• A critical security vulnerability in SUSE Rancher Manager has been discovered that enables attackers with elevated privileges to lock out administrative accounts, potentially disrupting entire Kubernetes cluster management operations. The flaw, tracked as CVE-2024-58260, carries a high severity rating with a CVSS score of 7.1. Vulnerability Overview The security issue stems from missing server-side validation on the username […]

    The post SUSE Rancher Flaws Allow Attackers to Lock Out Admin Accounts appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new malware strain targeting macOS users has emerged, capable of bypassing traditional antivirus solutions while specifically targeting developers and cryptocurrency holders. The cross-platform threat, dubbed ModStealer, represents the latest evolution in macOS-focused cybercrime, highlighting the growing security challenges facing Apple users in 2024. ModStealer was first identified by cybersecurity firm Mosyle and reported through […]

    The post New ModStealer Evades Antivirus, Targets macOS Users to Steal Sensitive Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Dutch authorities have arrested two 17-year-old boys on suspicion of “state interference” in a cybersecurity case with alleged connections to Russian espionage operations. The teenagers appeared in court on Thursday, with one remanded in custody and the other placed under strict home bail conditions pending a hearing scheduled within two weeks. Europol headquarters building in […]

    The post Two Dutch Teenagers Arrested for Wi-Fi Sniffing Activities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals are exploiting SVG files as an initial attack vector in a multi-stage campaign designed to impersonate Ukrainian government communications. FortiGuard Labs has uncovered a sophisticated phishing campaign targeting Ukrainian government agencies through malicious Scalable Vector Graphics (SVG) files, ultimately deploying both cryptocurrency mining malware and information stealers to compromise victim systems. The attack begins […]

    The post SVG Files Abused to Deploy PureMiner Malware and Exfiltrate Data appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers are raising alarms about a growing threat vector as malicious actors increasingly exploit Dynamic DNS providers to establish robust command and control infrastructure.

    These publicly rentable subdomain services, traditionally designed for legitimate hosting purposes, have become the preferred platform for threat actors seeking to circumvent conventional security measures and regulatory oversight.

    The rising sophistication of attacks leveraging these services represents a significant evolution in cybercriminal infrastructure development, with far-reaching implications for enterprise security.

    The appeal of Dynamic DNS providers stems from their minimal registration requirements and weak enforcement mechanisms.

    Unlike traditional domain registrars bound by stringent ICANN and IANA regulations, these providers operate with significantly less oversight, allowing cybercriminals to establish hosting infrastructure without extensive identity verification.

    This regulatory gap has created an environment where threat actors can rapidly deploy and maintain malicious infrastructure with minimal risk of immediate takedown.

    Recent analysis reveals that threat actors are exploiting approximately 70,000 domains that offer subdomain rental services.

    These platforms enable attackers to register subdomains and host malicious content while benefiting from the perceived legitimacy of established parent domains.

    The DNS records are typically managed automatically by the service provider, creating an additional layer of operational security for attackers by obscuring their direct involvement in infrastructure management.

    The NameServer DNS search for afraid[.]org produced over 591,000 results (Source – Silent Push)

    Silent Push analysts identified numerous high-profile threat groups exploiting these services, including APT28 (Fancy Bear), which heavily utilized Dynamic DNS domains in documented campaigns.

    The research reveals that state-sponsored groups like APT29 exclusively employed Dynamic DNS domains for their QUIETEXIT command and control communications, demonstrating the strategic value these services provide for persistent thr eat actors.

    Chinese APT groups, including APT10 and APT33, have similarly incorporated Dynamic DNS infrastructure into their operational playbooks, highlighting the global adoption of this technique across diverse threat landscapes.

    Command and Control Infrastructure Abuse

    The exploitation of Dynamic DNS providers for command and control communications represents one of the most concerning applications of this infrastructure abuse.

    Threat actors leverage these services to establish persistent communication channels with compromised systems while maintaining operational flexibility and resilience against takedown efforts.

    The distributed nature of these services across multiple providers creates a complex web of infrastructure that traditional security controls struggle to comprehensively monitor and block.

    The technical architecture of Dynamic DNS abuse involves multiple layers of obfuscation and redundancy.

    Attackers typically register multiple subdomains across different providers, implementing domain generation algorithms that can dynamically switch between active command and control nodes.

    This approach ensures continuity of operations even when individual domains are identified and blocked by security teams.

    The automatic DNS record management provided by these services eliminates the need for attackers to maintain direct control over DNS infrastructure, further reducing their operational footprint and detection risk.

    Analysis of malicious campaigns reveals sophisticated rotation techniques where threat actors pre-register dozens of subdomains and implement time-based activation schedules.

    This methodology allows attackers to maintain long-term persistence while minimizing exposure of their complete infrastructure.

    The low cost and minimal verification requirements of these services enable threat actors to establish extensive backup infrastructure at scale, creating significant challenges for defensive teams attempting comprehensive mitigation.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Leveraging Dynamic DNS Providers to Use for Malicious Purposes appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have identified a growing trend where threat actors are increasingly exploiting Dynamic DNS providers to host malicious infrastructure, posing significant risks to enterprise organizations worldwide. Dynamic DNS providers, also known as publicly rentable subdomain providers, have become attractive targets for malicious actors due to their accessibility and limited regulatory oversight. These services essentially […]

    The post Threat Actors Exploiting Dynamic DNS Providers for Malicious Activity appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code on a victim’s machine.

    Tracked as CVE-2025-56383, the flaw exists in version 8.8.3 and potentially affects all installed versions of the software, putting millions of users at risk.

    The vulnerability enables a local attacker to achieve code execution by planting a malicious DLL file in a location where the application will load it. This type of attack undermines the integrity of the application and can be used to establish persistence or escalate privileges on a compromised system.

    PoC Exploit Released

    DLL (Dynamic Link Library) hijacking exploits the way Windows applications search for and load required libraries. If an application searches for a DLL without specifying a full path, it may look in several directories in a predefined order.

    An attacker can place a malicious DLL with the same name as a legitimate one in a directory that is searched before the actual library’s location. When the user launches the application, the malicious DLL is loaded and executed instead of the intended one.

    In the case of Notepad++, the vulnerability can be exploited by targeting the DLLs associated with its plugins. According to the proof-of-concept, an attacker can replace a plugin file, such as NppExport.dll, located in the Notepad++\plugins\NppExport\ directory, with a custom-crafted malicious DLL.

    To remain undetected and ensure the application continues to function normally, the attacker can rename the original DLL (e.g., to original-NppExport.dll) and have the malicious replacement forward all legitimate function calls to it.

    This technique, known as proxying, makes the application’s behavior appear seamless to the user while the malicious payload executes in the background.

    The provided example demonstrates this file replacement. The malicious NppExport.dll is significantly smaller than the original-NppExport.dll, indicating it contains different code.

    Malicious File

    Upon launching Notepad++.exe, the application loads the malicious DLL, leading to the execution of the attacker’s code.

    A successful exploit was demonstrated by the appearance of a test message box, confirming that the arbitrary code was executed with the same permissions as the user running Notepad++.

    DLL Hijacking Test
    DLL Hijacking Test

    Mitigations

    The primary threat from this vulnerability is local code execution. An attacker who has already gained initial access to a system through malware, phishing, or other means can use this flaw to establish persistence.

    By hijacking a DLL in a commonly used application like Notepad++, the attacker’s code will run every time the user opens the editor, ensuring the malware survives system reboots.

    While the demonstration was performed on Notepad++ v8.8.3 installed via the official npp.8.8.3.Installer.x64.exe, the underlying issue is fundamental to how the application loads its components, suggesting that any installed version could be vulnerable.

    Currently, there is no official patch from the Notepad++ developers to address CVE-2025-56383. Users are advised to exercise caution and ensure their systems are free from prior infections

    System administrators should consider implementing file integrity monitoring on application directories to detect unauthorized modifications.

    Until a fix is released, users should only download Notepad++ from official sources and be wary of any unexpected behavior from the application.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researchers have identified a critical DLL hijacking vulnerability in Notepad++ version 8.8.3, tracked as CVE-2025-56383. This flaw enables attackers to execute arbitrary code by replacing legitimate Dynamic Link Library (DLL) files within the application’s plugin directory with malicious versions that maintain the same export functions. Technical Details The vulnerability specifically targets Notepad++’s plugin system, particularly […]

    The post Notepad++ DLL Hijack Flaw Lets Attackers Run Malicious Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A fire caused by a lithium-ion battery explosion at a key government data center in South Korea has knocked more than 600 essential services offline, disrupting daily life across the highly digitized nation.

    The incident, which began Friday night at the National Information Resources Service (NIRS) facility in Daejeon, has affected systems for postal banking, mobile identification, tax collection, and emergency services.

    The blaze started around 8:20 PM local time when a disconnected battery exploded during relocation work. The explosion triggered a “thermal runaway,” generating intense heat that complicated firefighting efforts for nearly 10 hours.

    To prevent server overheating and further damage, authorities took preemptive measures and shut down all 647 government IT systems housed in the Daejeon center. The fire was fully extinguished by Saturday evening, but the heat in the server room delayed immediate restoration work.

    The nationwide outage crippled essential public services. Mobile identification systems used in place of physical IDs became inaccessible, affecting travelers at airports.

    The national postal service’s banking functions collapsed, blocking card payments and money transfers, while emergency services lost critical location-tracking capabilities for the 119 rescue system. Government email networks and the national legal database also went dark.

    South Korea’s Ministry of the Interior and Safety is leading recovery efforts, prioritizing services based on public safety and economic impact.

    By Monday, Safety Minister Yun Hojung confirmed that 46 services had been restored, including the main public services portal, Government24, and parts of the Korea Post’s financial systems.

    However, authorities stated that 96 of the systems directly impacted by the fire will be more difficult to restart, and a full recovery timeline remains uncertain. One worker sustained first-degree burns in the incident.

    Prime Minister Kim Min-seok issued a public apology for the disruption, acknowledging the vulnerabilities exposed by concentrating critical systems in a single facility.

    In response to the crisis, President Lee Jae Myung has ordered a “significant improvement” in the security of government systems to prevent future outages.

    This incident is the second major data center fire in South Korea in three years, following a 2022 blaze that disrupted the popular KakaoTalk messaging app for 50 million users.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post DataCenter Fire Takes 600+ South Korean Government Websites Offline appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Google Project Zero researcher Jann Horn has disclosed a novel vulnerability in Apple’s macOS and iOS systems that could potentially allow attackers to bypass Address Space Layout Randomization (ASLR) protections through pointer leaks in serialization processes. Vulnerability Overview The vulnerability exploits a technique that leverages pointer-keyed data structures in Apple’s NSKeyedArchiver serialization framework to leak […]

    The post Google Project Zero Discloses Apple Vulnerability Allowing ASLR Bypass appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶