• A security vulnerability in Tesla’s Telematics Control Unit (TCU) allowed attackers with physical access to bypass security measures and gain full root-level code execution.

    The flaw stemmed from an incomplete lockdown of the Android Debug Bridge (ADB) on an external Micro USB port, enabling a physically present attacker to compromise the vehicle’s TCU. Tesla has since patched the vulnerability via an over-the-air (OTA) software update.

    According to NCC Group, the vulnerability was present in Tesla firmware version v12 (2025.2.6). While Tesla implemented logic to block direct shell access via adb shell on production devices, researchers discovered this lockdown was insufficient.

    It failed to prevent two critical ADB features: the ability to read and write files as the root user, using adb pull and adb push, and the ability to forward network traffic with adb forward.

    Since the ADB process (adbd) on the TCU runs with root privileges, these oversights created a powerful attack vector.

    Tesla’s Telematics Control Unit Vulnerability

    An attacker could exploit this flaw by physically connecting a device to the TCU’s exposed Micro USB port. The attack involved several steps:

    1. Upload a Payload: The attacker would use the adb push command to upload a malicious executable script to a writable directory on the TCU, such as /tmp.
    2. Trigger Execution: The attacker would then abuse the kernel’s uevent_helper subsystem. By writing the path of their malicious script to the uevent_helper file, they could trick the kernel into executing it with root privileges when a system event was triggered.
    3. Gain Access: A simple action like reading a file with adb pull was enough to trigger a uevent, causing the malicious script to run. In the proof-of-concept, the script started a Telnet server, which the attacker could then connect to using a port forwarded via adb forward, granting them a root shell on the device.

    The impact of this vulnerability is severe, as gaining root access on the TCU gives an attacker complete control over that component. While the attack requires physical access, a compromised TCU could potentially serve as a pivot point for further attacks on the vehicle’s internal network.

    The vulnerability was responsibly disclosed to Tesla on March 3, 2025. Tesla acknowledged the report the following day and began rolling out a patch in firmware version 2025.14 on April 24, 2025.

    The fix resolves the issue by completely disabling the ADB interface on the Micro USB port for production vehicles, ensuring it can no longer be used as an attack vector.

    The public advisory was released by NCC Group on September 29, 2025, after the patch was widely deployed. This incident highlights the ongoing efforts by security researchers to probe automotive systems and the effectiveness of Tesla’s OTA update mechanism in rapidly deploying security fixes to its fleet.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Tesla’s Telematics Control Unit Vulnerability Let Attackers Gain Code Execution as Root appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Japanese beer and beverage giant Asahi Group Holdings has been forced to halt production at its domestic factories as a result of a cyberattack that struck on Monday. Asahi, known for its popular brands such as Asahi Super Dry Beer, Nikka Whisky, and Mitsuya Cider, has yet to resume operations across its network of 30 […]

    The post Beer Maker Asahi Shuts Down Production Due to Cyberattack appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In late August 2025, Cleafy’s Threat Intelligence team uncovered Klopatra, a new, highly sophisticated Android banking trojan and Remote Access Trojan (RAT) that grants attackers full control of compromised devices and facilitates large-scale financial fraud. Active campaigns in Spain and Italy have already infected over 3,000 devices, targeting users of major financial institutions and draining […]

    The post New Android Banking Trojan Uses Hidden VNC for Full Remote Control of Devices appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Lunar Spider, a newly observed malware strain, has emerged as a potent threat to Windows environments by compromising systems in a single click.

    First detected in mid-September 2025, its operators have quickly refined delivery and payload strategies to evade traditional defenses.

    Initial reports show that victims receive a seemingly innocuous link via phishing emails or instant-messaging platforms. Once clicked, Lunar Spider initiates a stealthy download of its core components, leveraging legitimate Windows utilities to blend in with normal system activity.

    Within minutes, the malware establishes a foothold, scans for active user sessions, and proceeds to harvest stored credentials—without any visible signs of compromise.

    Researchers at The DFIR Report identified Lunar Spider after encountering unusual Microsoft Credential Manager API calls on several corporate endpoints.

    Initial analysis revealed that the malware uses Windows BITS (Background Intelligent Transfer Service) to fetch additional modules from its command-and-control (C2) servers.

    This maneuver not only obscures network traffic but also prevents many endpoint detection systems from flagging the download. Once the core binary is in place, Lunar Spider executes a lightweight loader written in PowerShell, launching secondary payloads directly in memory.

    This file-less approach significantly reduces forensic artifacts on disk, complicating incident response efforts.

    Execution

    The impact of Lunar Spider’s campaign has been profound. Affected organizations report unauthorized access to internal dashboards and email accounts, followed by targeted phishing campaigns from compromised mailboxes.

    In some cases, attackers have leveraged stolen credentials to move laterally across networks, exfiltrating sensitive documents and financial records.

    Security teams have struggled to isolate the infection due to Lunar Spider’s minimal footprint and its use of legitimate Windows processes.

    Execution chain (Source – The DFIR Report)

    A closer look at Lunar Spider’s infection mechanism reveals a sophisticated one-click compromise workflow.

    Upon link activation, a short batch script executes via mshta.exe, invoking an obfuscated PowerShell command that downloads the core payload.

    The script then injects the payload into a suspended svchost.exe process using Windows API calls, such as CreateProcess and WriteProcessMemory, before resuming execution.

    This injection technique conceals the malicious code under the guise of a trusted service host, thereby evading many heuristic-based scanners.

    Once in memory, the injected payload locates and extracts credentials stored by Windows Credential Manager, using the following snippet to interface with native APIs:

    # Load necessary assembly for credential enumeration
    Add-Type -AssemblyName System.Security
    # Enumerate credentials and output decrypted secrets
    $creds = [System.Security.CredentialManagement.Credential]::LoadAll()
    foreach ($cred in $creds) {
        Write-Output "Host: $($cred.TargetName) | Username: $($cred.Username) | Password: $($cred.Password)"
    }

    This approach allows Lunar Spider to harvest a wide array of credentials—ranging from RDP and VPN logins to saved web and database passwords—within seconds of injection.

    In response to this growing threat, organizations are urged to monitor unusual mshta.exe and PowerShell child processes, enforce strict application whitelisting, and segment privilege levels to limit access to Credential Manager data. Enhanced network monitoring for abnormal BITS transfers can also help detect C2 communications early.

    As Lunar Spider continues to evolve, defenders must adopt a layered security posture that combines behavioral analytics with robust endpoint controls.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Lunar Spider Infected Windows Machine in Single Click and Harvested Login Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An uptick in internet-wide scanning activity indicates that threat actors are actively probing for systems vulnerable to CVE-2024-3400, a critical GlobalProtect flaw in Palo Alto Networks PAN-OS. Security researchers at SANS ISC observed a single source IP address 141.98.82.26, systematically targeting the GlobalProtect portal’s file-upload endpoint in an attempt to place and retrieve session files on […]

    The post Hackers Actively Probe Palo Alto PAN-OS GlobalProtect Vulnerability for Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals are exploiting the growing popularity of artificial intelligence tools by distributing malicious Chrome browser extensions that masquerade as legitimate AI services. These fake extensions, mimicking popular AI platforms like ChatGPT, Claude, Perplexity, and Meta’s Llama, are designed to hijack user prompts and redirect them to attacker-controlled domains for malicious purposes. Security researchers from Palo […]

    The post Warning: Malicious AI Tools Being Distributed as Chrome Extensions by Threat Actors appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Problem: Legacy SOCs and Endless Alert Noise Every SOC leader knows the feeling: hundreds of alerts pouring in, dashboards lighting up like a slot machine, analysts scrambling to keep pace. The harder they try to scale people or buy new tools, the faster the chaos multiplies. The problem is not just volume; it is the model itself. Traditional SOCs start with rules, wait for alerts to fire,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert highlighting the active exploitation of a serious vulnerability in the Libraesva Email Security Gateway (ESG). Cataloged as CVE-2025-59689, this command injection vulnerability has emerged as a significant threat for organizations relying on Libraesva’s email security defenses. Libraesva’s Email Security Gateway is widely […]

    The post CISA Issues Alert on Actively Exploited Libraesva ESG Command Injection Vulnerability appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Japanese beverage conglomerate Asahi Group Holdings has halted production at its domestic factories following a significant cyberattack that crippled its systems on Monday.

    A company spokesperson confirmed on Tuesday that production has not resumed and that there is no foreseeable timeline for when operations can be restored. The incident has brought production of iconic products, such as Asahi Super Dry beer, Nikka Whisky, and Mitsuya Cider, to a standstill.

    The cyberattack caused a widespread system failure, compelling the company to suspend critical business functions across its group companies in Japan.

    Asahi Cyberattack

    These suspended operations include order processing, shipping, and call center services. Asahi operates 30 beer, beverage, and food production plants in Japan, and the company is still in the process of investigating whether all of them have been forced to stop production.

    In a statement, Asahi confirmed a cyberattack caused the system failure but stated there has been no confirmed leakage of personal or customer data.

    The disruption is currently limited to its operations within Japan, with its European business, including UK beer supply, remaining unaffected.

    While Asahi has not disclosed the specific nature of the attack, the system-wide outage and operational paralysis are hallmarks of a potential ransomware incident.

    Such attacks have become increasingly common against large corporations, where hackers encrypt critical data and demand payment for its release.

    The food and beverage industry is a particularly vulnerable target due to its reliance on just-in-time production and time-sensitive supply chains, where prolonged downtime can lead to significant financial losses.

    An expert noted that with Asahi holding nearly 40% of the market share in Japan, the disruption will be costly for the company and potentially for its resellers.

    This incident is the latest in a string of high-profile cyberattacks targeting major industrial and manufacturing companies in Japan and globally.

    In a 2024 report, Asahi had identified cyberattacks as one of the primary risks to its business. The company has apologized to its customers and business partners for the inconvenience and stated it is actively investigating the cause while working to restore its systems. No group has publicly claimed responsibility for the attack.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Beer Brewing Giant Asahi Halts Production Following Cyberattack appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a threat actor called UNC5174, according to NVISO Labs. The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), a local privilege escalation bug affecting the following versions – VMware Cloud Foundation 4.x and 5.x VMware

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶