• A previously unseen malware campaign began circulating in early August 2025, through email attachments and web downloads, targeting users in Colombia and beyond.

    By leveraging two distinct vector-based file formats—Adobe Flash SWF and Scalable Vector Graphics (SVG)—the attackers crafted a multiphase operation that evaded traditional antivirus detection.

    Initial reports surfaced when a benign-looking SWF file named Sequester.swf triggered alerts in only a handful of antivirus engines, prompting deeper investigation.

    Within days, a companion SVG file emerged, embedding sophisticated JavaScript payloads designed to impersonate the Colombian Fiscalía General de la Nación portal.

    The seamless pivot between legacy and modern formats caught many security teams off guard.

    The SWF component masqueraded as a legitimate 3D puzzle game, complete with ActionScript modules for rendering, pathfinding, and cryptographic routines.

    While antivirus engines flagged obfuscated classes and AES routines, they failed to recognize that this code served legitimate game mechanics rather than malicious behavior.

    Malicious file (Source – VirusTotal)

    Meanwhile, the SVG variant contained inline JavaScript that decoded a Base64 phishing page and silently dropped a ZIP archive containing additional payloads.

    The combination of these two vectors created a multiheaded threat that slipped past detection barriers with alarming ease.

    VirusTotal analysts noted that upon expanding support for SWF and SVG analysis in Code Insight, they were able to uncover dozens of related samples within hours of the initial submissions.

    By searching for Spanish-language comments left by the attackers—strings such as "POLIFORMISMO_MASIVO_SEGURO" and "Funciones dummy MASIVAS"—researchers identified a cohesive campaign spanning more than 40 unique SVG files, none of which had raised flags in standard antivirus scans.

    The early presence of these markers allowed rapid signature creation and retrohunt jobs, yielding over 500 matches when applied to submissions from the previous year.

    The heart of the operation lay in its evasion tactics. By distributing large, obfuscated SWF files that blended game code with encryption routines, the attackers exploited heuristic thresholds.

    At the same time, the SVG files embedded encrypted JavaScript in CDATA sections, evading simple pattern matching.

    This SVG file executes an embedded JavaScript payload upon rendering (Source – VirusTotal)

    When rendered in a browser, the script would decode and inject an HTML phishing interface, complete with progress bars and authentic-looking forms that mimicked official government communications .

    Detection Evasion Techniques

    Central to this campaign’s success was the layering of obfuscation and polymorphism. Each SWF sample employed variable renaming, garbage code insertion, and custom packing routines to defeat static analysis.

    The following excerpt illustrates how the SVG payload concealed its primary logic within nested Base64 strings:-

    // POLIFORMISMO_MASIVO_SEGURO: 2025-09-01T16:39:16.808557
    var payload = atob("UE...VUM+Cg==");
    document. Write(payload);

    Meanwhile, the YARA rule crafted by VirusTotal researchers targeted the consistent Spanish comments:-

    rule svg_colombian_campaign {
        strings:
            $c1 = "Funciones dummy MASIVAS"
            $c2 = "POLIFORMISMO_MASIVO_SEGURO"
        condition:
            uint16(0) == 0x3C3F and any of ($c*)
    }

    This rule achieved over 523 detections when retrohunted against a year’s worth of submissions.

    By combining heuristic bypasses, encrypted payloads, and intentional misdirection, the attackers demonstrated a refined understanding of both legacy and modern file formats—underscoring the urgent need for context-aware analysis in contemporary threat defense.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Colombian Malware Weaponizing SWF and SVG to Bypass Detection appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a new high-severity vulnerability in the Linux kernel to its Known Exploited Vulnerabilities (KEV) catalog, signaling that it is being actively exploited in attacks.

    The warning, issued on September 4, 2025, calls for urgent action from federal agencies and private sector organizations to mitigate the threat.

    The vulnerability, tracked as CVE-2025-38352, is a Time-of-Check Time-of-Use (TOCTOU) race condition.

    This type of flaw creates a small window of opportunity for an attacker to maliciously alter a system resource between the time the system checks for its security status and the time it actually uses that resource.

    Linux Kernel Race Condition Vulnerability

    A successful exploit could allow an attacker to gain elevated privileges, manipulate sensitive data, or cause a system to crash, leading to a high impact on confidentiality, integrity, and availability.

    In response to confirmed “in-the-wild” exploitation, CISA’s addition to the KEV catalog triggers a binding operational directive for federal agencies.

    Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are required to apply vendor-provided mitigations or discontinue use of the product by the due date of September 25, 2025.

    While the directive is mandatory for federal agencies, CISA strongly urges all organizations to prioritize patching this vulnerability due to the widespread use of the Linux kernel.

    Linux serves as the foundation for a vast array of systems, including web servers, cloud infrastructure, Android devices, and Internet of Things (IoT) gadgets, making the potential attack surface enormous.

    “A flaw in the Linux kernel is a foundational risk that can impact countless technologies across the globe,” a security analyst noted.

    At present, it is unknown if this vulnerability is being used in specific ransomware campaigns. However, attackers often use such kernel-level exploits to gain deeper access and persistence within a network before deploying ransomware or exfiltrating data.

    CISA recommends applying patches and mitigations from Linux distribution vendors as soon as they become available.

    If mitigations are not available for a specific product, organizations should follow applicable guidance for cloud services or discontinue the product’s use to remove the threat.

    System administrators are advised to check with their specific Linux distribution providers, such as Red Hat, Canonical (Ubuntu), and SUSE, for security updates and patching instructions.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post CISA Warns of Linux Kernel Race Condition Vulnerability Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Attackers can bypass Endpoint Detection and Response (EDR) tools and file locks by reading raw disk sectors directly, highlighting the urgent need for organizations to audit and secure the drivers installed on their Windows systems. In modern Windows environments, drivers provide low-level access to hardware and disk functions. A recent investigation by Workday’s Offensive Security […]

    The post Hackers Exploit Raw Disk Reads to Evade EDR and Steal Sensitive Files appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new botnet called NightshadeC2 that employs an innovative “UAC Prompt Bombing” technique to evade Windows Defender and compromise endpoint security systems. In August 2025, eSentire’s Threat Response Unit (TRU) identified this emerging threat, which represents a significant evolution in malware evasion tactics. The botnet demonstrates advanced capabilities including reverse shell access, credential theft, […]

    The post NightshadeC2 Botnet Exploits ‘UAC Prompt Bombing’ to Evade Windows Defender appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have flagged a new malware campaign that has leveraged Scalable Vector Graphics (SVG) files as part of phishing attacks impersonating the Colombian judicial system. The SVG files, according to VirusTotal, are distributed via email and designed to execute an embedded JavaScript payload, which then decodes and injects a Base64-encoded HTML phishing page masquerading as a

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A recently patched vulnerability in a core Windows driver could allow a local attacker to execute code with the highest system privileges, effectively taking full control of a target machine.

    The flaw, identified as CVE-2025-53149, is a heap-based buffer overflow discovered in the Kernel Streaming WOW Thunk Service Driver (ksthunk.sys). Microsoft addressed the issue in its security updates released on August 12, 2025.

    The vulnerability was discovered by security researchers who stumbled upon the flaw during internal analysis. Following a responsible disclosure process, the bug was reported to Microsoft, leading to the development and release of a patch.

    The affected component, ksthunk.sys, is a crucial driver for maintaining backwards compatibility on 64-bit versions of Windows.

    Its primary function is to serve as a “thunk” layer, a small piece of code that translates requests between different system architectures. Specifically, it bridges the gap between 32-bit user-mode applications and 64-bit kernel-mode drivers that manage real-time data streams for audio and video.

    This driver is part of the wider Kernel Streaming (KS) framework, a foundational Windows technology for handling high-performance, low-latency multimedia data.

    By allowing older 32-bit software to interact with modern 64-bit kernel components, KSThunk ensures that legacy applications can still function correctly. However, it is within this complex translation process that the security flaw was found.

    Windows Heap-based Buffer Overflow Vulnerability

    The vulnerability resides in the CKSAutomationThunk::HandleArrayProperty() function of the ksthunk.sys driver (SHA-1: 68B5B527550731DD657BF8F1E8FA31E895A7F176).

    An attacker can trigger this flaw by sending a specially crafted request from a 32-bit application to a device that uses the Kernel Streaming interface.

    Windows Heap-based Buffer Overflow Vulnerability

    The core of the issue lies in how the driver handles requests to get a specific property from a device, such as KSPROPSETID_VPConfig. The vulnerable code path first calls a function to determine the size of the data that needs to be returned.

    It then prepares to copy this data into an output buffer provided by the user-mode application.

    The critical mistake is a missing validation step. The function checks that the provided output buffer isn’t empty, but it fails to verify if the buffer is actually large enough to hold the data it is about to receive from the device.

    Consequently, when the driver proceeds to copy the data, it can write past the boundary of the allocated buffer. This action results in a heap-based buffer overflow within the kernel’s non-paged pool, a critical memory region.

    A successful exploit could allow an attacker to corrupt kernel memory and execute arbitrary code with kernel-level privileges.

    To trigger the vulnerability, an attacker would need to run code on a target system and make a specific DeviceIoControl call. However, there is a significant prerequisite: the system must have a hardware device installed that supports the vulnerable property set (KSPROPSETID_VPConfig or KSPROPSETID_VPVBIConfig).

    While the researchers were unable to find such a device on their test systems, the vulnerability remains a threat on systems where one is present.

    Microsoft has corrected the vulnerability in the patched version of ksthunk.sys. The updated driver now includes the necessary size check, ensuring that the output buffer is large enough before the copy operation begins. If the buffer is too small, the operation is safely aborted.

    Users and administrators are strongly advised to apply the latest Windows security updates to ensure their systems are protected against CVE-2025-53149 and other threats.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Windows Heap-based Buffer Overflow Vulnerability Let Attackers Elevate Privileges appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security vulnerability has been discovered in Microsoft Windows systems that allows attackers to escalate their privileges and potentially gain complete control over affected machines. The vulnerability, designated CVE-2025-53149, affects the Kernel Streaming WOW Thunk Service Driver and was patched by Microsoft in August 2025. Vulnerability Overview The security flaw is a heap-based buffer overflow located in […]

    The post Windows Heap Buffer Overflow Vulnerability Allows Attackers to Gain Elevated Privileges appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated malware campaign targeting Colombian institutions through an unexpected vector: weaponized SWF and SVG files that successfully evade traditional antivirus detection. The discovery emerged through VirusTotal’s newly enhanced Code Insight platform, which added support for analyzing these vector-based file formats just as attackers began exploiting them to impersonate the Colombian justice system. Despite Adobe […]

    The post Colombian Malware Exploits SWF and SVG to Evade Detection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have detected massive scanning campaigns targeting Cisco Adaptive Security Appliance (ASA) devices, with attackers probing over 25,000 unique IP addresses in coordinated waves that may signal an upcoming vulnerability disclosure. GreyNoise cybersecurity researchers observed two significant scanning surges against Cisco ASA devices in late August. The first wave involved more than 25,000 unique […]

    The post Hackers Target Cisco ASA Devices in Massive Scan Across 25,000 IPs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chess.com, the world’s leading online chess platform, has confirmed a significant data breach that compromised personal information of thousands of users after hackers successfully exploited an external system connected to their network. The Orem, Utah-based company disclosed that the security incident affected 4,541 individuals across the United States, including one Maine resident. The breach occurred on June 5, […]

    The post Chess.com Confirms Data Breach After Hackers Exploit External System appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶