• Microsoft has officially acknowledged a significant bug in recent Windows security updates that is causing application installation and repair failures across multiple versions of Windows 10, Windows 11, and Windows Server.

    The issue stems from a security enhancement in the August 2025 updates, which now incorrectly triggers User Account Control (UAC) prompts for standard, non-administrator users attempting to run routine application operations.

    The problem was introduced with the security update KB5063878, released on August 12, 2025, and persists in later updates.

    This update was designed to patch a high-severity elevation of privilege vulnerability in the Windows Installer, tracked as CVE-2025-50173.

    While the fix successfully addressed the security flaw, it had an unintended side effect: it now enforces administrator-level permissions for Windows Installer (MSI) repair and related functions that previously ran seamlessly for standard users. As a result, users without admin rights are encountering unexpected UAC prompts.

    Suppose they cannot provide administrator credentials, a common scenario in corporate and educational environments. In that case, the operation fails, often with an “Error 1730,” which indicates the user lacks the necessary access rights.

    The bug affects several common scenarios, including:

    • Running MSI repair commands like msiexec /fu
    • Launching applications that perform a self-repair or initial user configuration, such as Autodesk products including AutoCAD, Civil 3D, and Inventor CAM.
    • Installing applications that configure themselves on a per-user basis.
    • Deploying software packages through Microsoft Configuration Manager (ConfigMgr).

    The issue is particularly disruptive for organizations that rely on multi-user devices, such as university computer labs and shared workstations within enterprises.

    IT administrators reported that applications using a “secondary” MSI installer for per-user setup are frequently affected.

    One university IT administrator noted, “We have several applications behaving this way, not just those from Autodesk. All software running a secondary MSI installer does this behavior.”

    Mitigations

    Microsoft has officially documented the issue and provided temporary solutions while a permanent fix is being developed.

    For individual users who can, the immediate workaround is to right-click the application and select “Run as administrator”.

    For managed IT environments, Microsoft has made a Known Issue Rollback (KIR) available. This allows administrators to revert the specific change causing the UAC prompts by deploying a special Group Policy.

    However, obtaining this KIR requires contacting Microsoft Support for business directly. Microsoft strongly advises against other workarounds, such as disabling related security features.

    The company has stated it is working on a long-term solution that will be released in a future Windows update.

    This fix will aim to allow administrators to specify which applications are permitted to perform MSI repair operations without triggering a UAC prompt.

    The bug affects a wide range of platforms, including multiple versions of Windows 10 and 11, as well as Windows Server editions from 2012 to 2025.

    Windows and Windows Server versions are affected by the User Account Control (UAC) bug:

    Operating SystemAffected Versions
    ClientWindows 11, version 24H2
    Windows 11, version 23H2
    Windows 11, version 22H2
    Windows 10, version 22H2
    Windows 10, version 21H2
    Windows 10, version 1809
    Windows 10 Enterprise LTSC 2019
    Windows 10 Enterprise LTSC 2016
    Windows 10, version 1607
    Windows 10 Enterprise 2015 LTSB
    ServerWindows Server 2025
    Windows Server 2022
    Windows Server, version 1809
    Windows Server 2019
    Windows Server 2016
    Windows Server 2012 R2
    Windows Server 2012

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Microsoft Confirms UAC Bug Breaks App Install On Windows 11 And 10 Versions appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Educational institutions have become prime targets in the escalating battle against commodity information stealers.

    First emerging in 2022 as an open-source project on GitHub, Stealerium was initially released “for educational purposes” but rapidly attracted illicit interest.

    Adversaries adapted and enhanced the code to create variants—such as Phantom Stealer and Warp Stealer—resulting in a family of infostealers sharing substantial code overlap.

    Phantom Stealer pricing model (Source – Proofpoint)

    These tools are readily available to low-sophistication actors seeking one-time purchases or free downloads, bypassing the complexity and cost of malware-as-a-service offerings.

    Early campaigns leveraged standard phishing lures—impersonating banks, courthouses, and charitable foundations—but recent activity within the education sector has broadened the attack surface.

    Emails with urgent subject lines like “Course Registration Deadline” and “Student Account Suspension Notice” delivered compressed executables, JavaScript, and disk images containing Stealerium payloads.

    Proofpoint analysts noted a surge in messages targeting universities and K-12 networks between May and July 2025, with volumes ranging from hundreds to tens of thousands of emails per campaign.

    Stealerium’s GitHub page (Source – Proofpoint)

    Once executed, Stealerium variants immediately establish persistence and reconnaissance capabilities. PowerShell scripts are frequently used to add Windows Defender exclusions, while scheduled tasks ensure the malware survives reboots.

    In addition, the malware executes a series of netsh wlan commands to enumerate saved Wi-Fi profiles and scan for nearby wireless networks, suggesting an intent to harvest credentials for lateral movement or geolocation of compromised hosts.

    Request for quote (Source – Proofpoint)

    Stealerium’s impact on educational organizations is profound. Beyond credential theft, it exfiltrates browser cookies, credit-card data, gaming session tokens, and even webcam snapshots of “NSFW” content—likely to facilitate sextortion schemes.

    Exfiltration channels include SMTP mail attachments, Discord webhooks, Telegram API requests, GoFile uploads, and the lesser-known Zulip chat service.

    Educational IT teams have reported unusual outbound traffic to these platforms and alerts from emerging threat rules designed to detect Stealerium check-ins and data exfiltration events.

    Infection Mechanism and Persistence

    Stealerium’s infection mechanism is deceptively straightforward yet technically robust.

    Upon execution of a compressed executable or script, the malware spawns a PowerShell loader that retrieves and installs the .NET-based stealer payload into a randomized path under the user’s AppData directory (e.g., C:\Users\<user>\AppData\Local\<random_hex>\<username>@<hostname>_<locale>\).

    Following this, the loader invokes the main stealer binary, which begins by creating a mutex to prevent multiple instances and performing anti-analysis checks—verifying the username, GPU model, machine GUID, and even downloading dynamic blocklists from a public GitHub repository to evade sandbox environments.

    The stealer then registers a scheduled task named using a GUID derived from system information, ensuring execution at user logon or at random intervals to evade detection.

    Concurrently, a PowerShell script disables real-time monitoring in Windows Defender by adding exclusion rules, effectively blinding endpoint protection.

    Finally, Stealerium launches a headless Chrome process with the --remote-debugging-port argument to extract cookies, credentials, and tokens directly from browser memory—an advanced technique that bypasses standard encryption and application sandboxing.

    // Example of remote debugging invocation in Stealerium variants
    ProcessStartInfo psi = new ProcessStartInfo()
    {
        FileName = "chrome.exe",
        Arguments = "--headless --disable-gpu --remote-debugging-port=9222 https://example.com",
        CreateNoWindow = true,
        UseShellExecute = false
    };
    Process chrome = Process.Start(psi);

    This multi-stage approach—combining randomized staging, scheduled persistence, anti-analysis checks, and advanced data extraction—makes Stealerium a potent threat against educational networks.

    Organizations must monitor for unusual PowerShell defender exclusions, anomalous scheduled tasks, and network connections to Discord, Telegram, GoFile, and Zulip endpoints to effectively detect and mitigate these attacks.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Threat Actors Using Stealerium Malware to Attack Educational Organizations appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Django development team has issued critical security updates to address a high-severity vulnerability that could allow attackers to execute malicious SQL code on web servers using the popular framework.

    The flaw, identified as CVE-2025-57833, affects multiple versions of Django, prompting an urgent call for all users to upgrade their installations as soon as possible.

    In line with its security policy, Django has released new versions to fix the issue: Django 5.2.6, Django 5.1.12, and the long-term support (LTS) release Django 4.2.24.

    The vulnerability resides within the FilteredRelation component of Django’s Object-Relational Mapping (ORM) system.

    According to the security advisory, an attacker could exploit this flaw by passing a specially crafted dictionary as a keyword argument to the QuerySet.annotate() or QuerySet.alias() methods.

    This could lead to an SQL injection attack, where the attacker can interfere with the queries that an application makes to its database.

    Django SQL Injection Vulnerability

    SQL injection is classified as a “High” severity issue under Django’s security guidelines because it can potentially allow attackers to view, modify, or delete sensitive data, and in some cases, gain full control over the affected database server.

    The affected supported versions include the main development branch and versions 5.2, 5.1, and 4.2, making this a widespread issue for many production environments.

    The Django team has already applied patches to all active branches to resolve the vulnerability.

    The issue was responsibly disclosed by security researcher Eyal Gabay of EyalSec, who was credited in the official announcement.

    This discovery and the subsequent coordinated release highlight the effectiveness of Django’s established security reporting process.

    This procedure prevents exploits from being widely known before a fix is available and includes notifying distributors and major stakeholders in advance of the public release.

    Developers and system administrators using Django are strongly encouraged to review their projects and apply the updates immediately.

    The patches are available in the latest versions on the Python Package Index (PyPI) and through Django’s official Git repository.

    Failing to upgrade could leave applications exposed to significant security risks, including unauthorized data access and potential database compromise.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Django Critical Vulnerability Let attackers Execute Malicious SQL Code on Web Servers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The United States government has announced a reward of up to $10 million for information leading to the identification or location of three Russian intelligence officers.

    The bounty, offered through the Department of State’s Rewards for Justice program, targets members of the Russian Federal Security Service (FSB) accused of conducting widespread malicious cyber campaigns against U.S. critical infrastructure.

    The announcement coincides with a new warning from the Federal Bureau of Investigation (FBI) detailing the activities of the FSB’s Center 16 unit.

    The FBI has detected these state-sponsored hackers exploiting a known vulnerability in Cisco networking equipment to infiltrate computer networks globally.

    The three officers identified in the reward posting are Marat Valeryevich Tyukov, Mikhail Mikhailovich Gavrilov, and Pavel Aleksandrovich Akulov.

    In addition to their attacks on U.S. targets, the trio is accused of targeting over 500 foreign energy companies across 135 countries.

    US Offers $10M Bounty For FSB Hackers

    According to the FBI, the FSB cyber actors have been exploiting CVE-2018-0171, a critical vulnerability in the Cisco Smart Install (SMI) protocol.

    The hackers specifically target end-of-life networking devices that are no longer receiving security updates.

    By leveraging the Simple Network Management Protocol (SNMP) and the unpatched Cisco vulnerability, the group successfully collected configuration files from thousands of networking devices associated with U.S. entities in critical sectors.

    Once inside the networks, the actors modified device configurations to create unauthorized backdoors.

    This persistent access was then used to conduct detailed reconnaissance, with a particular focus on protocols and applications commonly used in industrial control systems (ICS).

    US Offers $10M Bounty For FSB Hackers
    US Offers $10M Bounty For FSB Hackers

    This focus indicates a clear and dangerous interest in systems that manage essential services, such as power grids, water treatment plants, and manufacturing facilities.

    This FSB hacking unit, known by various names in the cybersecurity community, including “Berserk Bear,” “Dragonfly,” and “Static Tundra,” has been active for over a decade.

    The group has a long history of compromising networking devices worldwide, often by targeting equipment that uses legacy, unencrypted protocols like SMI and older versions of SNMP.

    Their tradecraft includes deploying custom malware, such as the tool publicly identified as “SYNful Knock” in 2015, which was designed to compromise specific Cisco devices.

    In response to this persistent threat, U.S. federal agencies and private sector partners have issued multiple alerts. Additionally, Cisco’s Talos intelligence group published its own analysis of the threat actor on August 20, 2025.

    The Rewards for Justice program is now soliciting tips through a secure Tor-based channel, offering potential relocation in addition to the multimillion-dollar reward for information that helps disrupt these ongoing cyber operations.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post US Offers $10M Bounty For FSB Hackers Who Exploited Cisco Vulnerability To Attack Critical Infrastructure appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical zero-day vulnerability in several Sitecore products could allow attackers to execute code remotely.

    The vulnerability, identified as CVE-2025-53690, stems from a ViewState deserialization flaw and is being actively exploited in the wild.

    The investigation by Mandiant revealed that attackers are leveraging exposed ASP.NET machine keys that were included in Sitecore deployment guides from 2017 and earlier.

    These keys allow malicious actors to bypass validation mechanisms and send harmful ViewState payloads to servers, leading to remote code execution.

    Sitecore has acknowledged the vulnerability, labeling it SC2025-005, and has confirmed that it affects customers who used the sample machine key from the outdated deployment guides.

    The company has since updated its deployment processes to generate unique machine keys automatically and has notified affected customers.

    Impacted Products And Attack Details

    The vulnerability potentially impacts several of Sitecore’s main products, including:

    • Experience Manager (XM)
    • Experience Platform (XP)
    • Experience Commerce (XC)
    • Managed Cloud

    Products such as XM Cloud, Content Hub, and OrderCloud are not affected. Sitecore urges customers to consult their official advisory for a complete list and guidance.

    Mandiant’s rapid response disrupted the attack before the full lifecycle could be observed, but their investigation provided significant insights into the attacker’s methods.

    The attack began with the exploitation of the ViewState deserialization vulnerability on an internet-facing Sitecore instance. The attacker then used a custom malware, dubbed WEEPSTEEL, for internal reconnaissance.

    This malware, embedded in a decrypted ViewState payload, gathered system, network, and user information, which was then encrypted and exfiltrated.

    Following the initial compromise, the attacker staged several open-source tools in a public directory to expand their foothold. These included:

    • EARTHWORM: A network tunneling tool to create a covert command-and-control channel.
    • DWAGENT: A remote access tool for persistent access.
    • SHARPHOUND: An Active Directory reconnaissance tool.

    The threat actor then escalated their privileges by creating local administrator accounts and attempted to dump credentials from the SAM/SYSTEM hives to facilitate lateral movement across the network using the Remote Desktop Protocol (RDP).

    To maintain their presence, they installed DWAGENT as a service and modified account settings to prevent password expiration.

    Mitigations

    Mandiant recommends that all Sitecore customers review their environments and implement security best practices for ASP.NET.

    This includes automating machine key rotation, enabling View State Message Authentication Code (MAC), and encrypting any plaintext secrets.

    Sitecore has provided detailed remediation instructions in its official advisory (SC2025-005).

    The company strongly encourages customers to ensure their environments are running security-supported versions and to apply all available security fixes without delay.

    The discovery of this vulnerability highlights the persistent danger of using default or sample configurations in production environments and underscores the need for continuous security monitoring and proactive patching.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Google Warns of Zero-Day Vulnerability in Sitecore Products Allowing Remote Code Execution appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The U.S. government has unveiled a $10 million reward for information leading to the arrest of three Russian FSB officers.  The officers are accused of carrying out cyberattacks on U.S. critical infrastructure and exploiting Cisco network equipment. This public notice aims to raise awareness and encourage anyone with useful information to come forward. According to […]

    The post US Announces $10M Bounty on FSB Hackers Behind Cisco Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Django development team has issued security updates after discovering a high-severity SQL injection flaw in the FilteredRelation feature. This flaw could allow attackers to run harmful database commands by crafting unexpected query parameters. Users running Django 5.2, 5.1, or 4.2 should upgrade immediately to protect their applications. Web Vulnerability Details Django’s FilteredRelation feature helps developers write […]

    The post Django Web Vulnerability Allows Attackers to Execute SQL Injection appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Chinese state-sponsored Advanced Persistent Threat (APT) groups have escalated their cyber espionage campaigns, systematically targeting global telecommunications, government, and military networks through sophisticated router exploitation techniques since 2021. Since at least 2021, Chinese state-sponsored cyber actors have been conducting extensive, stealthy operations to infiltrate and control key network devices across critical sectors worldwide. These malicious […]

    The post Chinese APT Groups Exploit Router Flaws to Breach Enterprises appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity firm Silent Push has exposed a colossal illegal Internet Protocol Television (IPTV) network, revealing a sophisticated piracy operation that has been active for years across more than 1,000 domains and over 10,000 unique IP addresses. The findings highlight the immense scale and profitability of modern digital piracy. The network illegally streams premium content from […]

    The post Extensive IPTV Network Spanning 1,000+ Domains and 10,000+ IP Addresses appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sprawling network of illicit Internet Protocol Television (IPTV) services has been discovered, operating across more than 1,100 domains and in excess of 10,000 IP addresses.

    This sprawling infrastructure, which has remained active for several years, delivers unauthorized streams of premium content—including major sports leagues, subscription services, and on-demand platforms—without licensing agreements.

    Silent Push analysts noted that this network’s use of both high-volume IP address pools and rapidly rotating domains represents a significant escalation in piracy tactics, making traditional takedown processes nearly futile.

    At its core, the network relies on customized IPTV panels built around modified open-source software such as Stalker Portal and Xtream UI.

    These panels facilitate automated user authentication and stream distribution, allowing operators to provision hundreds of thousands of simultaneous sessions.

    Rather than depending on a single front-end domain, the operators employ a large pool of proxy domains—each resolving to multiple shared IP addresses—to obfuscate the true origin of the streams.

    Silent Push researchers identified two companies, XuiOne and Tiyansoft, and an individual, Nabi Neamati of Herat, Afghanistan, as principal beneficiaries of this infrastructure.

    XUIone website (Source – Silent Push)

    The attack vectors begin with server-side exploitation and credential harvesting. Malicious actors compromise under-protected web hosts or exploit outdated control panels to install custom modules that inject backdoors into legitimate streaming control software.

    In many cases, operators gain initial access by exploiting default credentials on cPanel, Plesk, and Stalker Portal installations.

    Once access is secured, a deployment script—often obfuscated via Base64 encoding—pushes modified PHP files and cron jobs to automate the registration of new domains and the rotation of stream endpoints.

    Silent Push analysts identified one such script that uses the following code snippet to register new virtual hosts:

    $domain = trim(shell_exec('wp option get siteurl'));
    $ipList = ['158.220.114.199','46.202.197.208'];
    foreach ($ipList as $ip) {
        shell_exec("echo '$domain IN A $ip' >> /etc/bind/db.piracy");
    }
    shell_exec('rndc reload');

    Despite repeated takedown requests, the network’s agility in rotating both domains and IP addresses allows it to remain operational.

    New domains appear almost daily, with each resolving to clusters of dynamic IP addresses provisioned via bullet-proof hosting providers.

    This resilient structure poses a formidable challenge to rights holders and law enforcement agencies attempting to disrupt the service.

    Infection Mechanism Through Control Panel Exploits

    A particularly insidious aspect of this IPTV piracy network is its infection mechanism, which centers on compromised control panels.

    Xtream UI (Source – Silent Push)

    Operators survey the internet for misconfigured or outdated installations of Stalker Portal and Xtream UI, using automated scanners to detect vulnerable endpoints on ports 80, 8080, and 2095.

    Stalker Portal and Xtream portal (Source – Silent Push)

    Upon identifying a target, they deploy a multi-stage payload that begins with a low-profile reconnaissance module.

    This module enumerates existing user accounts, collects hashed credentials, and exfiltrates configuration files containing API keys.

    A second stage installs a persistent backdoor by modifying the config.php file within the panel’s directory:-

    if (!defined('IPTV_INIT')) {
        define('IPTV_INIT', true);
        require_once __DIR__ . '/backdoor.php';
    }

    The backdoor script, backdoor.php, establishes a reverse shell to a command-and-control server whenever an administrator logs in, effectively granting the attackers full control over the panel.

    This persistent foothold enables continuous updates to the hosting infrastructure, seamless domain registration, and dynamic IP assignment—ensuring that new entry points replace any that have been taken down.

    As a result, the network can sustain large-scale piracy operations with minimal interruption.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Massive IPTV Hosted Across More Than 1,000 Domains and Over 10,000 IP Addresses appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶