• Over the past two months, threat actors have weaponized a critical authentication bypass flaw in the Service Finder Bookings WordPress plugin, enabling them to hijack any account on compromised sites.

    First disclosed on July 31, 2025, the vulnerability emerged after a bug bounty submission revealed that the plugin’s servicefinderswitchback function failed to validate a user-switch cookie before elevating privileges.

    Attackers quickly reverse-engineered the weakness, triggering mass exploitation campaigns that began on August 1 and intensified throughout September.

    During this period, the Wordfence Firewall blocked more than 13,800 exploit attempts across thousands of sites running affected versions.

    In its initial probing phase, adversaries sent specially crafted HTTP requests that included a malicious originaluserid cookie, bypassing authentication entirely.

    Wordfence analysts noted the sudden uptick in abnormal switchback requests within hours of public disclosure, prompting the rapid deployment of a firewall rule for all Wordfence Premium, Care, and Response customers.

    CVE IDAffected PluginVersions AffectedPatched VersionCVSS 3.1 ScoreAttack Vector
    CVE-2025-5947Service Finder Bookings≤ 6.06.19.8Authentication Bypass

    Sites using the free version received protection after a 30-day delay, leaving many installations exposed until mid-July.

    The impact of successful exploitation is catastrophic: an unauthenticated actor gains complete administrator privileges, allowing installation of backdoors, data exfiltration, or site defacement.

    With over 6,000 active installs of the vulnerable plugin, the threat landscape widened as scanning bots and scripted exploit kits began probing for Service Finder Bookings endpoints.

    Infection Mechanism

    A closer look at the exploit reveals that attackers target the servicefinderswitchback endpoint by sending a GET request to ?switchback=1 with the Cookie: originaluserid=<target_id>.

    The plugin code then invokes:-

    if ( isset( $_COOKIE['originaluserid'] ) ) {
        $originaluserid = intval( $_COOKIE['originaluserid'] );
        wp_set_current_user( $originaluserid );
        wp_set_auth_cookie( $originaluserid, true );
    }

    Because neither authentication nor nonce checks are performed, the attacker’s supplied user ID is accepted unconditionally, logging them in as that user—often the site administrator.

    This simple yet powerful bypass underscores the importance of rigorous input validation in session-handling routines.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Actively Exploiting WordPress Plugin Vulnerability to Gain Admin Access appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated phishing campaign has emerged targeting job seekers through legitimate Zoom document-sharing features, demonstrating how cybercriminals exploit trusted platforms to harvest Gmail credentials.

    The attack leverages social engineering tactics by impersonating HR departments and using authentic Zoom notifications to bypass user suspicion and traditional security measures.

    The campaign begins with victims receiving legitimate-looking emails from “HR Departments via Zoom Docs” with subjects like “HR Departments invited you to view ‘VIEW DOCUMENTS’”.

    These messages pass standard email authentication protocols including SPF, DKIM, and DMARC verification, making them appear completely legitimate to both users and security systems.

    The attackers strategically target individuals actively job hunting, capitalizing on their eagerness to respond to potential employment opportunities.

    Upon clicking the Zoom document link, victims are redirected through a carefully orchestrated chain of malicious websites.

    The initial redirect leads to overflow.qyrix.com.de, where attackers have implemented a fake “bot protection” gate designed to serve dual purposes: blocking automated security analysis tools and creating an illusion of legitimacy for unsuspecting users.

    Himanshu Anand, a Cyber Security Researcher, identified this campaign while analyzing suspicious emails in his inbox during a job search.

    His detailed investigation revealed the sophisticated nature of the attack infrastructure and the real-time credential exfiltration mechanisms employed by the threat actors.

    After users complete the fraudulent CAPTCHA verification, they are redirected to a convincing Gmail phishing page hosted on the same malicious domain.

    The fake login interface closely mimics Google’s authentic sign-in portal, complete with proper branding, layout, and interactive elements that would fool even security-conscious users under normal circumstances.

    Real-Time Credential Exfiltration via WebSocket

    The most concerning aspect of this campaign involves the attackers’ implementation of real-time credential harvesting through WebSocket connections.

    The Gmail credential harvest page (Source – Himanshuanand.com)

    Once victims enter their Gmail username and password on the phishing page, the stolen credentials are immediately transmitted to the attackers’ command and control server through an active WebSocket connection at overflow.qyrix.com.de/websocket/socket.io/.

    This live exfiltration method provides several advantages to the cybercriminals. First, it enables immediate validation of stolen credentials against Google’s authentication systems, allowing attackers to quickly identify which accounts they can successfully compromise.

    Second, the WebSocket protocol facilitates faster data transmission compared to traditional HTTP POST requests, reducing the window of opportunity for security systems to detect and block the malicious activity.

    The technical implementation reveals sophisticated programming knowledge, with the phishing infrastructure configured to handle multiple concurrent sessions and maintain persistent connections with victim browsers.

    Network analysis shows the WebSocket traffic contains authentication tokens and session cookies, suggesting the attackers are preparing for immediate account takeover attempts following credential theft.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Mimic as HR Departments to Steal Your Gmail Login Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have uncovered a sophisticated evolution of the ClickFix attack methodology, where threat actors are leveraging cache smuggling techniques to avoid traditional file download detection mechanisms.

    This innovative campaign targets enterprise networks by masquerading as a Fortinet VPN compliance checking tool, specifically exploiting the trust organizations place in their remote access infrastructure.

    The malicious webpage, hosted on the domain fc-checker[.]dlccdn[.]com, presented itself as a legitimate corporate security utility designed to verify VPN compliance across enterprise environments.

    The attack represents a significant departure from conventional ClickFix variants that typically rely on direct file downloads or explicit internet communication.

    Instead, attackers have developed a method that pre-emptively stores malicious payloads within the browser’s cache system, effectively bypassing many security controls that monitor file downloads and network communications.

    The webpage uses Fortinet’s branding to lure users into running malicious code (Source – Expel)

    Expel analysts noted that this technique demonstrates a concerning advancement in social engineering tactics, particularly as it targets Fortinet VPN clients predominantly used by enterprises for secure remote access.

    What makes this campaign particularly dangerous is its ability to appear as though users are executing files already present on their corporate network.

    The webpage displays a text box containing what appears to be a standard network file path: “\\Public\Support\VPN\ForticlientCompliance.exe”.

    However, beneath this veneer of legitimacy lies a complex PowerShell payload designed to extract and execute malicious code from the browser’s cache without establishing any external network connections.

    The Hidden Payload Delivery Mechanism

    The technical sophistication of this attack centers around its cache smuggling implementation, which represents a novel approach to payload delivery.

    When users interact with the malicious webpage, an obfuscated JavaScript function executes a fetch request to “/5b900a00-71e9-45cf-acc0-d872e1d6cdaa”, which presents itself as a legitimate JPEG image by setting the HTTP Content-Type header to “image/jpeg”.

    The browser automatically caches this supposed image file, but examination reveals it contains no JPEG header and instead houses a compressed ZIP archive wrapped between unique delimiter strings “bTgQcBpv” and “mX6o0lBw”.

    The PowerShell script hidden within the clipboard payload includes a sophisticated regex pattern that searches Chrome’s cache directory for these specific delimiters: $m=[regex]::Matches($c,'(?<=bTgQcBpv)(.*?)(?=mX6o0lBw)',16).

    Once located, the script extracts the data between these markers, writes it to “ComplianceChecker.zip”, extracts the archive, and executes “FortiClientComplianceChecker.exe” completely offline.

    This technique effectively circumvents security solutions that monitor file downloads or PowerShell web requests, as no explicit network activity occurs during the malicious execution phase.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Upgraded ClickFix Attack With Cache Smuggling to Secretly Download Malicious Files appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A recently discovered Python-based remote access trojan (RAT) exhibits unprecedented polymorphic behavior, altering its code signature each time it runs.

    First observed on VirusTotal, the sample, dubbed nirorat.py, initially scored only 26/100 on detection engines, despite containing a full suite of RAT capabilities.

    Analysts believe the malware leverages Python’s introspection and code-modification features to evade signature-based detection by continuously transforming critical code sections.

    Internet Storm Center analysts identified the threat after correlating function names such as selfmodifyingwrapper, decryptandexecute, and polymorphcode in the sample’s source.

    These functions drive the malware’s evasion tactics by extracting its own code from memory, applying randomized XOR-based packing, and injecting junk snippets before execution. Such dynamic mutation ensures no two executions share an identical fingerprint, compounding challenges for static scanners.

    Delivered primarily through phishing emails containing a benign-looking Python script, the RAT also spreads via compromised network shares. Upon execution, it unpacks itself entirely in memory, avoiding disk artifacts.

    Persistence is achieved by appending a copy of the mutated script to startup folders under randomized filenames. Its low VirusTotal detection score reflects how traditional file-hash signatures are nearly useless against this threat.

    Detection Evasion Techniques

    The RAT’s detection evasion hinges on two core mechanisms: self-modification and junk-code insertion.

    At runtime, the selfmodifyingwrapper function retrieves a target routine’s source with Python’s inspect module, encodes it by XORing each byte with a random key, and then reconstructs it in memory before execution.

    This technique closely simulates a packer’s behavior without leaving a packed file footprint on disk.

    import inspect, random, marshal, zlib
    
    def selfmodifyingwrapper(func):
        code = inspect.getsource(func).encode()
        key = random.randint(1,255)
        packed = bytes(b ^ key for b in code)
        unpacked = bytes(b ^ key for b in packed)
        codeobj = marshal.loads(zlib.decompress(unpacked))
        exec(codeobj)

    Additionally, the polymorphcode function injects randomized junk—unused functions, shuffled variable names, and no-op loops—into core routines.

    By combining variable renaming and random snippet insertion, the malware produces a virtually unique source each run, undermining both static signature and heuristic approaches.

    Given these advanced evasion strategies, defenders must rely on behavioral analysis and real-time monitoring rather than traditional signature-based tools.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Polymorphic Python Malware Repeatedly Mutate its Appearance at Every Execution Time appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North America, Asia, and Europe that are designed to deliver a Go-based implant known as GOVERSHELL. “The initially observed campaigns were tailored to the targets, and the messages purported to be sent by senior researchers and analysts from legitimate-sounding, completely

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The ransomware landscape witnessed unprecedented upheaval in Q3 2025 as cyberthreat actors ushered in a new era of aggression and sophistication.

    The quarter marked a pivotal moment with the emergence of Scattered Spider’s inaugural ransomware-as-a-service offering, ShinySp1d3r RaaS, representing the first major English-led ransomware operation to challenge traditional Russian-speaking dominance in the ecosystem.

    Simultaneously, the notorious LockBit collective announced its resurrection with LockBit 5.0, declaring critical infrastructure as legitimate targets in a brazen departure from conventional operational boundaries.

    LockBit announces return and critical infrastructure targeting (Source – Reliaquest)

    The cybersecurity community confronted a staggering surge in active data-leak sites, reaching an all-time high of 81 distinct platforms in Q3 2025, surpassing previous records and fragmenting the threat landscape into unpredictable attack patterns.

    This proliferation reflects a fundamental shift as smaller, emerging groups filled the operational void left by previously dominant ransomware operations, expanding their reach into sectors and regions historically considered low-risk targets.

    ReliaQuest analysts identified this quarter as a watershed moment that reshaped ransomware operations fundamentally.

    The convergence of English-speaking cybercriminals entering the RaaS market, combined with LockBit’s aggressive stance toward critical infrastructure, signals an escalation that positions organizations across all industries at heightened risk.

    The formation of strategic alliances between major ransomware groups, including LockBit, DragonForce, and Qilin, further amplifies the threat potential through shared resources, techniques, and infrastructure.

    The geographic expansion of ransomware activities demonstrated this fragmentation vividly, with Thailand experiencing a 69% surge in data-leak site appearances, driven primarily by the newly emerged Devman2 group.

    This expansion into developing digital economies highlights how cybercriminals exploit security gaps in rapidly modernizing infrastructure, moving beyond traditional Western targets to capitalize on regions with limited cybersecurity measures and enforcement capabilities.

    The ShinySp1d3r RaaS: Technical Architecture and Social Engineering Integration

    Scattered Spider’s development of ShinySp1d3r RaaS represents a sophisticated fusion of the group’s renowned social engineering capabilities with advanced encryption mechanisms.

    The service architecture combines traditional ransomware deployment with enhanced data exfiltration protocols, creating a dual-threat model that maximizes victim pressure through both operational disruption and information leverage.

    The technical implementation leverages Scattered Spider’s established attack vectors, particularly their exploitation of weak help-desk verification processes for password and multi-factor authentication resets.

    The group’s methodology involves comprehensive reconnaissance phases where attackers gather detailed organizational intelligence through open-source intelligence gathering and social media profiling before initiating contact with target help-desk personnel.

    ReliaQuest researchers noted that ShinySp1d3r RaaS incorporates advanced persistence mechanisms that maintain network access even after initial remediation attempts.

    The malware establishes multiple communication channels with command and control infrastructure, utilizing encrypted tunneling protocols to evade detection by conventional network monitoring solutions.

    The encryption algorithm employs a hybrid approach, combining symmetric key encryption for file processing speed with asymmetric cryptography for secure key management.

    The ransom note structure, as revealed in Telegram communications, demonstrates professional presentation designed to maximize psychological pressure while providing clear payment instructions.

    The note includes unique victim identifiers, specific bitcoin wallet addresses generated per victim, and escalating payment schedules that increase financial pressure over time.

    Technical analysis indicates the malware performs selective encryption, targeting critical file extensions while preserving system functionality necessary for ransom payment processing.

    Scattered Spider hints at RaaS development on Telegram (Source – Reliaquest)

    The service’s differentiation lies in its integration with existing breach-and-leak operations, particularly through collaboration with ShinyHunters, enabling comprehensive data theft before encryption deployment.

    This approach allows operators to maintain leverage even if victims recover encrypted data through backups, as the threat of data exposure remains viable for extended extortion campaigns.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Data-Leak Sites Hit an All-Time High With New Scattered Spider RaaS and LockBit 5.0 appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In recent weeks, security teams worldwide have grappled with a new ransomware strain that has shattered expectations for speed and sophistication.

    First detected in late September 2025, this variant encrypts critical data within seconds of execution, leaving little time for intervention.

    Organizations across manufacturing, healthcare, and finance sectors have reported system-wide outages as attackers deploy large-scale campaigns that weaponize remote desktop protocol (RDP) exploits and phishing-laden spear-phishing emails.

    Initial forensic analysis indicates the malware propagates via a custom loader that leverages unsecured RDP sessions and hides within packed DLL modules, enabling rapid lateral movement across networks.

    As the ransomware spread, forensic investigators noted unusual callbacks to command-and-control servers hosted on bullet-proof infrastructures.

    These C2 domains appear to utilize fast-flux DNS rotation, complicating takedown efforts. Encrypted communications use ChaCha20 streams tethered to unique session tokens, ensuring each attack instance remains isolated.

    Victims report payload sizes under 100 KB—remarkably small for contemporary ransomware—suggesting extreme code optimization.

    Early incident response teams struggled to decrypt locked volumes before data destruction routines triggered, wiping backup snapshots and volume shadow copies across Windows hosts.

    Fortinet researchers identified this strain after observing a cluster of high-severity alerts triggered by anomalous DLL loads and abnormal file renaming patterns on customer networks.

    Investigators from Fortinet’s FortiGuard Labs found the malware’s polymorphic engine reintroduces minor code alterations upon each compilation, thwarting signature-based detection in antivirus products.

    Dynamic analysis revealed that the encryption routine forks a child process that drops a loader stub into memory, then patches in-shell encryption code to prioritize speed over obfuscation.

    Within hours of discovery, threat intelligence teams confirmed the emergence of new ransom notes demanding payouts in Monero, with amounts tailored per victim based on automated asset valuations.

    Chaos-C++ ransom note (Source – Fortinet)

    Cryptographic keys are generated using a hybrid RSA-EC scheme, blending 3072-bit RSA for key exchange with elliptic-curve ChaCha20 for file encryption.

    The result is rapid file locking coupled with near-unbreakable key exchange.

    Infection Mechanism: In-Memory Execution and Loader Hand-Off

    A deeper look at this strain’s infection mechanism reveals a two-stage in-memory execution chain designed for stealth and speed.

    The initial dropper masquerades as a legitimate MSI installer and uses Windows Management Instrumentation (WMI) to invoke the secondary payload directly in kernel memory.

    Upon execution, the following code snippet illustrates how the loader allocates memory, writes the decryption stub, and transfers execution:-

    LPVOID exec_mem = VirtualAlloc(NULL, shellcodeSize, MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);
    RtlCopyMemory(exec_mem, encryptedShellcode, shellcodeSize);
    DWORD oldProtect;
    VirtualProtect(exec_mem, shellcodeSize, PAGE_EXECUTE_READ, &oldProtect);
    ((void(*)())exec_mem)();

    This technique bypasses disk writes entirely, leaving minimal artifacts on the host filesystem. Once the loader is active, it resolves API addresses at runtime rather than relying on imports, further evading static analysis.

    After decrypting its main module, the ransomware immediately scans local drives and network shares for files matching predefined extensions, spawning parallel threads to maximize multicore encryption throughput.

    By orchestrating these operations fully in memory, the malware undermines traditional endpoint-based detection tools and accelerates encryption speeds to under 30 seconds for 10 GB of data on modern CPUs.

    This in-memory hand-off also grants the malware robust persistence: the loader injects a tiny stub into the LSASS process and registers a scheduled task that triggers the payload at system startup.

    Combined with registry run-keys and WMI event subscriptions, victims face significant challenges during remediation, often requiring full system rebuilds to guarantee eradication.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Chaos Emerges as Faster, Smarter, and More Dangerous Ransomware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ‘Stop trying to control every step’ of shipbuilding, senator tells Navy. Tim Sheehy, R-Mont., a freshman senator and former SEAL, thinks the sea service needs to abandon its decades-old practice of being extremely hands-on during the construction of its ever-more-complicated warships. 

    An average naval officer is not a shipbuilding expert. They're just not,” Sheehy said Wednesday at a CSIS maritime-security event. “It takes decades to build that institutional knowledge of not just naval architecture, but also knowledge of the industrial base, to effectively build the ship and build it fast and build it right. And the Navy lost that institutional knowledge decades ago.” And, he said, if the Navy can shift its focus from requirements—and change orders—to outcomes, the rest of the Pentagon may follow.

    Spread the repair workload. For his part, Senate Armed Services Committee ranking member Tim Kaine, D-Va., said the Navy should look to share maintenance and repair work with allies and partners. “We have to be 100 percent better. And that is not incremental, that is, again, expanding your capacity through creative work with allies and bringing the private sector—and the innovative part of the private sector, not just the incumbent part of the private sector—bringing them in a much more robust way,” Kaine said at the same event. Defense One’s Lauren C. Williams has more, here.

    Lawmakers call for more defense biotech research as China pursues breakthroughs. As the Trump administration slashes scientific research funding, Sen. Todd Young, R-Ind., and his colleagues are hoping to impress upon the executive branch the necessity of biotech as a national-security priority. “One general category in which the Chinese, in particular, are out-classing us, is in bio-manufacturing, industrial applications of biotech – new materials, for example – and new life-saving compounds that could be a great utility to warfighters,” Young said at a Wednesday event hosted by the With Honor Institute.

    See 49 recommendations for how the U.S. can invest in and use biotech in defense from an April report by Young’s National Security Commission on Emerging Biotechnology. Defense One’s Meghann Myers reports, here.


    Welcome to this Thursday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson and Bradley Peniston. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1969, Illinois Gov. Richard Ogilvie ordered more than 2,500 Chicago-area National Guard troops to assist police after protests spread during the trial of the “Chicago Eight,” who were charged with fomenting unrest during the previous year’s Democratic convention. 

    Around the Defense Department

    Sinking speedboats in the Caribbean won’t stop drugs from getting to the United States, writes the New York Times in an illustrated (and animated) explainer. The Trump administration has said that it is attacking boats—four in the past month—and killing all on board because they are smuggling drugs from Venezuela. “But Mr. Trump’s focus on Venezuela is at odds with reality: The vast majority of cocaine is produced and smuggled elsewhere in Latin America, according to data from the United States, Colombia and the United Nations. And Venezuela does not supply fentanyl at all, experts say.” The Times has maps, charts, and stats, here.

    Related reading: 

    Update: Trump’s Pentagon has opened nearly 300 investigations into critics of the slain far-right activist Charlie Kirk, the Washington Post reported Wednesday. The probes span service members, civilian workers and contractors, but they’ve resulted in just “a smattering of disciplinary action” so far. 

    Additional reading: 

    Trump’s militarization of American cities

    National Guard members from Texas were seen Thursday morning at an ICE facility in Chicago, the local Sun-Times newspaper reports. At least three vans with about 45 Texan National Guard troops arrived at the Broadview ICE facility late Wednesday. The troops can be seen in a video posted to social media Thursday morning. An estimated 200 Texas soldiers are in the Chicago area. 

    Later today, U.S. District Judge April Perry is set to hear arguments over Illinois Attorney General Kwame Raoul’s request for a temporary restraining order to block the deployment of both Illinois and Texas Guard members to Chicago. “The troops, along with about 300 from Illinois, had arrived Tuesday at a U.S. Army Reserve Center in Elwood, 55 miles (89 kilometers) southwest of Chicago. All 500 troops are under the Northern Command and have been activated for 60 days,” the Associated Press reports. 

    Update: Clergy and faith leaders have joined protests at the ICE facility in Broadview. “Three say they’ve been shot with pepper balls, sometimes while praying,” the Religion News Service reported Tuesday.  

    More dissent from Democratic lawmakers: “This is the fourth time that Trump has taken the extreme and dangerous move to send the military into an American city without the consent of state and local authorities,” Rep. John Garamendi of California said in a statement Wednesday. “The Founders made clear the distinction between presidents and kings. Presidents do not get personal militaries, dictators do,” he said. “Fearful of kings and occupying military forces, our Founders thought hard about how to ensure military forces were responsive to lawful, civilian control and not inappropriately used against their fellow citizens…These actions are unacceptable and contrary to the democratic values our nation was founded upon.” 

    Mapped: See how militarism is spreading across U.S. cities targeted by Trump in this map from the Associated Press, published Wednesday. 

    Trump held a roundtable discussion with mostly far-right influencers Wednesday to signal aggressive new measures targeting anti-fascism protesters. Attorney General Pam Bondi attended, and told the president in front of cameras Wednesday, “Just like we did with cartels, we are going to take the same approach, President Trump, with antifa—destroy the entire organization from top to bottom. We are going to take them apart.”

    Critical reax: “Cartels have actual leadership structures, central funding, command and control, and more,” Aaron Reichlin-Melnick of the American Immigration Council pointed out on social media. “‘Antifa’ is mostly a philosophy. That the Attorney General doesn't know the difference is quite the thing to admit!”

    • By the way: Eight of the 12 “influencers” invited to Trump’s antifa roundtable have direct financial ties to Talking Point USA, the far-right activist organization founded by Charlie Kirk, researcher Jared Holt pointed out online Thursday. 

    Trump called protesters “paid anarchists,” and claimed, “They're like insurrectionists. They're terrible people, but you really wonder why. Why are they doing it? What are they gaining? Other than they're obviously paid. They're paid a lot of money.” He also told his audience at the roundtable, “You'll be finding it out very soon, you should see what we have on these people. These are bad people. These are people that want to destroy our country. We're not going to let it happen.”

    The White House on Wednesday also released a screed targeting the city of Portland, Oregon, which it claimed has been turned “into a wasteland of firebombs, beatings, and brazen attacks on federal officers and property” because of “an Antifa-led hellfire.” 

    “Premeditated anarchy” is what Trump called protests in Portland. “That’s why, as President Donald J. Trump mobilizes federal resources to safeguard lives and property,” the White House said in its Portland flier. 

    See for yourself: Here’s on-the-ground video from protests in Portland on Tuesday.

    Deportation-nation update: The U.S. conducted at least 1,464 immigration enforcement flights last month, including removals to 48 countries, according to open-source observers at ICE Flight Monitor from Human Rights First. That represents “the highest monthly total to date, averaging 49 flights per day.” 

    During such flights, “individuals are nearly always restrained by handcuffs, waist chains and leg irons, including during any layovers and fuel stops,” HRF writes, noting, “The harsh conditions during enforcement flights raise serious human rights concerns.”

    Additional reading: 

    Israel

    Developing: Israel and Hamas appear to be close to forging some kind of ceasefire in Gaza. “Israel said a truce would take effect on Friday and start a 72-hour window to exchange hostages and prisoners,” the New York Times reports almost exactly two years after the conflict erupted with a brutal surprise attack by Hamas militants. Trump said he’s considering traveling to the region sometime this weekend, too.

    Caveats: This “initial agreement addresses only a few of the 20 points in a plan Mr. Trump proposed last month, and some of the most difficult issues between Israel and Hamas appeared to have been left to a future phase of negotiations. Those include who would rule postwar Gaza and whether, to what degree and how Hamas would lay down its weapons.”

    And lastly: A Scottish maritime museum somehow ended up in Israel’s video models of alleged Hamas infrastructure, Israel’s progressive +972 Mag reported Wednesday. 

    The gist: As Israel’s military responded to the Hamas attack two years ago, its three-dimensional illustrations posted to social media “coalesced into a distinct and consistent visual style. They usually begin with satellite imagery, followed by transitions into 3D visualizations that then often present an X-ray wireframe view of an interior or underground scene, intercut with real drone footage of airstrikes or bombings.” 

    However, after reviewing 43 animations produced by the Israeli army since October 7, 2023, “many contain serious spatial inaccuracies or prefabricated assets—sourced not from classified intelligence but rather from commercial libraries, content creators, and cultural institutions.” And one of those inaccuracies included “scans from a boat-building workshop in Scotland” that had been “uploaded to the internet by the Scottish Maritime Museum under an unrestricted Creative Commons license.” Those files were used by Israel to illustrate alleged “Hamas bunkers or Iranian weapons facilities.”

    So far, more than 50 third-party assets lifted from unrelated artists and institutions have been identified, and those “were replicated hundreds of times across animations of sites ranging from Gaza to Iran,” reporter Oren Ziv writes. Story, here

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and lookalike phishing websites by impersonating popular apps like WhatsApp, Google Photos, TikTok, and YouTube as lures to install them. “Once active, the spyware can exfiltrate SMS messages, call logs, notifications, and device information; taking photos with the front

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hundreds of Department of Homeland Security employees have been marked for reassignment to agencies focused on Trump-era border-security and deportation work, and could be dismissed if they don’t comply, according to multiple people familiar with the matter and a copy of one notice viewed by Nextgov/FCW.

    In recent weeks, the employees have been directed to transfer from various DHS agencies (including Cybersecurity and Infrastructure Security Agency, the Federal Emergency Management Agency, Transportation Security Administration and the U.S. Coast Guard) to other ones (including Immigration and Customs Enforcement, the Federal Protective Service, and Customs and Border Protection). 

    The people spoke on the condition of anonymity because they weren’t authorized to publicly communicate their knowledge of the shifts. 

    The notice seen by Nextgov/FCW gave the employee it addressed just one week to accept the Management-Directed Reassignment, or MDR, or face possible termination. They are then given 60 days to move, with some flexibility on deadlines in certain circumstances.

    “If you do not respond, the Department of Homeland Security will consider your non-response as a declination of the directed reassignment,” it reads. “If you choose to decline this reassignment or accept but fail to report for duty, you may be subject to removal” from federal service, it says. Bloomberg News first reported details of the reassignments.

    The MDRs have targeted people in CISA’s Cybersecurity Division, including its Capacity Building subdivision that focuses on improving and centralizing the cybersecurity posture of federal agencies, one of the people said. The Stakeholder Engagement Division, which oversees the agency’s national and international partnership work, was also affected, the person added.

    Another person said hundreds of FEMA staffers, including human resources and personnel security workers, were moved to positions in ICE throughout hurricane season, the peak of which occurs from around August to October. Many of those employees are still there, that person added.

    The moves align with broader White House immigration-policy priorities. The Trump administration has steered tens of billions of dollars toward immigration and border-security agencies as part of a renewed push to expand detention capacity, accelerate deportations and fortify barriers along the U.S. southern border. 

    Many, but not all, of the reassignments direct staff to ICE, CBP, and FPS, two people said.

    The shifts could slow responses to cyber threats that have targeted the federal government. 

    CISA personnel are addressing a Cisco vulnerability — recently exploited by a hacking group potentially linked to China — that predominantly affects government networks. And over the summer, a hacker stole employee data from both the Federal Emergency Management Agency and CBP, Nextgov/FCW first reported.

    Cybersecurity has been historically a bipartisan darling of Washington, but CISA, the nation’s core civilian cyberdefense agency, has been criticized by Donald Trump ever since it declared the 2020 election "the most secure in American history." Top officials in the second Trump administration have aimed to “refocus” its mission amid GOP accusations that the agency engaged in censorship of Americans’ free speech. Those claims stem from CISA’s earlier collaboration with social media platforms to remove false information online concerning the COVID-19 pandemic, elections and other divisive subjects around 2020.

    Across DHS, there is widespread uncertainty and fear among some employees about the financial and legal consequences of accepting or refusing the reassignments, including potential loss of severance pay, penalties or restrictions on future government work, the people familiar said. 

    DHS staff who have taken offers to leave the government are largely barred from interacting with people still inside the agency, and risk fines and jail time if they are caught doing so, another person said, describing their experience trying to seek help on completing a task by asking a former employee for assistance.

    The reassignments appear to be used as a strategy to encourage voluntary departures without direct firings, the person added. When they applied for their current position, for example, this person indicated that they were unwilling to relocate, and the reassignment they received completely circumvented that constraint.

    “DHS routinely aligns personnel to meet mission priorities while ensuring continuity across all core mission areas,” DHS Assistant Secretary Tricia McLaughlin said in a statement. “Any notion that DHS is unprepared to handle threats to our nation because of these realignments is ludicrous, especially given the abject failure at the hands of CISA in the last administration.”

    “CISA was adrift and was focused on censorship, branding, and electioneering instead of defending America’s critical infrastructure. Today, CISA is focused squarely on executing its statutory mission: serving as the national coordinator for securing and protecting the nation’s critical infrastructure and is delivering timely, actionable cyber threat intelligence, supporting federal, state and local partners, and defending against both nation-state and criminal cyber threats,” she added.

    Editor's note: This story has been updated to include comment from DHS.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶