• The U.S. Secret Service has dismantled a massive, sophisticated network of electronic devices in the New York tristate area, thwarting what it described as an “imminent threat” to senior U.S. government officials and the agency’s protective operations.

    The operation led to the seizure of over 300 SIM servers and 100,000 SIM cards that could have been used to launch large-scale telecommunications attacks, including disabling cell phone towers.

    The discovery was made as part of a protective intelligence investigation that uncovered multiple sites housing the equipment. These devices were strategically located within 35 miles of the United Nations General Assembly, which is currently underway in New York City, heightening the urgency of the intervention.

    Authorities believe the network was capable of carrying out operations that include disabling cell phone towers, denial-of-service (DoS) attacks, and providing encrypted communication channels for criminal enterprises and hostile actors.

    Sophisticated Network of Malicious Devices

    The scale of the operation underscores the potential for severe disruption. Investigators found rooms filled with racks of SIM servers, also known as SIM banks.

    These devices are designed to hold and manage thousands of SIM cards simultaneously, allowing operators to automate cellular activities, spoof caller IDs, and route communications through a vast web of untraceable numbers.

    This infrastructure could have been weaponized to overwhelm cellular networks, creating a communications blackout in a critical metropolitan area.

    SIM card farm
    SIM card farm

    In addition to making anonymous threats against high-profile individuals, the network’s capabilities presented a significant risk to public safety and national security.

    The ability to disable cell phone towers could cripple emergency services, disrupt financial markets, and sow widespread chaos, particularly during a high-stakes event like the UN General Assembly, which brings numerous world leaders to the city.

    The U.S. Secret Service moved swiftly to dismantle the network given the timing, location, and the grave potential for disruption.

    SIM card farm
    SIM card farm

    While the forensic examination of the seized devices is still in its early stages, preliminary analysis has uncovered alarming connections.

    According to the Secret Service, early findings indicate cellular communications between known nation-state threat actors and individuals already on the radar of federal law enforcement.

    This link suggests the operation may have been part of a foreign intelligence or state-sponsored campaign to undermine U.S. security interests.

    The investigation is being led by the U.S. Secret Service’s Advanced Threat Interdiction Unit, a newly formed section dedicated to neutralizing the most significant and imminent threats against its protectees.

    “The potential for disruption to our country’s telecommunications posed by this network of devices cannot be overstated,” said U.S. Secret Service Director Sean Curran.

    “The U.S. Secret Service’s protective mission is all about prevention, and this investigation makes it clear to potential bad actors that imminent threats to our protectees will be immediately investigated, tracked down and dismantled.”

    The ongoing investigation involves close collaboration with several key partners, including the Department of Homeland Security’s Homeland Security Investigations, the Department of Justice, the Office of the Director of National Intelligence, and the NYPD, along with other state and local law enforcement agencies that provided technical advice and support.

    As forensics experts continue to analyze the seized hardware, more details are expected to emerge about the full scope of the network, its intended targets, and the foreign entities behind it.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards Disabling Cell Phone Towers appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Austin, Texas, USA, September 23rd, 2025, CyberNewsWire

    New SpyCloud 2025 Identity Threat Report reveals dangerous disconnect between perceived security readiness and operational reality.

    SpyCloud, the leader in identity threat protection, today released the 2025 SpyCloud Identity Threat Report, revealing that while 86% of security leaders report confidence in their ability to prevent identity-based attacks, 85% of organizations were affected by a ransomware incident at least once in the past year – with over one-third affected between six and ten times.

    Further illustrating the gap between perceived confidence and actual exposure, the market survey of over 500 security leaders across North America and the UK revealed that over two-thirds of organizations are significantly or extremely concerned about identity-based cyberattacks, yet only 38% can detect historical identity exposures that create risk due to poor cyber hygiene like credential reuse.

    As organizations grapple with sprawling digital identities across SaaS platforms, unmanaged devices, and third-party ecosystems, attackers are capitalizing on these gaps.

    “From phishing and infostealer infections to reused credentials and unmanaged access, today’s threat actors are exploiting overlooked identity exposures,” said Damon Fleury, SpyCloud’s Chief Product Officer.

    “These tactics allow adversaries to bypass traditional defenses and quietly establish access that can lead to follow-on attacks like ransomware, account takeover, session hijacking, and fraud. This report surfaces the critical truth that many organizations feel prepared but their defenses don’t extend to the places adversaries are now operating.”

    Identity Sprawl is Expanding the Attack Surface

    Identity has become the gravitational center of modern cyber threats.

    An individual’s digital identity now spans hundreds of touchpoints, including corporate and personal credentials, session cookies, financial data, and personally identifiable information (PII) across SaaS platforms, managed and unmanaged devices, and third-party applications. 

    These elements when exposed on the darknet create a vast, interconnected attack surface ripe for exploitation. SpyCloud has recaptured 63.8 billion distinct identity records from the dark web, a 24% increase year-over-year.

    This illustrates the unprecedented scale of data circulating in the criminal underground, leaving organizations vulnerable because they lack the visibility and automation needed to shut down these exposures before they become additional entry points for follow-on identity-based attacks.

    This surge in exposure is fueling broad concern. Nearly 40% of organizations surveyed identified four or more identity-centric threats as “extreme” concerns, with phishing (40%), ransomware (37%), nation-state adversaries (36%), and unmanaged or unauthorized devices (36%) leading the list.

    Insider Threats Begin with Identity Compromise

    The report also highlights that insider threats, whether malicious or unwitting, often share a common origin: identity compromise.

    Nation-state actors, including North Korean IT operatives, are leveraging stolen or synthetic identities to infiltrate organizations by posing as legitimate contractors or employees.

    SpyCloud’s investigative findings show that attackers are assembling synthetic identities using phished cookies, malware-exfiltrated API keys, and reused credentials to pass background checks and weak screening processes.

    Further emphasizing this point, previous SpyCloud research found that 60% of organizations still rely on manual, ad-hoc communication between HR and security teams.

    Without hardened security screening that gives organizations visibility into candidates’ historical identity misuse and connections to criminal infrastructure, these actors can remain undetected until it’s too late.

    At the same time, legitimate employees, contractors, or partners may unknowingly introduce risk when their identities are compromised.

    These unwitting insiders are frequently targeted through phishing and infostealer malware, resulting in stolen credentials and session cookies that provide persistent access to internal systems.

    Phishing, in particular, was cited as the leading entry point for ransomware in 2025, accounting for 35% of incidents – a 10-point increase over the previous year.

    Defenses Fall Short in Responding to Identity-Based Threats

    Despite growing awareness of identity-driven threats, most organizations are not equipped to respond effectively:

    • 57% lack strong capabilities to invalidate exposed sessions
    • Nearly two-thirds lack repeatable remediation workflows
    • About two-thirds do not have formal investigation protocols
    • Less than 20% can automate identity remediation across systems

    Only 19% of organizations have automated identity remediation processes in place. The rest rely on case-by-case investigation or incomplete playbooks that leave gaps attackers can exploit.

    “The defense mission has changed,” said Trevor Hilligoss, SpyCloud’s Head of Security Research. “Attackers are opportunistic, chaining together stolen identity data to find any available access point.

    Yet traditional defenses remain narrowly focused on behavior and endpoints – missing the identity exposures that enable persistent, undetected access.

    The data shows organizations must extend protection to the identity layer, and keep a continuous eye on exposures and remediation to shut down threats before follow-on attacks can occur.”

    Closing Identity Gaps Before Insider Threats Escalate

    The report underscores the need for a holistic approach to identity protection. This means continuously correlating exposures across users’ full digital footprint – including past and present, personal and corporate identities – and automating remediation of compromised credentials, cookies, PII, and access tokens.

    In doing so, organizations move beyond account-level protection and gain visibility into identity risks threat actors were previously exploiting.

    SpyCloud’s holistic identity intelligence empowers organizations to prevent identity-based threats by:

    • Detecting fraudulent job candidates before access is granted
    • Identifying compromised employees and users across devices and environments
    • Invalidating exposed sessions and credentials at scale
    • Accelerating investigations through automated correlation of darknet exposure data

    “Teams that excel in identity security know exactly where exposures exist, can address them at scale, operate with clearly defined responsibilities, and continually adapt rather than simply react,” added Fleury.

    “The future belongs to those who treat identity as mission-critical – building systems that detect compromise early, respond decisively, and beat threat actors from launching further attacks while keeping a strong and secure workforce.”

    Users can click here to access the full report or contact SpyCloud to learn more. 

    About SpyCloud

    SpyCloud transforms recaptured darknet data to disrupt cybercrime. Its automated identity threat protection solutions leverage advanced analytics and AI to proactively prevent ransomware and account takeover, detect insider threats, safeguard employee and consumer identities, and accelerate cybercrime investigations.

    SpyCloud’s data from breaches, malware-infected devices, and successful phishes also powers many popular dark web monitoring and identity theft protection offerings.

    Customers include seven of the Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies worldwide.

    Headquartered in Austin, TX, SpyCloud is home to more than 200 cybersecurity experts whose mission is to protect businesses and consumers from the stolen identity data criminals are using to target them now.

    To learn more and see insights on your company’s exposed data, users can visit spycloud.com.

    Contact

    Emily Brown

    REQ on behalf of SpyCloud

    ebrown@req.co

    The post SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Austin, Texas, USA, September 23rd, 2025, CyberNewsWire New SpyCloud 2025 Identity Threat Report reveals dangerous disconnect between perceived security readiness and operational reality. SpyCloud, the leader in identity threat protection, today released the 2025 SpyCloud Identity Threat Report, revealing that while 86% of security leaders report confidence in their ability to prevent identity-based attacks, 85% […]

    The post SpyCloud Report: 2/3 Orgs Extremely Concerned About Identity Attacks Yet Major Blind Spots Persist appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SolarWinds has released hot fixes to address a critical security flaw impacting its Web Help Desk software that, if successfully exploited, could allow attackers to execute arbitrary commands on susceptible systems. The vulnerability, tracked as CVE-2025-26399 (CVSS score: 9.8), has been described as an instance of deserialization of untrusted data that could result in code execution. It affects

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Leveraging a native IIS module named BadIIS, attackers manipulated search engine crawler traffic to poison search results and redirect legitimate users to scam or adult-oriented websites. Infrastructure overlaps link this activity to ESET’s “Group 9” cluster and share functional similarities with Cisco Talos’s “DragonRank” campaign. In March 2025, Unit 42 researchers uncovered an advanced SEO […]

    The post Hackers Hijacking IIS Servers Using Malicious BadIIS Module to Serve Malicious Content appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • SolarWinds has released an urgent security advisory for a critical vulnerability in its Web Help Desk software that could allow an unauthenticated attacker to achieve remote code execution (RCE).

    The flaw, tracked as CVE-2025-26399, carries a critical severity rating of 9.8 out of 10, highlighting the severe risk it poses to affected systems. The vulnerability stems from the deserialization of untrusted data within the AjaxProxy component of the software.

    According to the advisory, the vulnerability allows a remote attacker to execute arbitrary commands on the host machine without needing any credentials.

    This issue is particularly concerning as it is a patch bypass for two previously addressed vulnerabilities, CVE-2024-28988 and CVE-2024-28986.

    This recurrence suggests a persistent weakness in the software’s handling of serialized data, allowing security researchers to find new ways to exploit the same underlying problem.

    SolarWinds has credited an anonymous researcher working with Trend Micro’s Zero Day Initiative for discovering and responsibly disclosing this latest iteration of the flaw.

    Mitigations

    In response to the discovery, SolarWinds has issued Web Help Desk 12.8.7 Hotfix 1. The company strongly urges all customers who have downloaded and installed version 12.8.7 to apply this hotfix immediately to mitigate the risk of exploitation.

    The patch addresses the vulnerability by modifying several core files, including whd-core.jar, whd-web.jar, and whd-persistence.jar, and adding the HikariCP.jar file.

    Administrators are instructed to stop the Web Help Desk service, back up and replace the specified files, and then restart the service to complete the installation.

    Failure to apply the hotfix leaves systems exposed to potential takeover by remote attackers.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post SolarWinds Web Help Desk Vulnerability Enables Unauthenticated RCE appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has released comprehensive guidance for implementing certificate-based authentication in Windows Admin Center (WAC), providing administrators with enhanced security through smart card integration and Active Directory Certificate Services. This authentication method significantly strengthens access controls by requiring administrators to present valid certificates before accessing the management gateway, effectively adding a strong second authentication factor beyond […]

    The post Microsoft Publishes Guide for Certificate-Based Authentication in Windows Admin Center appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Threat actors were manipulating the Instance Metadata Service (IMDS), a core component designed to securely furnish compute instances with temporary credentials to infiltrate and navigate cloud infrastructures

    By compelling unsuspecting applications to query IMDS endpoints, attackers harvest short-lived tokens, enabling credential theft, lateral movement, and privilege escalation within victim environments.

    Exploit IMDS Service 

    Wiz reports that the Instance Metadata Service operates at the heart of AWS, Azure, and GCP virtual machines, exposing critical data and IAM credentials via HTTP requests to the privileged 169.254.169[.]254 address. 

    While IMDSv2 strengthens security through session-oriented token retrieval, IMDSv1 remains vulnerable to Server-Side Request Forgery (SSRF). 

    Attackers exploit SSRF flaws or misconfigured workloads to proxy IMDS calls, stealing role-based credentials without direct host control.

    By establishing a baseline of legitimate clients, such as AWS SDKs, EC2 agents, and nm-cloud-setup, researchers isolate processes that infrequently access IMDS. 

    Filtering for sensitive metadata paths (for example, /latest/meta-data/iam/security-credentials/ and /computeMetadata/v1/instance/service-accounts/) and prioritizing instances with internet exposure reveals stealthy reconnaissance and exfiltration attempts.

    Two real-world findings underscore the ability of this tactic. In the first, a zero-day SSRF in pandoc (CVE-2025-51591) enabled malicious HTML <iframe> tags to query /latest/meta-data/iam/info, exposing instance roles. 

    Attackers bypassed recommended –raw_html and –sandbox flags, but enforcement of IMDSv2 thwarted their payload by invalidating stateless GET requests. Had IMDSv1 been in use, the exploit would have yielded full credential compromise.

    Prevalence of various processes in cloud environments and their IMDS usage
    Prevalence of various processes in cloud environments and their IMDS usage

    The second discovery involved ClickHouse’s SELECT * FROM url function in an unauthenticated setup.

    By directing URL queries at IMDS, attackers could retrieve metadata tokens. Although this specific incident in a GCP environment failed due to limited privileges, it highlights the cloud-agnostic danger of SSRF-driven IMDS abuse. 

    A misconfigured ClickHouse instance with S3 access could easily precipitate a major breach, Wiz said.

    For defenders, proactive prevention and real-time detection are essential. Enforcing IMDSv2 across all compute instances, limiting network access to metadata endpoints, and applying the principle of least privilege to IAM roles dramatically reduces exposure. 

    Meanwhile, runtime sensors that flag unusual IMDS requests and exfiltration patterns can swiftly identify in-flight attacks.

    Cloud security teams must evolve from signature-based defenses to anomaly hunting tracking, which processes should never query IMDS, and alerting on deviations.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Hackers Exploits IMDS Service to Gain Initial Access to a Cloud Environment appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A novel npm package named fezbox has been uncovered by the Socket Threat Research Team as a sophisticated malware delivery mechanism that exfiltrates username and password credentials from browser cookies via an embedded QR code. Published under the npm alias janedu (registration email janedu0216@gmail[.]com), the package masquerades as a harmless JavaScript/TypeScript utility library while quietly […]

    The post New npm Malware Steals Browser Passwords via Steganographic QR Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Big companies are getting smaller, and their CEOs want everyone to know it. Wells Fargo has cut its workforce by 23% over five years, Bank of America has shed 88,000 employees since 2010, and Verizon’s CEO recently boasted that headcount is “going down all the time.” What was once a sign of corporate distress has become a badge of honor, with executives celebrating lean operations and AI-driven

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶