• Microsoft has confirmed it is investigating a significant bug in the classic Outlook for Windows desktop client that causes the application to fail upon launch.

    The issue, which appears to be linked to Microsoft Exchange logon attempts, prevents users from accessing their mailboxes and displays a critical error message, disrupting daily workflows for affected individuals and organizations.

    The problem manifests when a user attempts to open the classic version of Outlook for Windows. Instead of loading the mailbox, the application presents an error message stating, “Cannot start Microsoft Outlook. Cannot open the Outlook window. The set of folders cannot be opened. The attempt to log on to Microsoft Exchange has failed.”

    While this generic error can stem from various causes, Microsoft has noted that recent support cases point to a specific issue with user mailboxes attempting to connect to the service.

    Microsoft Outlook Windows Bug

    Technical Details of the Outlook Bug

    For IT administrators and technical teams looking to confirm if their users are impacted by this specific bug, Microsoft has provided a clear diagnostic method. By capturing a Fiddler trace while reproducing the error, administrators can search for a specific exception.

    The presence of the following error in the trace log confirms the issue:
    Microsoft.Exchange.RpcClientAccess.ServerTooBusyException: Client is being backed off ---> Microsoft.Exchange.RpcClientAccess.ClientBackoffException: ErrorCode: ClientBackoff, LID: 49586 - Authentication concurrency limit is reached.

    This exception indicates that the connection is failing because the user’s client is exceeding the authentication concurrency limit set by the server, effectively being “backed off” or throttled by Microsoft Exchange Online.

    This prevents the Outlook client from successfully logging in and opening the user’s mailbox folders.

    As of September 26, 2025, Microsoft’s official status for the issue is “INVESTIGATING.” There is currently no direct fix that users or administrators can apply themselves.

    To resolve the problem, organizations must open a support case through the Microsoft 365 Admin portal. The Exchange Online support team will then need to implement a change on the backend to mitigate the authentication issue for the affected mailboxes.

    In the meantime, Microsoft has provided immediate workarounds to ensure users can continue to access their email. Individuals affected by this issue are advised to use Outlook Web Access (OWA), the browser-based version of Outlook, or switch to the new Outlook for Windows client.

    These clients are not affected by the bug and provide a reliable alternative while a permanent solution for the classic desktop application is being developed. Organizations are encouraged to communicate these workarounds to their users to minimize disruption.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft Outlook for Windows Bug Leads to Crash While Opening Email appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Chrome team has released Chrome 141.0.7390.54/55 to the stable channel for Windows, Mac, and Linux, rolling out over the coming days and weeks. This update delivers critical security fixes, including 21 distinct vulnerabilities that span high, medium, and low severity. External researchers contributed to several of these fixes, earning rewards up to $25,000. Users are strongly […]

    The post Chrome Security Update Addressing 21 Vulnerabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft is currently investigating a significant bug affecting classic Outlook for Windows that prevents users from accessing their email accounts. The issue manifests as a persistent error message stating “Cannot start Microsoft Outlook. Cannot open the Outlook window. The set of folders cannot be opened. The attempt to log on to Microsoft Exchange has failed.” […]

    The post Microsoft Outlook Bug on Windows Devices Results in Repeated Email Crashes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Splunk released security advisories addressing multiple vulnerabilities affecting various versions of Splunk Enterprise and Splunk Cloud Platform. The flaws range from cross-site scripting (XSS) vulnerabilities to access control bypasses, with CVSS scores ranging from 4.6 to 7.5. Critical Vulnerabilities Identified The security advisories reveal six distinct vulnerabilities that primarily affect Splunk Web components. Two cross-site […]

    The post Splunk Enterprise Flaws Allow Attackers to Run Unauthorized JavaScript Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has unveiled a groundbreaking AI-powered ransomware detection system for its Drive desktop application, representing a significant advancement in cybersecurity protection for organizations worldwide. This innovative feature automatically halts file synchronization when malicious encryption attempts are detected, preventing widespread data corruption across enterprise networks. Google Drive desktop ransomware detection alert with file syncing paused and […]

    The post Google Drive Desktop Gets AI-Powered Ransomware Detection to Block Cyberattacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Splunk has released patches for multiple vulnerabilities in its Enterprise and Cloud Platform products, some of which could allow attackers to execute unauthorized JavaScript code, access sensitive information, or cause a denial-of-service (DoS) condition.

    The advisories, published on October 1, 2025, detail six security flaws, with severity ratings ranging from Medium to High.

    The most critical vulnerability is a Server-Side Request Forgery (SSRF) flaw, tracked as CVE-2025-20371, with a high CVSS score of 7.5.

    This vulnerability could allow an unauthenticated attacker to trigger a blind SSRF, potentially enabling them to perform REST API calls on behalf of an authenticated, high-privileged user.

    Successful exploitation requires the enableSplunkWebClientNetloc setting to be enabled and likely involves phishing the victim to initiate a request from their browser.

    Code Execution and Information Disclosure Flaws

    Two vulnerabilities directly address the execution of unauthorized JavaScript code, a form of cross-site scripting (XSS).

    • CVE-2025-20367 (CVSS: 5.7): A low-privileged user can craft a malicious payload through the dataset.command parameter of a specific endpoint, leading to the execution of JavaScript code in a user’s browser.
    • CVE-2025-20368 (CVSS: 5.7): Similarly, a low-privileged user can inject a malicious payload into the error messages and job inspection details of a saved search, resulting in unauthorized code execution.

    Another significant flaw, CVE-2025-20366 (CVSS: 6.5), allows for information disclosure. In this scenario, a low-privileged user without ‘admin’ or ‘power’ roles could access the results of an administrative search job running in the background.

    If the attacker correctly guesses the unique Search ID (SID) of the job, they could retrieve potentially sensitive search results.

    Denial of Service and XXE Vulnerabilities

    The security update also addresses three medium-severity vulnerabilities that could impact system availability and integrity:

    • CVE-2025-20370 (CVSS: 4.9): A user with the change_authentication capability can send multiple LDAP bind requests to an internal endpoint, causing high CPU usage and a potential DoS that requires an instance restart to resolve.
    • CVE-2025-20369 (CVSS: 4.6): A low-privileged user can perform an XML External Entity (XXE) injection through the dashboard tab label field, which could also lead to a DoS attack.

    Affected Products and Mitigations

    The vulnerabilities affect multiple versions of Splunk Enterprise and Splunk Cloud Platform. The affected Splunk Enterprise versions include those below 9.4.4, 9.3.6, and 9.2.8. For some flaws, version 10.0.0 is also affected.

    Splunk has released patches and urges customers to upgrade to the following or later versions:

    CVE IDVulnerability TypeCVSS 3.1 ScoreAffected ProductAffected VersionsFixed Versions
    CVE-2025-20366Information Disclosure6.5 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8
    Splunk Cloud PlatformBelow 9.3.2411.111 Below 9.3.2408.119 Below 9.2.2406.1229.3.2411.111 9.3.2408.119 9.2.2406.122
    CVE-2025-20367Cross-Site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8
    Splunk Cloud PlatformBelow 9.3.2411.109 Below 9.3.2408.119 Below 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122
    CVE-2025-20368Cross-Site Scripting (XSS)5.7 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8
    Splunk Cloud PlatformBelow 9.3.2411.108 Below 9.3.2408.118 Below 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123
    CVE-2025-20369XXE Injection4.6 (Medium)Splunk Enterprise9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.79.4.4 9.3.6 9.2.8
    Splunk Cloud PlatformBelow 9.3.2411.108 Below 9.3.2408.118 Below 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123
    CVE-2025-20370Denial of Service (DoS)4.9 (Medium)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8
    Splunk Cloud PlatformBelow 9.3.2411.108 Below 9.3.2408.118 Below 9.2.2406.1239.3.2411.108 9.3.2408.118 9.2.2406.123
    CVE-2025-20371Server-Side Request Forgery (SSRF)7.5 (High)Splunk Enterprise10.0.0 9.4.0 – 9.4.3 9.3.0 – 9.3.5 9.2.0 – 9.2.710.0.1 9.4.4 9.3.6 9.2.8
    Splunk Cloud PlatformBelow 9.3.2411.109 Below 9.3.2408.119 Below 9.2.2406.1229.3.2411.109 9.3.2408.119 9.2.2406.122

    Splunk has confirmed it is actively patching all Splunk Cloud Platform instances and will notify customers upon completion.

    For users unable to apply the updates immediately, several workarounds are available. A common mitigation for many of the vulnerabilities is to disable Splunk Web if it is not required.

    For the SSRF flaw (CVE-2025-20371), administrators can mitigate the risk by setting enableSplunkWebClientNetloc to false in the web.conf file.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Multiple Splunk Enterprise Vulnerabilities Let Attackers Execute Unauthorized JavaScript code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • St. Louis is vying to be the next big defense tech hub with a new initiative meant to attract startups and investors eager to build up the geospatial industry. But while advocates see the Gateway City as an obvious choice, there's work to do to convince others.

    “A lot is manufactured for the Department of Defense here in St. Louis. Boeing—obviously used to be McDonnell Douglas—is here, and famous for the F-15, F/A-18, and all of those famous aircraft. There is an intersection of all of these things that come together for St. Louis that really is obvious to the people that live here, that maybe is not as obvious to the people outside,” said Mark Munsell, the former chief AI officer for the National Geospatial-Intelligence Agency who now leads the GeoFutures initiative. 

    GeoFutures is part of the Greater St. Louis, Inc. not-for-profit but investor supported effort to increase economic development in St. Louis by attracting new businesses, increasing the workforce, and research and development for geospatial AI in national security as well as other sectors like biotechnology and agricultural technology. The project recently released a three-year strategic roadmap and implementation plan designed to “improve the geospatial ecosystem.” 

    Why geospatial? Munsell said it’s “special because it does apply to all businesses, all domains, if you're trying to measure, discern something in space and time, geospace, geospatial technology helps you do that.” 

    The city is already home to offices of the National Geospatial-Intelligence Agency, which opened a new collaborative workspace this month, and major defense and geospatial players, including Maxar, Leonardo, and General Dynamics Information Technology. And while Boeing is moving Super Hornet upgrade work out of the area, the company plans to spend $1.8 billion to build a digital engineering and aviation facility in 2030. 

    NGA’s new multibillion-dollar facility has been under construction for years, and that helped grow defense tech expertise; GDIT, for one, doubled its local workforce to about 200 in the past five years. 

    The agency has data “analysts everywhere: the DC metro area, and then deployed at [combatant commands]. But when you look at the ratio of analyst expertise, they're really, really heavily concentrated in the St. Louis area,” said Will Clapperton, vice president for GDIT’s geospatial services and solutions. “Having modern capabilities in the local St. Louis area, in particular in the new headquarters building, is very mission-important to them… And as a product of that, our workforce has grown there. The amount of technicians and subject-matter experts to help get them into that new facility from a design and deployment perspective, and then migrate all their workforce into it, has been a huge focus over the last couple of years. It's a big part of why we, individually, as a company, have grown in that area.”

    GDIT has expanded its real estate holdings in the area to accommodate growing geospatial intelligence demands

    “Even though NGA is making a pretty significant investment in a new headquarters facility, they've still got a need for industry to provide other, I'll say, real estate capability to house and conduct those missions,” Clapperton said. 

    In recent years, he noted, GDIT’s office space in St. Louis has ballooned from housing just a few people to having space at a large office park called the Cortex with classified and unclassified components and expanded space. GDIT also has office space for personnel and SCIFs at the Globe Building, Clapperton said. 

    The city has also attracted newer companies—which it hopes to do more of, according to GeoFutures’ strategic roadmap, which recommends creating a dedicated organization to serve as a touchstone for geospatial startups, existing defense contractors, investors, and jobseekers.

    One of those companies is Scale AI, which is opening a new data center in the former headquarters of the Post-Dispatch newspaper near NGA’s campus. The company recently landed a $99 million Army contract for research and development.

    “With our government customers, they're all interested in building AI solutions. And the fuel for those AI solutions is the high-quality, AI-ready data that Scale produces, and training of that data happens at Scale’s St. Louis AI center,” A.J. Segal, who leads that center, told Defense One. “You can think of what we're building here is kind of that new arsenal for the 21st century. So instead of steel, we're forging this arsenal on the human capital and high-fidelity data that we have at our AI center, which are the two essential ingredients for AI-driven national security.” 

    Moving into the Post building will help bring San Francisco-based Scale AI closer to the geospatial community overall, potentially boosting partnerships with institutions like the University of Missouri, St. Louis and the geospatial-focused T-REX innovation center.

    “The thing that makes St. Louis a great opportunity to create that defense-tech hub is the fact that they've already begun this with their geospatial hub. There are companies that are already here, that are already working in defense, and there's companies such as Scale that really are sitting on both sides of the fence,” Segal said. “We're focused on cracking the code of that complex complicated geospatial data, and we've identified this talent pool here in Missouri, we provide them with the training, economic opportunities for people that probably would have never envisioned a career in tech or an emerging tech company."

    There’s been a push in recent years to broaden the Pentagon’s reach beyond the Beltway, specifically through the Defense Innovation Unit, which established regional offices to seek relationships outside Washington, D.C. 

    But there’s also been interest from Congress to do more, including a bill championed by Sen. Eric Schmitt, R-Mo., to “establish a network of regional hubs to foster innovation, collaboration, and rapid development of defense-related technologies.” 

    The Senate version of the 2026 defense authorization bill also includes a provision that would mandate a program “to develop, operate, and maintain incubator programs for secure facilities and networks at select universities” and “regional innovation hubs that strengthen the national security innovation base.” The 2025 National Defense Authorization Act mandates a geospatial-specific pilot program to bolster a skilled workforce near areas where NGA operates.

    St. Louis isn’t the only city competing to be a defense tech hub. The burgeoning Detroit-launched Reindustrialize summit was focused on reinvigorating defense and manufacturing in the Midwest. 

    “That Midwest spirit is special. I was born here in St. Louis…We have people that want to live here in St. Louis. They want to work here in St. Louis, and they have a special connection to the region, and they want to develop it,” Munsell said. “We have successful businessmen. We have billionaires that have been born here, grown up here, started businesses here, and in many cases, couldn't get venture capital, right? [They] had great ideas, great technology, graduated from the best universities here in St. Louis…but had to leave the area and take their ideas with them somewhere else, either Silicon Valley or Boston or wherever.”

    Now, Munsell hopes to help make St. Louis the right place for “entrepreneurs that see new opportunity.” 

    “If you have talented people…and when they get together and compare notes, there's this great potential to come up with something that

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ukrainian security agencies have issued an urgent warning regarding a sophisticated malware campaign targeting government and critical infrastructure sectors through weaponized XLL files distributed via compressed archives.

    The malicious campaign leverages Microsoft Excel add-in files containing the CABINETRAT backdoor, representing a significant evolution in targeted cyber operations against Ukrainian entities.

    The attack methodology involves distributing zip archives containing XLL files with names designed to evoke urgency and legitimacy, such as “dodatok.xll” embedded within “500.zip” archives.

    These files masquerade as documents relating to border security incidents, exploiting current geopolitical tensions to increase victim susceptibility.

    Upon execution, the malicious XLL files deploy a complex multi-stage payload that establishes persistent access to compromised systems.

    CERT-UA researchers noted the campaign’s sophisticated approach, identifying it as the work of threat group UAC-0245.

    The malware demonstrates advanced evasion capabilities and represents a concerning shift toward more sophisticated Office-based attack vectors targeting Ukrainian critical infrastructure.

    The campaign’s technical complexity and targeting patterns suggest state-sponsored origins with significant resources dedicated to bypassing modern security defenses.

    Infection Mechanism and Persistence Strategy

    The CABINETRAT malware employs a sophisticated multi-file deployment strategy that ensures persistent system access while evading detection mechanisms.

    When the initial XLL file executes through Excel’s xlAutoOpen function, it creates three distinct components across the victim system: a randomly named executable file with 15-20 characters (internally called “runner.exe”) placed in both the Startup folder and %APPDATA%\Microsoft\Office\, an XLL loader file “BasicExcelMath.xll” positioned in Excel’s XLSTART directory, and a PNG image file “Office.png” containing embedded shellcode.

    The persistence mechanism operates through multiple redundant pathways to ensure continued system access.

    The malware creates registry entries in the Windows Run key with randomized names, establishes scheduled tasks executing every 12 hours with limited privileges, and leverages Excel’s automatic add-in loading functionality.

    The runner executable launches Excel in hidden mode using the “/embed” parameter, automatically triggering the malicious BasicExcelMath.xll add-in without displaying visible Excel windows to users.

    The complete infection chain from initial XLL execution through final CABINETRAT deployment.

    The malware incorporates extensive anti-analysis measures including BIOS fingerprinting checks for virtualization software signatures, processor core and memory threshold validation, CPUID timing analysis to detect sandboxed environments, and PEB debugging flag verification.

    These sophisticated evasion techniques demonstrate the campaign’s advanced nature and dedication to avoiding security research efforts.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Ukraine Warns of Weaponized XLL Files Delivers CABINETRAT Malware Via Zip Files appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have uncovered a sophisticated Android malware campaign targeting seniors through fraudulent travel and social activity promotions on Facebook.

    The newly identified Datzbro malware represents a dangerous evolution in mobile threats, combining advanced spyware capabilities with remote access tools designed to facilitate financial fraud.

    This campaign, first detected in August 2025, has expanded beyond Australia to target users across Singapore, Malaysia, Canada, South Africa, and the United Kingdom, demonstrating the global reach of these malicious operations.

    The attack begins with threat actors creating numerous Facebook groups promoting “active senior trips,” dance events, and social gatherings specifically tailored to appeal to older adults seeking community activities.

    These groups feature sophisticated content generated using artificial intelligence, creating convincing promotional materials that successfully attract genuine interest from potential victims.

    The consistent appearance and messaging across groups targeting different geographical regions suggests coordination by a single threat actor or organized group operating at scale.

    Fraudsters operating these groups contact interested victims through private messaging platforms including Facebook Messenger and WhatsApp, where they share links to download specialized applications purportedly required for event registration.

    ThreatFabric analysts identified this malware distribution mechanism after investigating multiple scam alerts reported across affected regions.

    The researchers discovered that victims were often asked to pay registration fees through the same malicious websites, creating additional opportunities for credential theft and financial fraud beyond the malware installation.

    User’s reports online (Source – Threat Fabric)

    The fake websites employed in these campaigns prompt visitors to install what appears to be a legitimate community application, claiming it enables event registration, member connections, and activity tracking.

    While the iOS application buttons currently serve as non-functional placeholders, researchers warn these could later be updated to distribute WebClip or TestFlight applications designed to steal credentials and payment information.

    Fake Facebook senior’s groups (Source – Threat Fabric)

    However, clicking the Google Play button immediately triggers the download of malicious APK files containing either Datzbro directly or the Zombinder dropper, specifically designed to bypass Android 13+ security restrictions.

    Advanced Remote Access and Financial Targeting Capabilities

    Datzbro employs sophisticated remote access technologies that distinguish it from conventional mobile malware families.

    The malware leverages Android Accessibility Services to execute remote actions on behalf of operators, supporting comprehensive device control including screen sharing, interface interaction, and file management.

    Each operator command corresponds to specific gestures or system functions, enabling threat actors to simulate button clicks, navigate applications, and perform complex interactions while remaining undetected by victims.

    The malware’s “schematic” remote control mode represents a particularly innovative approach to device manipulation.

    This feature creates basic screen layout representations using Accessibility event data, transmitting information about displayed elements, their positions, and content to command and control servers.

    Operators can recreate the device interface on their systems, enabling effective control even when video streaming quality is poor or when black overlay attacks are active.

    This dual-control mechanism ensures consistent access regardless of network conditions or defensive countermeasures.

    Datzbro incorporates advanced evasion techniques including customizable black overlay attacks that hide fraudulent activities from victims.

    Operators can adjust overlay transparency levels and display custom text messages, creating the impression that devices are idle or experiencing normal system updates.

    While victims see opaque overlays preventing interaction observation, operators maintain semi-transparent views enabling continued device control.

    This sophisticated visual deception allows financial transactions and credential harvesting to occur without victim awareness, significantly increasing attack success rates.

    The malware specifically targets banking and cryptocurrency applications through hardcoded filtering systems that monitor Accessibility events for financial keywords including “bank,” “pay,” “wallet,” and “finance.”

    Chinese language variants targeting “密码验证” (password verification) and “验证码” (verification code) demonstrate the malware’s multilingual capabilities and global targeting scope.

    This focused approach to financial application monitoring, combined with keylogging capabilities and credential theft activities, positions Datzbro as a significant banking Trojan capable of comprehensive financial fraud operations against unsuspecting victims worldwide.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Leveraging Senior Travel Scams to Deliver Datzbro Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated malicious package has infiltrated the Python Package Index (PyPI), masquerading as a legitimate SOCKS5 proxy tool while harboring backdoor capabilities that target Windows systems.

    The SoopSocks package, tracked as XRAY-725599, presents itself as a benign networking utility that creates SOCKS5 proxy services and reports server information to configurable Discord webhooks.

    Soopsocks on PyPI, after JFrog team reported to maintainers (Source – JFrog)

    However, beneath this facade lies a complex multi-stage attack framework designed to establish persistent backdoor access on compromised Windows machines.

    The malware demonstrates remarkable evolution across its version history, progressing from basic SOCKS5 implementations in versions 0.1.0 through 0.1.2 to sophisticated deployment mechanisms incorporating Windows service integration, VBScript installers, and compiled Go executables.

    This progression indicates deliberate development aimed at enhancing stealth capabilities and bypassing security controls through automated installation processes that leverage both VBScript and executable deployment vectors.

    JFrog Security Research analysts identified the malicious package during their routine monitoring of open-source repositories, recognizing suspicious behaviors that warranted deeper investigation.

    The package’s deceptive nature lies in its functional SOCKS5 proxy capabilities, which provide legitimate functionality while simultaneously establishing covert communication channels and persistent access mechanisms.

    The primary threat emerges from the package’s ability to install itself as a Windows service with elevated privileges, automatically configure firewall rules, and maintain continuous communication with command and control infrastructure.

    The malware employs multiple persistence mechanisms including scheduled tasks, Windows services, and automatic startup configurations, ensuring survival across system reboots and user sessions.

    Stealth Installation and Persistence Mechanisms

    The current iteration of SoopSocks employs a sophisticated installation mechanism centered around the _autorun.exe executable, a PE32+ binary compiled from Go source code that orchestrates the entire deployment process with minimal user interaction.

    This executable utilizes PowerShell as its primary orchestration mechanism while implementing multiple evasion techniques designed to avoid detection and user visibility.

    The installation process begins when the executable launches PowerShell with carefully crafted parameters that bypass standard security controls and logging mechanisms.

    The malware sets the execution policy to Bypass, skips profile loading to avoid detection hooks, suppresses error output to prevent user alerts, and hides interactive prompts throughout the installation sequence.

    This configuration allows the malware to execute multiple deployment stages without triggering user notifications or administrator alerts.

    powershell.exe -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden

    Once operational, the malware copies itself to C:\Program Files\socks5svc\socks5svc.exe and establishes persistence through Windows service installation using the Go service library github.com/kardianos/service.

    The service, named SoopSocksSvc, configures automatic startup with elevated permissions, ensuring continued operation across system restarts.

    Additionally, the malware implements a fallback mechanism through scheduled tasks named SoopSocksAuto that trigger on system startup and user logon events.

    The persistence strategy extends beyond service installation to include automatic firewall rule configuration that opens inbound TCP and UDP communications on port 1080.

    These rules, designated as “SoopSocks TCP 1080” and “SoopSocks UDP 1080,” facilitate the SOCKS5 proxy functionality while providing attackers with unrestricted network access through the compromised system.

    The malware’s ability to automatically escalate privileges through UAC bypass mechanisms ensures successful deployment even on systems with standard user accounts, representing a significant security concern for organizational environments.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Malicious PyPI Package Mimics as SOCKS5 Proxy Tool Attacking Windows Platforms appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶