• APT28, the Russia-linked advanced persistent threat group, has launched a sophisticated campaign targeting Central and Eastern Europe using a zero-day vulnerability in Microsoft Office.

    The threat actors leveraged specially crafted Microsoft Rich Text Format (RTF) files to exploit the vulnerability and deliver malicious backdoors through a multi-stage infection chain.

    The campaign, tracked as Operation Neusploit, represents a significant escalation in APT28’s capabilities and demonstrates their continued focus on high-value targets across Ukraine, Slovakia, and Romania.

    The attack begins when users receive socially engineered emails containing weaponized RTF documents.

    These messages are customized in English and local languages including Romanian, Slovak, and Ukrainian to increase the likelihood of successful infection.

    Once victims open these files, the vulnerability is silently triggered, allowing the threat actors to execute arbitrary code on the compromised system without any visible warning to the user.

    Zscaler analysts identified this campaign in January 2026 and attributed it to APT28 based on significant overlaps in tools, techniques, and procedures with the group’s known operations.

    The researchers observed active exploitation occurring in the wild on January 29, 2026, just three days after Microsoft released an emergency security update to address the vulnerability.

    Infection Mechanism and Persistence Strategy

    The infection chain involves two distinct variants of dropper malware designed to deploy different payloads to compromised systems.

    The first variant deploys MiniDoor, a lightweight email-stealing tool built using Microsoft Outlook Visual Basic for Applications (VBA).

    MiniDoor operates by monitoring Outlook login events and systematically harvesting emails from the infected mailbox. The malware forwards stolen communications to hardcoded email addresses controlled by the attackers.

    To maintain persistence, the dropper modifies Windows registry settings to disable Outlook security protections and automatically load the malicious macro each time the application launches.

    • CVE ID: CVE-2026-21509
    • Vulnerability Type: Remote Code Execution
    • Affected Component: Microsoft Office RTF Handler
    • Severity: Critical
    • Patch Date: January 26, 2026

    The second dropper variant deploys PixyNetLoader, which establishes a foothold for deploying the Covenant Grunt implant, providing the attackers with command-and-control capabilities.

    Both variants employ server-side evasion techniques, delivering payloads only to requests originating from targeted geographic regions with correct HTTP headers. This selective delivery makes detection and analysis significantly more challenging for security researchers worldwide.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post APT28 Hackers Exploiting Microsoft Office 0-Day in the Wild to Deploy Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In March 2025, the Ricochet Chollima APT group, widely recognized as APT37 and linked to North Korean state-sponsored operations, launched a targeted spear-phishing campaign against activists focused on North Korean affairs. The threat actors initiated the attack chain via spear-phishing emails impersonating a North Korea-focused security expert based in South Korea. The emails referenced legitimate […]

    The post Chollima APT Hackers Weaponize LNK Files to Deploy Sophisticated Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Mozilla has rolled out comprehensive AI controls in Firefox 148, launching February 24, 2026, allowing users to globally disable all generative AI features across the browser. The update addresses growing user concerns about AI integration while maintaining optional AI functionality for those who want it. Firefox 148 AI Control Features The new AI controls section […]

    The post Mozilla Introduces Global Kill Switch for Firefox AI Capabilities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new Android spyware campaign that uses romance scams and fake chat profiles to spy on users in Pakistan. The malicious app, named GhostChat and detected as Android/Spy.GhostChat.A, disguises itself as a dating chat platform but is actually built for data theft and surveillance. Instead of being listed on Google Play, it is distributed as […]

    The post GhostChat Malware Locks Victims’ Devices, Demands Passcodes for Restoration appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hundreds of malicious skills are distributed through OpenClaw’s marketplace, transforming the popular AI agent ecosystem into a new supply chain attack vector. Threat actors are weaponizing the platform’s extensibility features to deliver droppers, backdoors, and infostealers disguised as legitimate automation tools.​ OpenClaw Skills Become Malware Distribution Channel OpenClaw is a self-hosted AI agent that executes […]

    The post Abuse of OpenClaw AI Capabilities Enables Stealthy Malware Campaigns appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A dangerous banking malware called Anatsa has been discovered spreading through the Google Play Store, reaching more than fifty thousand downloads before detection.

    The malicious application was cleverly hidden as a document reader, making it appear harmless to unsuspecting users searching for legitimate file management tools.

    This discovery highlights how cybercriminals continue to exploit official app stores as distribution channels for sophisticated financial threats targeting Android users worldwide.

    The Anatsa banking trojan is particularly concerning because it specifically targets banking credentials and sensitive financial information from infected devices.

    The malware operates as an installer that downloads and deploys the full Anatsa banking trojan payload once the initial application gains access to a device.

    Users who downloaded and installed this fake document reader application unknowingly gave the malware permission to operate with elevated access, creating a gateway for financial theft and personal data extraction.

    The distribution method through Google’s official marketplace made this attack particularly effective, as users typically trust applications found on authorized platforms.

    This represents a significant breach in app store security screening processes, demonstrating how malicious developers continue to evade detection systems.

    Zscaler ThreatLabz analysts identified this malicious application and immediately began tracking its distribution network and associated command-and-control infrastructure.

    The security researchers confirmed the malware’s connection to banking theft operations and provided detailed technical indicators to help other security teams detect infected devices.

    Their investigation revealed the attack chain and documented how the malware communicates with external servers to receive commands and exfiltrate stolen banking information.

    Analyzing the Malware’s Infection and Communication Mechanism

    Understanding how Anatsa establishes persistence on infected Android devices is crucial for users and security professionals seeking to prevent compromise.

    Once installed, the banking trojan integrates itself into the operating system and actively monitors user activity, particularly focusing on banking application interactions.

    When users open their banking applications or enter financial credentials, the malware captures this sensitive information through overlay attacks and credential logging techniques.

    The malware then communicates with command-and-control servers located at specific IP addresses, transmitting stolen banking details directly to threat actors.

    This direct connection to attacker-controlled infrastructure means compromised devices remain under active threat actor control, continuously feeding banking information and session tokens to criminal operations.

    Security researchers recommend users immediately remove any suspicious document reader applications, verify app authenticity through official channels, and enable multi-factor authentication on all banking accounts to mitigate potential compromise risks.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post Malicious App on The Google Play with 50K+ Downloads Deploy Anatsa Banking Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical authenticated command execution vulnerability has been disclosed affecting multiple Hikvision Wireless Access Point (WAP) models.

    The flaw, tracked as CVE-2026-0709, stems from insufficient input validation in device firmware, potentially allowing attackers with valid credentials to execute arbitrary commands on affected systems.

    The vulnerability carries a CVSS v3.1 base score of 7.2, indicating a high-severity threat.

    According to the advisory, attackers who can authenticate to the device can send specially crafted packets containing malicious commands directly to the WAP, bypassing critical security controls.

    This attack vector bypasses network perimeter defenses since it requires valid credentials, making it particularly dangerous in environments where user authentication has been compromised or where insider threats exist.

    Affected Models and Timeline

    Affected ModelVulnerable Firmware Version
    DS-3WAP521-SIV1.1.6303 build250812 and earlier
    DS-3WAP522-SIV1.1.6303 build250812 and earlier
    DS-3WAP621E-SIV1.1.6303 build250812 and earlier
    DS-3WAP622E-SIV1.1.6303 build250812 and earlier
    DS-3WAP623E-SIV1.1.6303 build250812 and earlier
    DS-3WAP622G-SIV1.1.6303 build250812 and earlier

    Hikvision has released patched firmware versions (V1.1.6601 build 251223) that address the flaw across all affected devices.

    The vulnerability was initially reported on January 30, 2026, by an independent security researcher, exzettabyte.

    Organizations deploying these WAP models should immediately prioritize updating to the resolved firmware version to mitigate exploitation risks.

    Vulnerability Details and Impact

    The authenticated nature of this vulnerability makes it particularly concerning for enterprise environments.

    While attackers must possess valid device credentials, compromised user accounts, stolen credentials, or insider threats can serve as entry points.

    Once authenticated, the insufficient input validation allows threat actors to inject and execute arbitrary commands with device privileges, potentially leading to complete system compromise.

    Organizations operating affected Hikvision WAP models should take immediate action. Patches are available for download on the official Hikvision support portal.

    Administrators should deploy firmware version V1.1.6601 build 251223 across all vulnerable devices in their infrastructure.

    Simultaneously, organizations should review access controls and enforce strong authentication mechanisms to limit device access to authorized personnel only.

    For organizations unable to patch immediately, implementing network segmentation to restrict device access and monitoring authentication logs for suspicious activity can provide interim protection.

    Additionally, credential rotation for affected devices is recommended to prevent exploitation through compromised accounts. Hikvision’s HSRC continues monitoring security threats and welcomes vulnerability disclosures at hsrc@hikvision.com.

    Organizations with questions regarding this vulnerability should contact Hikvision support through official channels.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hundreds of malicious skills designed to deliver trojans, infostealers, and backdoors disguised as legitimate automation tools.

    VirusTotal has uncovered a significant malware distribution campaign targeting OpenClaw, a rapidly growing personal AI agent ecosystem.

    OpenClaw, previously known as Clawdbot and briefly as Moltbot, is a self-hosted AI agent that executes real system actions, including shell commands, file operations, and network requests.

    OpenClaw Skill Abuse Campaign

    The platform extends functionality through skills, small packages built around SKILL.md files that users discover and install from ClawHub, the public marketplace for OpenClaw extensions.

    Users run untrusted code during setup(source : VirusTotal)
    Users run untrusted code during setup (source: VirusTotal)

    While this architecture enables powerful automation capabilities, it creates a dangerous attack surface.

    Skills run as third-party code with complete system access, often requiring users to paste commands into terminals, download binaries, or execute scripts during setup.

    Threat actors are exploiting this trust model to distribute malware through seemingly helpful tools.

    A Mach-O binary flagged by 16 engines( source : VirusTotal)
    A Mach-O binary flagged by 16 engines (source: VirusTotal)

    VirusTotal Code Insight has analyzed over 3,016 OpenClaw skills, and hundreds of them exhibit malicious characteristics.

    Base64-obfuscated macOS script( source : VirusTotal)
    Base64-obfuscated macOS script( source : VirusTotal)

    The analysis, powered by Gemini 3 Flash, examines security behaviors such as external code execution, sensitive data access, and unsafe network operations, rather than relying solely on traditional antivirus signatures.

    Gemini 3 Pro flags it as AMOS infostealer( source : VirusTotal)
    Gemini 3 Pro flags it as AMOS infostealer( source : VirusTotal)

    Security researchers identified two distinct threat categories: skills that contain poor security practices, such as insecure APIs, hardcoded secrets, and unsafe command execution.

    Intentionally malicious skills designed for data exfiltration, remote control, and malware installation.

    Prolific Malware Publisher

    A particularly concerning case involves ClawHub user “hightower6eu,” who published 314 malicious skills covering crypto analytics, finance tracking, and social media analysis.

    Each skill instructs users to download and execute external code from untrusted sources during setup. One example, a “Yahoo Finance” skill, appeared clean to traditional antivirus engines.

    However, VirusTotal Code Insight identified instructions directing Windows users to download a password-protected ZIP file containing openclaw-agent.exe, which multiple vendors have detected as a packed trojan.

    For macOS users, the skill pointed to a Base64-obfuscated shell script on glot.io. That downloaded and executed a Mach-O binary identified as Atomic Stealer (AMOS), an infostealer targeting passwords, browser credentials, and cryptocurrency wallets.

    Organizations and users should treat skill folders as trusted-code boundaries, implement sandboxed execution, and avoid skills that require shell commands or binary downloads.

    Marketplace operators should implement publish-time scanning to flag remote execution and obfuscated scripts.

    VirusTotal is exploring integration with OpenClaw’s publishing workflow to provide automated security analysis during skill submission.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post OpenClaw AI Agent Skills Abused by Threat Actors to Deliver Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A malicious application on the Google Play Store masquerading as a legitimate document reader. The deceptive application, which has accumulated over 50,000 downloads, functions as a dropper for the notorious Anatsa banking trojan, a sophisticated malware strain known for targeting financial institutions and compromising user banking credentials. The malicious app leverages social engineering tactics by […]

    The post Malicious Google Play App With 50K+ Downloads Spreads Anatsa Banking Trojan appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Hikvision has disclosed a high-severity command execution vulnerability affecting multiple wireless access point models, potentially allowing authenticated attackers to execute arbitrary commands on affected devices. The company released an advisory on January 30, 2026, detailing the security flaw and urging customers to apply patches immediately. Vulnerability Details The vulnerability, tracked as CVE-2026-0709, stems from insufficient input […]

    The post Hikvision Wireless AP Flaw Could Let Attackers Run Arbitrary Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶