability’s use in ransomware campaigns is currently unknown, its RCE nature aligns with tactics seen in recent high-profile attacks, such as those targeting supply chain weaknesses.

    Endpoint managers like LANSCOPE are often deployed in enterprise settings, including sectors like finance and healthcare, where downtime or data exposure could have cascading effects.

    Early indicators suggest exploitation may involve phishing-laced packets or direct network probes, underscoring the need for robust network segmentation.

    Mitigations

    To counter the threat, CISA recommends applying vendor-provided patches or mitigations without delay. Motex has reportedly released updates addressing the issue, but organizations should verify compatibility before deployment.

    For cloud-integrated instances, adherence to Binding Operational Directive (BOD) 22-01 is essential, emphasizing vulnerability management in federal systems guidance that extends valuably to private entities.

    If patches prove unavailable or ineffective, discontinuing use of the product is advised as a last resort. This incident reflects ongoing challenges in endpoint security, where legacy tools often lag behind evolving threats.

    As CISA continues to monitor developments, experts call for proactive measures like regular vulnerability scanning and zero-trust architectures.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale components, or abuse trusted systems like OAuth and package registries. If your stack or habits make any of those easy, you’re already a target. This week’s ThreatsDay highlights show exactly how those weak points are being exploited — from overlooked

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have uncovered a sophisticated campaign targeting global retail and consumer services organizations through credential theft and gift card fraud. Dubbed “Jingle Thief,” this operation exploits the festive shopping season when companies are most vulnerable to financial fraud schemes. The campaign, tracked by Unit 42 as cluster CL-CRI-1032, is orchestrated by financially motivated threat […]

    The post Jingle Thief Hackers Exploit the Festive Season with Weaponized Gift Card Scams appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • As machine identities explode across cloud environments, enterprises report dramatic productivity gains from eliminating static credentials. And only legacy systems remain the weak link. For decades, organizations have relied on static secrets, such as API keys, passwords, and tokens, as unique identifiers for workloads. While this approach provides clear traceability, it creates what security

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Atlassian has disclosed a high-severity path traversal vulnerability in Jira Software Data Center and Server that enables authenticated attackers to arbitrarily write files to any path accessible by the Java Virtual Machine (JVM) process.

    This flaw, tracked as CVE-2025-22167 with a CVSS score of 8.7, affects versions from 9.12.0 through 11.0.1 and was internally discovered, prompting urgent patch recommendations.

    Organizations relying on Jira for project management face risks of data tampering or service disruption if unpatched.

    Path Traversal Flaw Exposed

    The vulnerability stems from inadequate input validation in file handling mechanisms, allowing attackers with low privileges, such as authenticated users, to bypass path restrictions.

    By crafting malicious requests, an exploiter can inject traversal sequences like “../” to target sensitive directories outside the intended scope, writing arbitrary data wherever the JVM has write permissions.

    Introduced in major releases 9.12.0 and 10.3.0, it persisted into the 11.0 branch until fixes in 9.12.28, 10.3.12, and 11.1.0.

    Atlassian confirmed no user interaction is needed, and the attack vector is network-based with low complexity, making it exploitable remotely.

    While primarily an arbitrary write issue, it could enable reads if combined with other flaws, escalating to data exfiltration or code injection.

    For businesses using Jira in software development or IT operations, exploitation could corrupt configuration files, alter project data, or deploy malware, leading to operational chaos or compliance breaches.

    The high integrity and availability impacts mean attackers might delete logs, modify databases, or cause denial-of-service by overwriting critical files.

    In regulated sectors like finance or healthcare, this could expose intellectual property or patient information indirectly.

    No public exploits exist yet, but the ease of access requiring only basic authentication heightens urgency, especially for internet-facing instances.

    Mitigations

    Atlassian urges immediate upgrades to patched versions: 9.12.28 or later for the 9.x series, 10.3.12 or higher for 10.x, and 11.1.0 or beyond for the newest branch.

    Users unable to update fully should apply these minimum fixes and monitor release notes for details. As interim measures, restrict JVM filesystem permissions, segment network access, and enable anomaly detection for file changes.

    Backups and audits are essential to recover from potential incidents. This internal report underscores Atlassian’s proactive stance, but delayed patching could invite targeted attacks in a landscape rife with supply chain threats.

    With over 200,000 organizations dependent on Jira, swift action is critical to safeguard workflows.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chinese-linked threat actors behind the Warlock ransomware operation have emerged as a significant cybersecurity concern following their exploitation of a critical Microsoft SharePoint vulnerability. The group’s sophisticated attack infrastructure, combined with evidence of historical espionage activities dating back to 2019, reveals a complex threat landscape where cybercriminal and state-sponsored operations increasingly converge. Warlock first surfaced […]

    The post Warlock Ransomware Exploits SharePoint ToolShell Zero-Day in New Attack Campaign appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Over the past year, federal agents struggled to uncover who operated a notorious child exploitation site on the dark web. Their search took an unexpected turn when the suspect revealed their use of ChatGPT, marking a significant moment in digital investigations. Federal Warrant Seeks ChatGPT Data Last week, in Maine, a federal search warrant was […]

    The post OpenAI Faces DHS Request to Disclose User’s ChatGPT Prompts in Investigation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat researchers at Netskope have uncovered a sophisticated new Remote Access Trojan (RAT) written in Python that masquerades as “Nursultan Client,” a legitimate Minecraft application popular in Eastern-European and Russian gaming communities. The malware leverages the Telegram Bot API as its command-and-control (C2) channel, enabling attackers to exfiltrate stolen data and maintain persistent access to […]

    The post New Python-Based RAT Disguised as Minecraft App Steals Sensitive User Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The popular Impacket toolkit, a staple in penetration testing and now integrated into the Kali Linux repository, is set for a major upgrade.

    Maintained by Fortra’s cybersecurity team, the forthcoming release, building on version 0.12, addresses long-standing community requests with enhanced relay capabilities, protocol hardening, and new scripting tools.

    This update promises to streamline red team operations against modern Windows environments, making it easier to navigate complex Active Directory setups and relay attacks.

    At the core of the release are powerful additions to ntlmrelayx.py, turning it into a versatile relay operator. Security researchers can now directly serve SCCM Management Points and Distribution Points, enabling the enrollment of rogue clients to extract secret policies or scour packages for sensitive data.

    A new RPC listener and EPM bootstrapper simplify pivots from printer bugs to ADCS exploitation, condensing multi-step attacks into single commands.

    Further innovations include a WinRM relay target that forwards inbound NTLM authentications from sources like SMBv1, LDAP, HTTP, or captured hashes to spawn interactive shells via local TCP ports.

    The SOCKS proxy plugin extends support to LDAP and LDAPS traffic, allowing seamless integration with existing tools without custom rewrites. Logging improvements tie attacks to specific relayed connections, providing granular insights into coerced victims.

    Protocol Hardening and Workflow Boosts

    To counter evolving defenses, Impacket bolsters channel binding and signing across LDAP, Kerberos, and SQL protocols. SASL enhancements ensure compatibility with domains enforcing unsigned binds, while a reworked TDS handshake in mssqlclient.py handles encryption and CBT natively, ditching external dependencies like PyOpenSSL.

    MSSQL workflows see practical upgrades: richer version banners for scripting, fixed uploads on non-English systems, and new CLI command feeding for mssqlclient.py. SMB refactoring resolves sharing violations for live file copies, including event logs, and refines signing to mimic native Windows behavior.

    The release introduces fresh examples like badsuccessor.py for dMSA object manipulation based on Akamai research, enabling inventory and exploitation of vulnerable OUs.

    Other additions include attrib.py and filetime.py for file metadata control, regsecrets.py for remote hive extraction, CheckLDAPStatus.py for auditing signing enforcement, and samedit.py for offline SAM editing.

    Standardized logging and auth parsing across examples reduce boilerplate, with secretsdump.py gaining remote WMI options for NTDS.dit dumps. As Impacket lands in Kali repos, testers are urged to experiment in labs against recent Windows builds.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶