• A new Android banking trojan has emerged that combines traditional overlay attacks with a stealthy hidden Virtual Network Computing (VNC) server to achieve full remote control of compromised devices.

    First detected in late September 2025, the malware is distributed through SMS-based phishing campaigns that lure victims into installing a fake “security” app.

    Once granted the necessary permissions, the trojan encrypts its payload, evading static detection, and initiates a background VNC server that remains invisible to the user’s launcher.

    Cleafy analysts identified the malware after observing unusual network traffic from several European banks’ mobile users. Upon installation, the trojan immediately requests Accessibility and Device Administrator privileges under the guise of optimizing device performance.

    Installation process (Source – Cleafy)

    These permissions allow it to intercept touch input, capture screen information, and silently render bogus overlays on legitimate banking applications.

    At the same time, the VNC module initializes a hidden framebuffer, enabling threat actors to remotely view and manipulate the device in real time.

    While overlay-based banking trojans have been around for years, this new strain’s integration of a headless VNC server represents a significant escalation.

    Rather than relying solely on screen overlays, attackers can now navigate the device interface as if they were holding it in their hand—opening apps, entering one-time passwords, and installing additional payloads.

    Enabling Accessibility Services (Source – Cleafy)

    Early cases suggest that victims remain unaware of the remote session, as the trojan suppresses all visual indicators and logs user interactions to blend with legitimate activity.

    Once entrenched, the trojan employs multiple persistence tactics. It registers a broadcast receiver for BOOT_COMPLETED to restart the VNC service on device reboot and hooks into the AccessibilityService to monitor screen state changes.

    The malware also disables Google Play Protect by exploiting hidden system APIs, preventing updates or scans that might disrupt its operations.

    These layers of defense ensure that the remote access remains active until manually removed—a task complicated by the trojan’s ability to hide its icon and camouflages itself under system-level names.

    Infection Mechanism

    The infection chain begins with a deceptive SMS message containing a download link to a trojanized APK named “BankGuard.apk.”

    When the user installs this package, they are prompted to enable two critical permissions: AccessibilityService and Device Administrator.

    The following snippet illustrates how the trojan invokes the Accessibility permission request:-

    Intent intent = new Intent(Settings.ACTION_ACCESSIBILITY_SETTINGS);
    context.startActivity(intent);

    Once granted, the malware programmatically registers its AccessibilityService:-

    <service android: name=".StealthAccessibilityService"
             android: permission="android.permission.BIND_ACCESSIBILITY_SERVICE">
        <intent-filter>
            <action android:name="android.accessibilityservice.AccessibilityService" />
        </intent-filter>
        <meta-data
            android: name="android.accessibilityservice"
            android:resource="@xml/accessibilityservice_config" />
    </service>

    With these hooks in place, the trojan silently launches its VNC server:-

    VNCServer vnc = new VNCServer(context);
    vnc.startServer(5900);  // Standard VNC port

    This headless server captures framebuffer data and listens for incoming remote control commands.

    Attackers connect using off-the-shelf VNC clients, gaining unfettered interactive control over the victim’s device.

    Fraud attempts details (Source – Cleafy)

    Through this mechanism, the trojan bypasses traditional overlay detection by avoiding UI injection altogether, relying instead on genuine touch emulation via remote commands.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Android Banking Trojan Uses Hidden VNC to Gain Complete Remote Control Over Device appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco has confirmed two serious vulnerabilities impacting its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) firewalls. Tracked as CVE-2025-20333 and CVE-2025-20362, both issues allow attackers to run arbitrary code on unpatched devices. Cisco security advisories warn that exploits for both flaws are already in the wild. Organizations worldwide are urged to check their devices and apply […]

    The post 48+ Cisco Firewalls Hit by Actively Exploited 0-Day Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The OpenSSL Project has released a critical security advisory, addressing three significant vulnerabilities that could allow attackers to execute remote code and potentially recover private cryptographic keys. 

    These flaws affect multiple OpenSSL versions across different platforms and could lead to memory corruption, denial of service attacks, and unauthorized access to sensitive cryptographic materials.

    The most severe vulnerability involves out-of-bounds memory operations in RFC 3211 Key Encryption Key (KEK) unwrap functionality, tracked as CVE-2025-9230 with moderate severity. 

    This flaw occurs when applications attempt to decrypt Cryptographic Message Syntax (CMS) messages using password-based encryption (PWRI). 

    The vulnerability triggers both out-of-bounds read and write operations, potentially leading to memory corruption that attackers could exploit to execute arbitrary code or cause system crashes.

    Memory Corruption Vulnerability (CVE-2025-9230)

    The first vulnerability, CVE-2025-9230, affects OpenSSL versions 3.5, 3.4, 3.3, 3.2, 3.0, 1.1.1, and 1.0.2 through improper handling of CMS message decryption. 

    When applications process maliciously crafted password-based encrypted CMS messages, the vulnerability triggers out-of-bounds memory access operations. 

    The out-of-bounds write component can cause memory corruption, potentially allowing attackers to overwrite critical memory regions and execute shellcode or arbitrary commands.

    Security researchers from Aisle Research, led by Stanislav Fort, discovered this vulnerability on August 9th, 2025. The exploit requires specific conditions, including password-based encryption usage in CMS messages, which limits the attack surface since PWRI encryption support is rarely implemented in production environments. However, successful exploitation could result in complete system compromise through remote code execution capabilities.

    The vulnerability exists in the KEK unwrap algorithm implementation, where insufficient bounds checking allows memory operations beyond allocated buffer boundaries. 

    Attackers can craft malicious CMS payloads that trigger integer overflow conditions, resulting in buffer overflows during decryption processes. 

    The FIPS modules remain unaffected since CMS implementation operates outside the OpenSSL FIPS boundary.

    Timing Side-Channel Flaw (CVE-2025-9231)

    The second critical flaw, CVE-2025-9231, introduces a timing side-channel vulnerability in the SM2 cryptographic algorithm implementation on 64-bit ARM platforms. 

    This vulnerability allows remote attackers to recover private keys through timing analysis of signature computation operations, according to the OpenSSL advisory.

    While OpenSSL doesn’t directly support SM2 certificates in Transport Layer Security (TLS) contexts, custom providers could expose this vulnerability in production environments.

    Timing side-channel attacks exploit variations in cryptographic operation execution times to extract sensitive information. 

    The SM2 algorithm implementation exhibits timing discrepancies during signature generation processes, creating measurable patterns that attackers can analyze to reconstruct private key material. 

    CVETitleSeverity
    CVE-2025-9230Out-of-bounds read & write in RFC 3211 KEK UnwrapModerate
    CVE-2025-9231Timing side-channel in SM2 algorithm on 64 bit ARMModerate
    CVE-2025-9232Out-of-bounds read in HTTP client no_proxy handlingLow

    This attack vector requires network access to measure timing variations across multiple cryptographic operations, making it feasible for remote exploitation scenarios.

    The vulnerability affects OpenSSL versions 3.5, 3.4, 3.3, and 3.2 specifically on 64-bit ARM architectures. Earlier versions, including 3.1, 3.0, 1.1.1, and 1.0.2, remain unaffected due to different implementation approaches. 

    Additionally, CVE-2025-9232 involves out-of-bounds read operations in HTTP client no_proxy handling for IPv6 addresses, though this presents a lower risk with denial-of-service impact only.

    Organizations using custom cryptographic providers with SM2 support should prioritize immediate patching to prevent private key compromise through timing analysis attacks.

    Immediate remediation requires upgrading to patched versions: OpenSSL 3.5.4, 3.4.3, 3.3.5, 3.2.6, 3.0.18, 1.1.1zd (premium support), and 1.0.2zm (premium support).

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post OpenSSL Vulnerabilities Let Attackers Execute Malicious Code and Recover Private Key Remotely appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Organizations face an ever-evolving cyberthreat landscape marked by faster, more complex attacks. Today, Microsoft is answering this call with the general availability of an agentic security platform built on Microsoft Sentinel. This new wave of innovation combines data, context, automation, and intelligent agents to help security teams detect, investigate, and respond at AI speed. The rise of […]

    The post Microsoft Sentinel Launches AI-Driven Agentic SIEM Platform for Enterprise Security appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A concerning cybersecurity trend has emerged as threat actors exploit the growing popularity of artificial intelligence tools by distributing malicious Chrome extensions masquerading as legitimate platforms.

    These deceptive extensions target users seeking convenient access to popular services like ChatGPT, Claude, Perplexity, and Meta Llama, creating a significant security risk for unsuspecting individuals and organizations.

    The malicious campaign represents a sophisticated evolution in browser-based attacks, leveraging the trust users place in mainstream browser extension stores and the widespread adoption of conversational intelligence platforms.

    These fake extensions initially appear functional, allowing users to type prompts directly into the Chrome search bar, creating an illusion of legitimate functionality while secretly executing malicious operations in the background.

    The threat has already demonstrated considerable reach and persistence, with previous iterations of similar campaigns affecting thousands of users.

    Palo Alto Networks analysts identified this renewed activity as part of a broader trend targeting browser extension ecosystems, highlighting the attackers’ strategic shift toward exploiting emerging technology trends to maximize their success rates.

    These malicious extensions operate through a carefully orchestrated infection mechanism that fundamentally compromises user browsing behavior and data security.

    The extensions achieve persistence by exploiting Chrome’s chrome_settings_overrides manifest permission, which allows them to permanently alter the browser’s default search engine configuration without explicit user consent or awareness.

    Technical implementation

    The technical implementation involves redirecting all search queries to attacker-controlled domains including chatgptforchrome[.]com, dinershtein[.]com, and gen-ai-search[.]com.

    This redirection mechanism effectively positions the malicious infrastructure as a man-in-the-middle, capturing sensitive user queries that may contain confidential information, personal data, or proprietary business intelligence.

    The threat actors have identified eight specific extension identifiers in their current campaign: akfnjopjnnemejchppfpomhnejoiiini (Claude search), boofekcjiojcpcehaldjhjfhcienopme (previously reported ChatGPT extension), bpeheoocinjpbchkmddjdaiafjkgdgoi (ChatGPT for Chrome), ecimcibolpbgimkehmclafnifblhmkkb (Perplexity Search), jhhjbaicgmecddbaobeobkikgmfffaeg (Chat AI for Chrome), jijilhfkldabicahgkmgjgladmggnkpb (GenAISearch), lnjebiohklcphainmilcdoakkbjlkdpn (ChatGPT Search), and pjcfmnfappcoomegbhlaahhddnhnapeb (Meta Llama Search).

    Distribution methods include sophisticated social engineering campaigns utilizing YouTube promotional content to entice installation, demonstrating the attackers’ understanding of modern digital marketing techniques and user acquisition strategies.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Beware! Threat Actors Distributing Malicious AI Tools as Chrome Extensions appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Managing endpoints effectively has become one of the most critical priorities for IT teams across organizations. With the growing number of devices, operating systems, and hybrid workforce requirements, businesses need smarter and more automated endpoint management solutions. This is where autonomous endpoint management (AEM) software comes into play offering complete visibility, control, automation, and security […]

    The post Top 10 Best Autonomous Endpoint Management Software In 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals are turning a trusted file format against users in a sophisticated new attack campaign. MatrixPDF represents a concerning evolution in social engineering attacks that split malicious activities across multiple platforms to evade detection. PDF files have become the perfect trojan horse for cybercriminals. They slip through email security filters undetected, render inline within Gmail’s […]

    The post MatrixPDF Campaign Evades Gmail Filters to Deliver Malicious Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Research has uncovered three significant vulnerabilities in Google’s Gemini AI assistant suite, dubbed the “Gemini Trifecta,” that could have allowed cybercriminals to steal users’ saved data and live location information. The vulnerabilities, which have since been remediated by Google, demonstrate how artificial intelligence systems can become attack vectors rather than just targets. Illustration of a […]

    The post Google Gemini Vulnerabilities Let Hackers Steal Saved Data and Live Location appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The federal government is headed toward a shutdown Wednesday morning: Congress failed to pass any funding to kick off fiscal 2026, which will cause hundreds of thousands of federal employees to be furloughed and the rest of the civil service to continue working without immediate pay. 

    In a 55-45 tally, the Senate on Tuesday once again rejected a seven-week stopgap funding bill that would have kept agencies afloat through Nov. 21 after all but a few Democrats voted to block the measure. All Republicans supported the House-backed bill, but it failed to reach the 60-vote threshold necessary to pass it and keep government open.

    Agencies will shutter for the first time since 2019 amid President Trump’s continued threat to lay off large portions of the federal workforce. The Office of Management and Budget has directed agencies to consider issuing reduction-in-force notices to all employees whose salaries are funded by annual appropriations and who work on issues that are not Trump priorities. The president reiterated that threat on Tuesday. 

    “The Democrats want to shut it down, so when you shut it down, you have to do layoffs,” Trump said at the White House hours before funding lapsed. “So we'd be laying off a lot of people that are going to be very affected.”

    There is no connection between shutdowns and RIFs and the two have never been previously connected. Instead, agencies have placed portions of their workforces on unpaid furlough during a shutdown and brought them back when the government reopened. Employees funded through mechanisms other than annual appropriations, as well as those necessary to protect life and property, are considered either “exempted” or “excepted” and work throughout shutdowns on only the promise of backpay.

    As employees nervously await the administration’s plans on layoffs, about 550,000 of them will be sent home on furlough. Those employees are also guaranteed backpay when the government reopens. Another 1.57 million employees will remain at work while facing delayed paychecks. The 23% furlough rate is unusually low for modern shutdowns. 

    Already Tuesday evening, agencies began sending early notices to employees to notify them of whether they would be furloughed, according to copies viewed by Government Executive. Those messages reminded furloughed employees not to work during the shutdown, to monitor the news to stay apprised of when to return to work and that their back pay was guaranteed. Official notices were expected later Tuesday night or early Wednesday morning. 

    All federal employees will still report to their jobs Wednesday morning. Those who are leaving due to their furlough status will have a few hours to conduct any “closeout” work necessary for an “orderly shutdown” before they leave indefinitely. 

    Congress currently has no clear path to reopen government. Democrats continue to insist that Republicans address end-of-year premium increases set to hit those who receive health insurance through the Affordable Care Act as part of any funding deal. They are also looking to roll back Trump’s ability to rescind federal funds through impoundments. Republicans have remained steadfast that they will not negotiate over those issues until the government is reopened. 

    Senate Majority Leader John Thune, R-S.D., said his caucus was “not going to be held hostage.” 

    “Ladies and gentlemen, there isn't anything here to negotiate," Thune said Tuesday afternoon. “This is a routine funding resolution so that we can continue our routine appropriations work." 

    House Republicans, meanwhile, did not return to the Capitol this week after passing their continuing resolution last week. 

    Democrats throughout the day Tuesday said the ball was in Trump and Republicans’ court, while suggesting any layoffs that result from the shutdown were bound to occur anyway. 

    “The bottom line is he's doing it anyway,” Senate Minority Leader Chuck Schumer, D-N.Y., said. “It will fall on [Trump], as I said. He's the one doing the firings, not Democrats.”

    Most federal agencies sent a message to employees Tuesday afternoon with nearly identical language blaming congressional Democrats for the impasse for holding up a stopgap funding bill “due to unrelated policy demands.” 

    “A funding lapse will result in certain government activities ceasing due to a lack of appropriated funding,” agency leaders said to their workforces. “In addition, designated pre-notified employees of this agency would be temporarily furloughed.”

    Sen. Richard Blumenthal, D-Conn., said Trump “just seems to be on that path” toward slashing federal jobs, regardless of whether a shutdown had occurred. 

    “This president is incredibly cruel and mean spirited, so he may well engage in some totally unnecessary and punitive layoffs that save no money,” Blumenthal said. “I think the record shows that he is firing people regardless of the shutdown.”

    Sen. Chris Van Hollen, D-Md., said the shutdown would not materially change the current operations of government. 

    “Donald Trump has been shutting down the government,” said Van Hollen, whose state houses among the highest number of federal workers. “He's been shutting down the parts that he doesn't like, he's been super charging the parts that he likes. So we want to keep the government open, but no more blank check for Donald Trump.” 

    Just before the shutdown, the American Federation of Government Employees and Democracy Forward filed a lawsuit against the administration's plans, suggesting Trump and OMB Director Russ Vought had overstepped their legal authorities in recommending the RIFs. 

    “Announcing plans to fire potentially tens of thousands of federal employees simply because Congress and the administration are at odds on funding the government past the end of the fiscal year is not only illegal—it’s immoral and unconscionable,” AFGE President Everett Kelley said. 

    The Office of Personnel Management instructed agencies to prepare a "decisional memorandum” that documents the need for the layoffs. The Trump administration previously ran into legal trouble when courts determined that OPM and OMB did not have the authority to mandate workforce decisions within agencies, though the Supreme Court has since cleared a path for such directives.

    Any layoff notice sent at the outset of a shutdown is likely to have not yet taken effect by the time the government reopens. Agencies generally must provide 60-days notice to all impacted workers. OMB instructed agencies that they can update their layoff plans once the government reopens. 

    Thune said the Senate will take additional votes on Wednesday before adjourning on Thursday in observance of the Jewish holiday Yom Kippur. Lawmakers would then return on Friday and potentially stay through the weekend.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • RIGA, Latvia — If Russia again encroaches in NATO-member airspace, officials say they now have set expectations about how that nation will respond—and the list includes options from tracking the Russian aircraft to shooting them down.

    Over the past week, NATO leaders have been working to bring more “coherence [and] synchronization across all of the air policing activities,” one senior military official told Defense One Saturday at the NATO military committee meeting here. However,  NATO members still have to work through issues around specific authorities and rules of engagement, the official said. “Some countries have some legal limits. Some countries have some administrative limits that they must get political approval for. But it’s all being smoothed out.”

    Escalating Russian incursions have led to a variety of actions just this month, from shootdowns of Russian drones over Poland on September 10 to a NATO-led escort of fighter jets out of Estonia a little more than a week later. And top officials of NATO countries have promised swift responses. Poland, for instance, has said it will shoot down drones with or without NATO permission.

    Adm. Giuseppe Cavo Dragone, chair of the NATO military committee, said the rules of engagement for how NATO members respond vary tremendously by the threat level of each incident, such as whether the drones or jets are known to be armed. The determination may come down to the pilot or reach all the way up to the NATO Supreme Allied Commander Europe. Rules of engagement are a “tool that can evolve as far as the threat is changing,” he said.

    NATO military committee members spent much of the weekend discussing new assets and strategies to give individual members more options to deal with future incursions, as part of Eastern Sentry, which was launched Sept. 12 in response to the Polish incursion. The activity converts the air policing mission to a broad air defense mission. Denmark will likely soon contribute an anti-aircraft frigate and two additional F-35s to Eastern Sentry, according to an individual with knowledge of the discussions.

    The change from policing to air defense may not be obvious to the general public. But it will be significant behind the scenes, according to the senior NATO official. The difference is that, depending on the incursion, Eastern Sentry gives SACEUR elements to address the threat quickly— for instance, moving a battlegroup from Latvia quickly into Estonia and then returning it, to “mass our capabilities at the point of need,” the official said.

    The official said future incidents are likely, but they believe Russian President Vladimir Putin is not personally directing the incidents. Rather, they said, the incursions speak to a “culture” within the Russian military, which accepts a “higher degree of risk” for provocative actions.

    Still, NATO’s obligation now is to respond to each incident proactively. “If [Putin] sees a weakness in our response, you very well may see him start to hand-puppet,” as in direct future incursions himself, the official warned. 

    The meeting here Saturday occurred in the context of growing uncertainty about the future role of U.S. forces in Europe. While Trump has indicated that the United States is likely to stay in NATO, defense leaders such as Defense Secretary Pete Hegseth  have for months foreshadowed a potential drawdown of U.S. forces in Europe, and the new White House national defense strategy is likely to de-emphasize Europe as a chief U.S. national concern.

    When Defense One asked Dragone how prepared other NATO members are for fewer U.S. troops in Europe, he answered, “This is something that has been discussed a lot,” downplaying the concern as “normal” for any military alliance. 

    “Let’s assume that one of the allies, the bigger one, needs to reorient some of his energies [in] some other direction,” the official said. NATO countries, working together, will “rebalance everything in the most efficient and effective way… We’re going to work it out and face it like a big man.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶