• Google has introduced CodeMender, an AI-powered agent designed to automatically detect and patch security flaws in software. Announced on 6 October 2025 by Raluca Ada Popa and Four Flynn, CodeMender represents a major step toward leveraging artificial intelligence for proactive code security. CodeMender builds on Google’s earlier AI research in vulnerability discovery, such as Big Sleep […]

    The post Google Unveils CodeMender – An AI Agent That Automatically Fixes Vulnerable Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In recent weeks, security teams have observed a surge in malvertising campaigns distributing what appears to be a fully functional PDF editor.

    Dubbed TamperedChef, this malware masquerades as a legitimate application—AppSuite PDF Editor—leveraging convincing advertisements to lure European organizations and individuals into downloading the installer.

    Once executed, the installer exhibits expected functionalities for nearly two months, during which victims remain unaware of its true nature.

    During installation, users encounter a professional end-user license agreement dialogue consistent with mainstream software offerings.

    This dialog, displayed in multiple languages, reinforces the illusion of legitimacy and bypasses automated sandbox detonations.

    EULA dialog displayed by the MSI installer (Source – Withsecure Labs)

    Clicking Accept and Install allows the MSI package to proceed without requiring administrative privileges, making it particularly effective in corporate environments with restricted user rights.

    WithSecure Labs analysts identified TamperedChef following a sudden spike in credential-theft incidents within enterprise environments.

    Telemetry data revealed that, upon activation, the malware’s hidden payload initiates the systematic harvesting of browser-stored usernames and passwords.

    This exfiltration occurs silently, with stolen credentials transmitted to attacker-controlled infrastructure, paving the way for backdoor access and further lateral movement.

    Once the malicious payload embedded within pdfeditor.js activates, the application transitions from a benign editor to a stealthy credential harvester.

    Utilityaddon.node’s exported functions (Source – Withsecure Labs)

    The attack is orchestrated using a custom NodeJS module—Utilityaddon.node—which interacts with native Windows APIs to manipulate registry entries and scheduled tasks for persistence.

    By inserting autorun registry keys under the current user hive, the malware ensures execution at each logon without elevating privileges.

    Infection Mechanism

    The infection begins when a user clicks a malicious advertisement and downloads the AppSuite PDF Editor installer from vault.appsuites.ai.

    This installer, created with the Nullsoft Scriptable Install System (NSIS), unpacks the Electron-based application under the user’s profile directory.

    The primary executable, PDF Editor.exe, launches a Chromium-based interface that loads additional JavaScript modules from remote servers.

    Before any PDF editing functionality is available, the installer sets persistence via an autorun registry entry named PDFEditorAutoUp that points to the installed application.

    At runtime, the obfuscated pdfeditor.js script checks for command-line switches, notably --cm, which triggers malicious routines:-

    if (app.commandLine.hasSwitch('cm')) {
      utilityAddon.setupTasks(globals.scheduledTaskName);
      startCredentialHarvest();
    }

    By using command-line flags, the threat actors can toggle between benign and malicious behaviors, complicating detection.

    ‘–cm’ command line argument present in S3-Forge (Source – Withsecure Labs)

    Once the script executes startCredentialHarvest(), it scans local browser storage for credentials and dispatches them over HTTPS to attacker-controlled endpoints, while the visible PDF editor interface remains functional to avoid arousing suspicion.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post TamperedChef Malware as PDF Editor Harvest Browser Credentials and Allows Backdoor Access appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has introduced CodeMender, a new artificial intelligence-powered agent that automatically enhances software security by identifying and fixing vulnerabilities.

    This initiative addresses the growing gap between the rapid, AI-assisted discovery of security flaws and the time-consuming manual effort required to patch them.

    Leveraging advanced AI, CodeMender not only reacts to new threats but also proactively rewrites existing code to eliminate entire classes of vulnerabilities.

    In its initial six months, the project has already contributed 72 security fixes to various open-source projects, some with codebases as large as 4.5 million lines.

    The development comes as AI tools like Google’s own Big Sleep and OSS-Fuzz accelerate the discovery of zero-day vulnerabilities, creating a volume of fixes that is becoming difficult for human developers to manage alone.

    AI Agent CodeMender

    CodeMender operates as an autonomous agent powered by Google’s Gemini Deep Think models. It is equipped with a suite of sophisticated tools that allow it to reason about software, debug complex issues, and validate its own changes.

    This ensures that any proposed patch is correct and does not introduce new problems or regressions. The agent’s comprehensive approach combines reactive patching of new vulnerabilities with proactive rewriting of code to adopt more secure practices.

    To identify the true origin of a security flaw, CodeMender employs advanced program analysis techniques, including static and dynamic analysis, fuzzing, and differential testing.

    For instance, in one case involving a heap buffer overflow crash, the agent looked beyond the immediate error and identified the root cause as an incorrect stack management of XML elements during parsing.

    It then devised an effective patch. The system also uses specialized multi-agent systems, including an LLM-based critique tool that analyzes code modifications to prevent regressions and enables the agent to self-correct.

    Beyond fixing individual bugs, CodeMender is designed to proactively harden codebases against future attacks. In one significant application, the agent was deployed to the widely used libwebp image compression library.

    It systematically applied -fbounds-safety annotations, a security feature that adds bounds checks to code. According to Google, this single measure would have rendered the notorious libwebp vulnerability (CVE-2023-4863), which was used in a zero-click iOS exploit, unexploitable.

    While the early results are promising, Google is proceeding with caution, ensuring every AI-generated patch is reviewed by human researchers before being submitted.

    The company is gradually increasing its outreach to maintainers of critical open-source projects to offer CodeMender-generated patches and gather feedback.

    The ultimate goal is to refine the system and release it as a public tool for all software developers. This marks a significant step in utilizing AI to enhance software security for everyone. Google plans to share more details in technical papers and reports in the coming months.

    Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

    The post Google’s New AI Agent, CodeMender, Automatically Rewrites Vulnerable Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ClamAV 1.5.0 is now available with new features that strengthen malware detection in Microsoft Office and PDF documents. This update marks a significant step forward for users who need reliable and thorough scanning of encrypted files and embedded links. Alongside improved file checks, the release also adds support for external signature verification, flexible hashing options, […]

    The post ClamAV 1.5.0 Released with Enhanced MS Office and PDF File Verification appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The rapid adoption of generative AI (GenAI), especially large language model (LLM) chatbots, has revolutionized customer engagement by delivering unparalleled efficiency and personalization. Yet, with this transformative power comes an equally formidable risk: adversaries are increasingly weaponizing AI applications to gain unauthorized access to critical systems. A compromised chatbot can morph from a helpful assistant […]

    The post AI Chatbot Exploited as a Backdoor to Access Sensitive Data and Infrastructure appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • OpenAI has taken decisive action to stop misuse of its ChatGPT models by banning accounts tied to a group of Chinese hackers. This move reflects OpenAI’s core aim to ensuring artificial general intelligence benefits everyone. By setting clear rules and acting swiftly on policy violations, OpenAI hopes to keep AI tools safe and accessible for […]

    The post OpenAI Blocks ChatGPT Accounts Linked to Chinese Hackers Developing Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Yurei ransomware first emerged in early September 2025, targeting Windows environments with a sophisticated Go-based payload designed for rapid, large-scale encryption.

    Once executed, the malware enumerates all accessible local and network drives, appends a .Yurei extension to each file, and writes unique ransom notes in every affected directory.

    Ransom Note (Source – Cyfirma)

    Its operators then demand payment over Tor, warning that shadow copies, backups, and log files have been irreversibly destroyed to frustrate recovery efforts.

    Distributed primarily through stolen credentials and spear-phishing campaigns, Yurei exploits Windows Management Instrumentation (WMI) and credential-based remote execution to gain a foothold in corporate networks.

    After initial compromise, the binary stages itself in temporary folders and deploys PowerShell scripts that disable Volume Shadow Copy Service (VSS) and delete all existing backups.

    Cyfirma analysts noted that the ransomware’s combination of per-file ChaCha20 encryption keys wrapped with ECIES and its self-cleaning routines make forensic investigation exceedingly difficult.

    Upon deployment, Yurei enters an infinite propagation loop, copying itself onto USB devices as WindowsUpdate.exe and into writable SMB shares as System32Backup.exe.

    This dual propagation strategy allows the malware to leapfrog network segmentation controls and spread laterally with minimal detection.

    Victims report that encrypted files become entirely inaccessible, since each ChaCha20 key and nonce pair is asymmetrically wrapped with the attackers’ embedded public key and stored in a custom header separated by the ASCII marker 0x7c7c.

    Infection Mechanism and Lateral Propagation

    The core of Yurei’s infection mechanism relies on PowerShell and native Windows utilities to propagate across removable and network drives.

    First, it queries all volumes of type “removable” via WMI and checks for an existing WindowsUpdate.exe at each root.

    If absent, it copies the ransomware executable from its temp staging directory. Next, it enumerates SMB shares via PowerShell’s Get-SmbShare cmdlet and iterates over each writable share path, using Copy-Item to drop System32Backup.exe.

    A snippet illustrating the removable‐media propagation routine is shown below.

    # Figure 1: Removable drive propagation using PowerShell
    $drives = Get-WmiObject -Class Win32_Volume | Where-Object {$_.DriveType -eq 2}
    foreach ($drive in $drives) {
        $path = "$($drive.DriveLetter)\WindowsUpdate.exe"
        if (-not (Test-Path $path)) {
            Copy-Item -Path $MyInvocation.MyCommand.Definition -Destination $path -Force
        }
    }

    Once copied, Yurei spawns each dropped instance remotely via a PSCredential-based CIM session or PsExec-style invocation, ensuring the payload executes under elevated privileges without user interaction.

    The script constructs a System.Management.Automation.PSCredential object and invokes Invoke-CimMethod to create a process on remote hosts, copying its own binary bytes to disk before execution.

    By combining these stealthy propagation loops with aggressive anti-forensics—deleting VSS snapshots (vssadmin Delete Shadows /Quiet), clearing event logs, and overwriting its binary in memory—Yurei represents a highly automated, self-propagating threat designed for maximum network penetration and irreversible data compromise.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Yurei Ransomware Leverages SMB Shares and Removable Drives to Encrypt Files appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have identified two significant vulnerabilities in Nagios Log Server that expose critical system information and allow unauthorized service manipulation. The vulnerabilities, tracked as CVE-2025-44823 and CVE-2025-44824, affect versions prior to 2024R1.3.2 and pose serious risks to enterprise monitoring infrastructure. CVE ID Affected Product CVSS Score Severity Impact CVE-2025-44823 Nagios Log Server 9.9 CRITICAL […]

    The post Nagios Vulnerability Allows Users to Retrieve Cleartext Administrative API Keys appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco has announced the release of ClamAV 1.5.0, a significant update to the open-source antivirus engine that introduces major security enhancements, new document scanning capabilities, and extensive API improvements.

    This version strengthens the platform’s detection and verification mechanisms, with a particular focus on Microsoft Office documents, PDF files, and overall cryptographic integrity, providing users with more robust tools to combat modern malware threats.

    A key addition in ClamAV 1.5.0 is the ability to determine if a Microsoft Office document based on the OLE2 format is encrypted. This feature helps security systems identify potentially malicious files that use encryption to evade detection.

    Furthermore, the update enhances metadata generation by introducing the capability to record Uniform Resource Identifiers (URIs) found within HTML and PDF files.

    When the generate-JSON-metadata feature is enabled, ClamAV can now extract and log these links, providing valuable data for threat analysis.

    Users who require the JSON metadata feature but do not wish to record URIs have granular control through new configuration options, such as JsonStoreHTMLURIs and JsonStorePDFURIs, which can be set in clamd.conf or via the command line.

    Strengthened Security and Signature Verification

    Version 1.5.0 brings substantial improvements to the security and integrity of the scanning process. A major change is the introduction of CVD signing and verification with external .sign files.

    Freshclam will now download these external signature files alongside database and patch files, allowing for more secure verification. To support this, ClamAV now installs a certs directory and provides new configuration options to manage it.

    Additionally, the release introduces a FIPS-like limits option that disables the use of MD5 and SHA1 for verifying digital signatures and trusting files.

    This change mitigates concerns over weaker hashing algorithms and is critical for environments requiring FIPS compliance. The clean-file scan cache has also been upgraded from MD5 to the more secure SHA2-256 algorithm.

    This release delivers a wealth of API enhancements and other notable improvements for developers and administrators.

    The public API has been updated with new functions like cl_cvdverify_ex and extended hashing functions that allow callers to bypass FIPS hash limits when necessary.

    A new class of scan callback functions has been added, providing fine-grained control at various stages of the scanning process, including before hashing, before scanning, and upon alert generation.

    Other improvements include regex support for the OnAccessExcludePath option, more precise byte-scanned counters in ClamScan, and new command-line options for providing hash and file-type hints.

    The update also addresses numerous bugs, including a stack buffer overflow in the phishing signature load process, an infinite loop when scanning certain email files, and various issues identified through static analysis.

    Cyber Awareness Month Offer: Upskill With 100+ Premium Cybersecurity Courses From EHA's Diamond Membership: Join Today

    The post ClamAV 1.5.0 Released with New MS Office and PDF Verification Features appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an attempt on the part of the financially motivated threat actors to conduct more effective ransomware attacks, ReliaQuest said in a report shared with The Hacker News. “Announced shortly

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶