-
From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours, five different tools alert you about it: your vulnerability scanner, XDR, CSPM, SIEM, and CMDB each surface the issue in their own way, with different severity levels, metadata, and context. What’s missing is a system of action. How do you transition from the
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package manager with malicious typosquats of Nethereum, a popular Ethereum .NET integration platform, to steal victims’ cryptocurrency wallet keys. The package, Netherеum.All, has been found to harbor functionality to decode a command-and-control (C2) endpoint and exfiltrate mnemonic phrases, private keys, and
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In September 2025, Texas A&M University System (TAMUS) Cybersecurity, a managed detection and response provider, in collaboration with Elastic Security Labs, uncovered a sophisticated post-exploitation campaign by a Chinese-speaking threat actor. Using this method, the attackers installed a malicious IIS module named TOLLBOOTH, deployed a Godzilla-forked webshell framework, leveraged the GotoHTTP remote monitoring and management […]
The post Hackers Use ASP.NET Machine Keys to Break Into IIS, Push Malicious Extensions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Security flaws in Microsoft’s Azure ecosystem enable cybercriminals to create deceptive applications that imitate official services like the “Azure Portal.
Varonis found that Azure’s safeguards, designed to block reserved names for cross-tenant apps, could be bypassed using invisible Unicode characters.
By inserting characters like the Combining Grapheme Joiner (U+034F) between letters such as “Az͏u͏r͏e͏ ͏P͏o͏r͏t͏a͏l”, attackers created apps that appeared legitimate on consent screens.
This trick worked with over 260 such characters, including those in ranges like U+FE00 to U+FE0F. The ploy exploited the fact that many Microsoft apps lack verification badges, leading users to overlook warnings about third-party origins.
Azure applications, essentially software entities that integrate with Azure services, rely on user consent for permissions. Delegated permissions let apps act on a user’s behalf, accessing emails, files, and more, while application permissions grant standalone access.

When abused, these become potent attack vectors for initial access, persistence, and privilege escalation in Microsoft 365 environments.
Phishing Tactics Fuel The Threat
Varonis zeroed in on initial access methods, particularly illicit consent grants and device code phishing. In the former, phishing emails lure victims to fake file links that redirect to a consent page.
Once approved, attackers snag access tokens without needing passwords, granting them the victim’s resource privileges.

Device code phishing takes it further: Attackers generate a verification URI and code for a malicious app, tricking users into entering it on a legitimate-looking site. The attacker then polls for the token, hijacking the session.
These techniques thrive on deception. Consent pages for the spoofed apps displayed convincingly, especially when paired with Azure icons.
Forum discussions reveal users routinely dismissing “unverified” alerts, assuming they’re safe from Microsoft itself.
Prohibited names tested included staples like “Microsoft Teams,” “Power BI,” and “OneDrive SyncEngine,” underscoring the scope of potential impersonations.
Varonis disclosed the issues promptly; Microsoft fixed the initial Unicode bypass in April 2025 and a broader set in October 2025.
No customer action is required, as the updates safeguard tenants automatically. Still, experts urge organizations to monitor app consents rigorously, enforce least-privilege permissions, and educate users on phishing red flags.
This episode reinforces the need for layered defenses in cloud environments. As attackers evolve, so must vigilance lest a seemingly benign app consent unlock the door to chaos.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post Azure Apps Vulnerability Lets Hackers Create Malicious Apps Mimicking Microsoft Teams appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
In a newly uncovered campaign, the threat group known as Bitter—also tracked as APT-Q-37—has leveraged both malicious Office macros and a previously undocumented WinRAR path traversal vulnerability to deliver a C# backdoor and siphon sensitive information. Researchers at Qi’anxin Threat Intelligence Center warn that this dual-pronged attack illustrates the group’s evolving tactics and their focus […]
The post Bitter APT Exploits WinRAR Zero-Day Through Malicious Word Files to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Monolock ransomware has surfaced in underground forums, with threat actors advertising version 1.0 for sale alongside stolen corporate credentials.
First detected in late September, the malware exploits phishing emails containing malicious Word documents.
Upon opening, the embedded macro downloads the ransomware binary from a compromised server. Victims report file encryption using a mix of AES-256 for file payloads and RSA-2048 for key exchange, rendering data inaccessible without the private key.
Dark Web Informer analysts noted that Monolock’s initial deployments targeted small to mid-sized organizations in healthcare and manufacturing sectors.
The operators demand payment in cryptocurrency, instructing victims to access a Tor-hosted payment portal. This portal automatically verifies the transaction and supplies the decryption key.
Early samples reveal a ransom note that offers a 10 percent discount if paid within 48 hours.
In controlled environments, researchers identified that Monolock terminates processes associated with common backup and security software before encryption begins.
It scans running services for patterns matching “backup,” “sql,” and “vss,” then kills them to prevent snapshot restores.
After encryption, it appends the extension “.monolock” to filenames and leaves a ransom note named “README_RECOVER.txt” in each directory.
Persistence and Evasion
Monolock’s infection mechanism embeds itself into the Windows registry under the Run key, ensuring execution at boot.
The malware binary disguises as a legitimate DLL and injects into explorer.exe to evade detection.
It uses API hashing to locate required Windows functions dynamically, complicating static signature matching.
A snippet of the API-hashing routine demonstrates this tactic:-
DWORD hash = 0xA1B2C3D4; for (char* p = moduleName; *p; ++p) { hash = ((hash << 7) | (hash >> (32 - 7))) ^ *p; }By leveraging this routine, Monolock avoids importing functions by name, hindering many endpoint detection tools.
This advanced evasion underscores the need for behavior-based monitoring to detect such threats.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The advice didn’t change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords harder for hackers to crack via brute force methods. But more recent guidance shows our focus should be on password length, rather than complexity. Length is the more important security factor, and passphrases are the simplest way to get your users to create
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed PassiveNeuron, according to findings from Kaspersky. The cyber espionage activity was first flagged by the Russian cybersecurity vendor in November 2024, when it disclosed a set of attacks aimed at government entities in Latin America and East Asia in June, using
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Over the past week, cybersecurity professionals have been gripped by the emergence of GlassWorm, a highly sophisticated, self-propagating malware campaign targeting VS Code extensions on the OpenVSX Marketplace.
The scale and technical complexity of this attack signal a turning point for supply chain security in developer ecosystems.
As of October 2025, over 35,800 installations have reportedly been compromised, with the number growing as active malicious extensions continue to operate in the wild.
The impact is felt not only through direct credential theft but also through deep infiltration of developer machines.
The initial signs of the campaign surfaced when Koi researchers identified unusual behavioral shifts in the seemingly benign “CodeJoy” extension after its 1.8.3 version update.
While the extension passed initial visual code reviews, Koi’s risk engine flagged it for anomalous network connections and credential access.
Undetectable on superficial inspection, the researchers quickly found that the underlying infection vector was both novel and alarming—the malicious code was encoded using invisible Unicode characters, allowing it to blend perfectly with legitimate source files.
The result: entire blocks of JavaScript payload remained unseen to the naked eye and undetectable by most static analysis tools.
.webp)
CodeJoy risk report on Koidex (Source – Koi) Koi’s investigation soon revealed the magnitude of the threat. The worm harvests secrets from npm, GitHub, OpenVSX, and even targets 49 different cryptocurrency wallet extensions.
After siphoning credentials, it leverages them to hijack additional extensions, thereby achieving a self-propagating cycle.
Victims’ devices are then weaponized, serving as criminal proxy nodes or platforms for remote attacks, illustrating a truly distributed and resilient campaign strategy.
Koi analysts confirmed that the attackers architected an unkillable command-and-control (C2) infrastructure using the Solana blockchain.
Alongside blockchain payload distribution, fallback C2 mechanisms—Google Calendar events and direct IP endpoints—make takedown efforts almost futile.
Each communication contains encrypted instructions for further stages, enabling dynamic updates to the malware in near real-time.
This approach enables GlassWorm to adapt swiftly and persistently within compromised networks.
Invisible Unicode: The Infection Mechanism
A standout aspect of GlassWorm’s operation is its use of the Unicode “variation selector” exploit. By inserting non-rendering Unicode codepoints into JavaScript source files, the malware hides entire logic branches.
These characters are ignored by visual editors and code review platforms but are recognized and executed by the JavaScript interpreter.
For instance, a segment in the compromised CodeJoy file showed a vast empty space—actually filled with functional malicious code—successfully disguised.
// Line 2 appears empty but contains: function stealCreds() {...}This method fundamentally breaks assumptions of code transparency. Developers, even when manually inspecting diffs or reviewing GitHub commits, cannot see the injected logic.
Only byte-wise or deeply specialized tools can reveal the hidden payload, underscoring the criticality of updating code inspection and CI processes to detect non-standard Unicode—a mitigation priority for defenders.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
The post New GlassWorm Using Invisible Code Hits Attacking VS Code Extensions on OpenVSX Marketplace appeared first on Cyber Security News.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
On October 6, 2025, the cybercriminal developer known as “Loadbaks” announced the release of Vidar Stealer v2.0 on underground forums, introducing a sophisticated information-stealing malware that employs direct memory injection to bypass modern browser security protections. This new version represents a complete architectural overhaul, transitioning from C++ to a pure C implementation that allegedly enhances […]
The post Vidar Stealer Exploits: Direct Memory Attacks Used to Capture Browser Credentials appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶



Alleged Sale of Monolock Ransomware V1.0