• A seemingly innocent patch update for the popular 2D platformer game BlockBlasters has transformed into a sophisticated malware campaign, exposing hundreds of Steam users to data theft and system compromise.

    The malicious patch, deployed on August 30, 2025, demonstrates how threat actors are increasingly exploiting the gaming ecosystem to distribute information-stealing malware while users remain unaware of the ongoing compromise.

    BlockBlasters, developed by Genesis Interactive and initially released on July 31, 2025, had garnered positive reviews from the gaming community before becoming the latest victim in a growing trend of Steam game infections.

    The malicious Build 19799326 patch contains multiple files that exhibit dangerous behaviors, transforming what appeared to be a routine game update into a multistage attack capable of exfiltrating sensitive user data including cryptocurrency wallet information, browser credentials, and Steam login details.

    G Data analysts identified the malware campaign after their MXDR platform flagged the suspicious activities within the game’s patch files.

    The security researchers discovered that the threat actors had successfully bypassed Steam’s initial security screening, allowing the deployment of malicious updates that could potentially affect hundreds of players who had the game installed on their systems.

    This incident follows a concerning pattern of similar attacks on Steam games, including the notable PirateFi and Chemia cases, highlighting the platform’s ongoing vulnerability to such sophisticated infiltration attempts.

    The attack represents a significant escalation in gaming-focused malware campaigns, as threat actors continue to refine their techniques for distributing malicious payloads through legitimate software distribution channels.

    The incident particularly stands out due to its multistage infection process and the range of sensitive data it targets, making it a comprehensive information theft operation rather than a simple malware installation.

    Technical Infection Mechanism and Payload Delivery

    The BlockBlasters malware operates through a sophisticated three-stage infection mechanism that begins with the execution of a seemingly benign batch file named game2.bat.

    This initial payload performs several reconnaissance functions, including collecting IP and location information through queries to legitimate services like “ipinfo[.]io” and “ip[.]me”, while simultaneously detecting installed antivirus products to assess the target environment’s security posture.

    The batch file’s primary function involves collecting Steam login credentials, including SteamID, AccountName, PersonaName, and RememberPassword data, which it then uploads to the command and control server located at hxxp://203[.]188[.]171[.]156:30815/upload.

    The malware employs password-protected ZIP archives with the password “121” to conceal its payloads during download, effectively evading initial detection mechanisms.

    SteamDB Patch Files from SteamDB (Source – G Data)

    Upon successful environment assessment, the malware deploys VBS loader scripts (launch1.vbs and test.vbs) that execute additional batch files while maintaining stealth through hidden console execution.

    The test.bat component specifically targets browser extensions and cryptocurrency wallet data, demonstrating the campaign’s focus on high-value financial information.

    The final stage involves the deployment of two primary payloads: Client-built2.exe, a Python-compiled backdoor that establishes persistent communication with the C2 infrastructure, and Block1.exe, which contains the StealC information stealer.

    The malware strategically adds its execution directory to Microsoft Defender’s exclusion list using the path Drive:\SteamLibrary\steamapps\common\BlockBlasters\Engine\Binaries\ThirdParty\Ogg\cwe\, ensuring continued operation without triggering security alerts.

    Game2.bat unpacking files inside password-protected archives and then executing it (Source – G Data)

    The StealC component targets multiple browsers including Google Chrome, Brave Browser, and Microsoft Edge, accessing their respective Local State files to extract stored credentials and sensitive information.

    The malware uses deprecated RC4 encryption to obfuscate its API calls and key strings, connecting to a secondary C2 server at hxxp://45[.]83[.]28[.]99 for data exfiltration operations, demonstrating the campaign’s distributed infrastructure approach to maintaining operational security.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post BlockBlasters Steam Game Downloads Malware to Computer Disguised as Patch appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In recent weeks, security researchers have observed a surge in attacks exploiting Oracle Database Scheduler’s External Jobs feature to gain a foothold in corporate environments.

    This technique abuses the scheduler’s ability to execute arbitrary commands on Windows-based database servers, allowing adversaries to bypass perimeter defenses.

    Initial intrusion vectors involve probing publicly exposed Oracle listener ports and leveraging misconfigured credentials or default administrative accounts.

    Once connected, attackers can invoke the extjobo.exe component to run commands with the same privileges as the OracleJobScheduler service.

    The impact of this technique has been significant. Organizations that segmented their networks and isolated database servers were still compromised due to the inherent trust placed in the database scheduler process.

    In one incident, threat actors established encrypted tunnels to external Command & Control (C2) servers, created local administrative accounts, and deployed ransomware under the guise of standard database operations.

    Event logs reveal multiple failed login attempts followed by a successful SYSDBA connection, indicating credential harvesting or brute-force tactics preceding command execution.

    extjobo[.]exe execution (Source – Yarix)

    Yarix analysts noted that, following credential acquisition, the adversaries leveraged Oracle DBS External Jobs to spawn encoded PowerShell processes. This behavior highlights a shift towards living-off-the-land techniques that avoid dropping custom executables on disk.

    Instead, the attackers piped Base64-encoded scripts directly into PowerShell via extjobo.exe, complicating detection and evasion of endpoint defenses.

    In one case, the attacker executed a command to gather system information before payload download. The decoded script is shown below:

    $cpu = Get-CimInstance -ClassName Win32_Processor
    $ram = Get-CimInstance -ClassName Win32_ComputerSystem
    Write-Host $cpu.Name, $cpu.NumberOfLogicalProcessors, [math]::Round($ram.TotalPhysicalMemory/1GB,2)
    Get-PSDrive -PSProvider FileSystem
    Get-WmiObject -Class Win32_OperatingSystem | Select-String 'OS Name'
    Get-ItemProperty -Path HKLM:\Server-Tcp -Name PortNumber

    Infection Mechanism via External Jobs

    The Oracle Database Scheduler’s External Jobs feature was designed to allow database administrators to run operating-system commands for maintenance tasks.

    Content of the ransom note (Source – Yarix)

    However, threat actors have discovered that any user with scheduler privileges can connect to the named pipe used by extjobo.exe and inject malicious commands. In the observed attacks, adversaries first authenticated as SYSDBA, then invoked:

    extjobo.exe -noservice -exec C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -EncodedCommand JABjAD0AbgBl…

    This invocation bypasses script execution policies (-ep Bypass) and injects Base64-encoded payloads directly into memory.

    The scheduler listens on a pipe—typically accessible to the ORACLEDBS service account—granting command execution without spawning new processes detectable by conventional monitoring tools.

    Following initial reconnaissance, the attackers used similar commands to download secondary payloads from C2 servers, establish reverse shells, and create a local account named Admine for persistence and lateral movement.

    By abusing legitimate scheduler functionality, the adversaries avoid writing executable artifacts to disk and rely on native Windows tools for reconnaissance, payload staging, and tunneling.

    Logs confirm that after each execution instance, the attackers deleted temporary batch files and scheduler tasks, further hindering forensic analysis.

    This technique underscores the need for tighter access controls on scheduler privileges, vigilant monitoring of named-pipe activity, and anomaly detection for unusual extjobo.exe invocations in Oracle database environments.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Threat Actors Leverage Oracle Database Scheduler to Gain Access to Corporate Environments appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated Iran-nexus espionage group known as Subtle Snail has emerged as a significant threat to European telecommunications, aerospace, and defense organizations through an elaborate recruitment-themed social engineering campaign.

    The group, also identified as UNC1549 and linked to the broader Unyielding Wasp network, has successfully compromised 34 distinct devices across 11 organizations since June 2022 by masquerading as HR representatives from legitimate companies to engage unsuspecting employees.

    The attackers operate through meticulously crafted LinkedIn profiles, presenting themselves as hiring managers and HR personnel from well-known industry entities.

    Their approach involves extensive reconnaissance to identify high-value targets within organizations, particularly focusing on researchers, developers, and IT administrators with privileged access to critical systems.

    The threat actors create convincing fake job advertisements and establish domains following patterns like telespazio-careers.com and safrangroup-careers.com to impersonate legitimate companies and enhance the credibility of their recruitment schemes.

    Catalyst analysts noted that Subtle Snail deploys a custom variant of the MINIBIKE backdoor, which communicates with Command and Control infrastructure proxied through Azure cloud services to evade detection.

    At the time of initial discovery, the malicious samples exhibited remarkably low detection rates across most antivirus vendors due to sophisticated obfuscation techniques and the abuse of code signing certificates from Insight Digital B.V., a Dutch company, making the malware appear as trusted software.

    Initial access chain (Source – Prodraft)

    The group’s operational methodology extends beyond simple malware deployment, incorporating victim-specific malware development and comprehensive data exfiltration capabilities that enable systematic collection of proprietary technologies, customer databases, and critical network configurations.

    Their sustained campaign demonstrates the evolving sophistication of state-sponsored threat actors targeting critical infrastructure, with particular emphasis on telecommunications entities while maintaining interest in aerospace and defense sectors for strategic espionage purposes.

    DLL Sideloading as Primary Attack Vector

    The core of Subtle Snail’s infection mechanism relies heavily on DLL sideloading techniques that exploit Windows’ dynamic-link library search order to achieve code execution while remaining undetectable to security controls.

    When victims execute what appears to be a legitimate setup.exe file contained within ZIP archives named Application.zip, TimeTable.zip, or TimeScheduler.zip, the threat actors utilize a malicious MINIBIKE DLL file strategically placed alongside the legitimate executable to perform DLL sideloading.

    The malware leverages Windows’ DLL search order mechanism to load malicious libraries alongside legitimate applications, effectively bypassing security controls on trusted processes.

    Execution chain (Source – Prodraft)

    The group systematically names their malicious DLLs with common system library names such as iumbase.dll, dwrite.dll, or umpdc.dll to masquerade as legitimate Windows components.

    Each DLL is specifically crafted for individual victims and operations, with legitimate DLL files being modified to facilitate seamless execution of the sideloading attack.

    The technical implementation involves substituting function names in the export section with direct string variables, allowing attackers to bypass typical detection mechanisms by manipulating the DLL’s export table while maintaining the appearance of legitimate files.

    All malicious DLLs are developed using Microsoft Visual C/C++ for 64-bit machine architecture, with WinAPI functions resolved dynamically at runtime after their corresponding module names and process names are decrypted using custom string decryption techniques.

    The MINIBIKE backdoor gathers unique system identifiers and transmits them to the C2 server in the format {UNIQUE_ID}###{DEVICE_NAME}###{NETWORK_INTERFACE_IPs}, initiating the attack chain.

    Upon successful connection, threat actors begin deploying victim-specific DLLs for various purposes including keylogging, credential stealing, and domain name checking, with each DLL executed through the same DLL sideloading technique to maintain operational stealth and persistence throughout the compromise.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Subtle Snail Mimic as HR Representatives to Engage Employees and Steal Login Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity compliance has become a mission-critical part of modern business operations. With the rise of data privacy laws, global regulations, and increasing cyber threats, organizations need reliable compliance management software to stay secure and audit-ready. The best compliance platforms streamline frameworks like SOC 2, ISO 27001, HIPAA, PCI DSS, GDPR, and more while automating workflows, […]

    The post Top 10 Best Cybersecurity Compliance Management Software in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Organizations in Belarus, Kazakhstan, and Russia have emerged as the target of a phishing campaign undertaken by a previously undocumented hacking group called ComicForm since at least April 2025. The activity primarily targeted industrial, financial, tourism, biotechnology, research, and trade sectors, cybersecurity company F6 said in an analysis published last week. The attack chain involves

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new ransomware group has emerged from the shadows, targeting multinational organizations across diverse sectors with precision and systematic approach.

    Kawa4096, first detected in June 2025, has rapidly established itself as a formidable threat to enterprises spanning finance, education, and service industries, particularly focusing on victims in Japan and the United States.

    The group’s operational sophistication suggests well-coordinated cybercriminal activities with potential for widespread impact across multiple countries within a remarkably short timeframe.

    The Kawa4096 ransomware operation demonstrates advanced tactical capabilities through its implementation of double extortion methodologies, combining data encryption with data theft to maximize leverage over victims.

    The group operates a dedicated Tor-based data exfiltration platform where they systematically disclose victim information, creating additional pressure for ransom payment compliance.

    Their operational structure reveals meticulous planning, providing individualized claim URLs for each victim to control data access and maintain organized communication channels throughout the extortion process.

    ASEC analysts noted that the ransomware’s technical implementation incorporates several distinctive characteristics that set it apart from conventional ransomware families.

    The malware automatically re-executes with the - all argument when launched without parameters, ensuring comprehensive file encryption across target systems.

    Additionally, it creates a unique mutex named “SAY_HI_2025” using the CreateMutexA API to prevent duplicate executions and potential system conflicts during the encryption process.

    The ransomware’s configuration management system utilizes embedded resource sections containing 17 distinct fields that control encryption behavior.

    Kawa4096 ransomware data leak site (Source – ASEC)

    These configurations include comprehensive exclusion lists for file extensions, directories, and specific filenames to maintain system stability while maximizing damage.

    Critical system files such as [.]exe, [.]dll, [.]sys, and core Windows components like boot[.]ini and desktop[.]ini are deliberately excluded to preserve system functionality and maintain negotiation capabilities.

    Advanced Encryption Mechanics and Evasion Tactics

    Kawa4096 employs sophisticated partial encryption techniques to optimize speed and efficiency while maintaining destructive impact.

    The malware divides target files into 64KB chunks and encrypts only 25% of each file, significantly reducing encryption time while rendering files completely unusable.

    This selective approach proves particularly effective against databases, documents, and multimedia files, where partial corruption of headers or indexes renders entire files inaccessible.

    The encryption process utilizes the Salsa20 stream cipher algorithm, with encrypted files receiving extensions in the format [original_filename].[extension].[9_random_characters].

    Kawa4096 ransomware ransom note (Source – ASEC)

    For files exceeding 10MB, the ransomware applies strong partial encryption patterns, while smaller files receive full or weak partial encryption treatment.

    This adaptive approach demonstrates the group’s understanding of system performance optimization and victim impact maximization.

    The ransomware systematically terminates critical processes, including database servers, office applications, and backup services to unlock files for encryption.

    Target processes include sqlservr[.]exe, excel[.]exe, firefox[.]exe, outlook[.]exe, and numerous other applications that could interfere with the encryption process or provide recovery mechanisms for victims.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Kawa4096 Ransomware Attacking Multinational Organizations to Exfiltrate Sensitive Data appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In international waters around Latin America, Trump says he ordered another “lethal kinetic strike” on a boat allegedly “affiliated with [an unnamed] Designated Terrorist Organization conducting narcotrafficking in the USSOUTHCOM area of responsibility,” the president posted online Friday. He did not say when this third lethal strike was carried out. 

    Trump said three “narcoterrorists” were killed in the latest attack, and alleged “Intelligence confirmed the vessel was trafficking illicit narcotics, and was transiting along a known narcotrafficking passage enroute to poison Americans.” To our knowledge, neither Trump nor the Pentagon have shared that evidence with the public. “STOP SELLING FENTANYL, NARCOTICS, AND ILLEGAL DRUGS IN AMERICA, AND COMMITTING VIOLENCE AND TERRORISM AGAINST AMERICANS!!!” the president added in his Friday post. 

    Panning out, “In Venezuela, some are speculating whether the strikes are part of a plan to try to topple President Nicolás Maduro, a notion that the Venezuelan leader has echoed,” the Associated Press reports. 

    Some lingering questions about these operations include: 

    • If these boats are carrying fentanyl as alleged, then why not seize one and show the public?
    • What is the U.S. military’s targeting and attack criteria? 
    • Are the boats being contacted before being destroyed? 
    • What is the intelligence behind the lethal strikes, and what is considered an actionable level of confidence in the intelligence? (Hat tip to Josh Collins and Cheryl Rofer for those suggestions.)

    Legal considerations: “A wide range of specialists in domestic and international law regulating the use of force have argued that Mr. Trump and Pete Hegseth, the secretary of defense, are giving the military illegal orders and causing Special Operations forces to deliberately target civilians—even if they are criminal suspects—in violation of murder laws,” the New York Times reports. However, “A draft bill circulated this week within the executive branch and Congress would provide sweeping legal authorization to Mr. Trump to use military force against people, groups and nations he deems linked to narcoterrorism. It is not clear whether it could pass the Republican-controlled Congress.”

    Historical consideration: “At the Nuremberg trials, Karl Dönitz was convicted of war crimes for the sinking of civilian vessels,” lawyer Max Kennerly wrote on social media Monday. “This is not a complicated question,” he added, “it's been illegal for centuries.”

    Update: The Taliban have rejected Trump’s desire to retake Afghanistan’s Bagram Air Base. The group’s deputy spokesman posted a rebuttal on social media Sunday, reminding White House officials, “It is worth recalling that the Doha Agreement clearly stipulated the United States' commitment ‘to refrain from the use of force or threat against the territorial integrity and political independence of Afghanistan, and non-interference in its internal affairs,’ and therefore, they are obligated to fully adhere to these commitments.”

    Reminder: Trump ordered that agreement signed in Doha, which was finalized in the final year of his first term in office. But the president has so far refused to drop the matter. 

    “If Afghanistan doesn’t give Bagram Airbase back to those that built it, the United States of America, BAD THINGS ARE GOING TO HAPPEN!!!” Trump threatened on social media Sunday. 

    U.S. forces in the Middle East say they killed another “senior ISIS” fighter at an undisclosed location in Syria on Friday. His name was Omar Abdul Qader, and Central Command officials described him as “an ISIS member actively seeking to attack the United States.” 

    Worth noting: Syrian troops participated in that operation, which is at least the third time that’s known to have occurred since July, according to Charles Lister of the Middle East Institute, who said the operation took place near Jarjisah, Hama province. 

    “As I understand, there've been more undeclared operations” bringing U.S. and Syrian troops together to fight terrorism, Lister added. 

    By the way: A Syrian president has visited the U.S. for the first time in almost 60 years. Syria’s President Ahmed al-Sharaa arrived in New York City Monday for this week’s United Nations General Assembly, featuring speeches from top-level officials around the world, including Trump on Tuesday. Reuters has a bit more.


    Welcome to this Monday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson with Bradley Peniston and Thomas Novelly. It’s more important than ever to stay informed, so thank you for reading. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1980, Iraq’s Saddam Hussein invaded Iran in an opportunistic attempt to exploit the perceived weakness of its year-old revolutionary government. The ensuing war instead helped Tehran solidify domestic support. 

    Industry

    Shutdown watch: "Last week ended with the House passing a CR (continuing resolution) on a 217-212 vote, but the Senate rejected it on a 44-48 vote. Congress is on recess this week, and we suppose that a rabbit could be pulled out of a hat on Sept. 29-30, but an appropriations lapse looks probable. Our view remains that a shutdown could be immaterial to defense and federal services contractors if a CR can be passed later in October," writes Byron Callan of Capital Alpha.

    F-47's first flight expected in 2028, says Air Force Chief of Staff Gen. David Allvin. That adds specificity to the service's plan for its sixth-gen combat aircraft, which had previously said it would take wing "by decade's end." Manufacturing has begun on the first jet, Allvin said Monday at the Air, Space & Cyber Conference outside Washington, D.C. Defense One’s Thomas Novelly and Lauren C. Williams are at the show this week; watch for their coverage or, if you’re there, reach out to them.

    Lockheed Martin unveils work on a potential CCA competitor. It’s the Vectis drone, which the Skunk Works director says would be stealthy, long-legged enough for Pacific missions, and smaller than an F-16 but larger than a missile. Novelly has a bit more, here.

    Related reading/viewing: 

    Trump 2.0

    The Air Force is operating deportation flights for ICE to Africa with transponders turned off, making them nearly un-trackable, Rolling Stone reported over the weekend. “This includes the third-country removal to Ghana and another secret flight,” investigator Gillian Brockell writes. 

    Trump’s FBI dropped a corruption investigation against Tom Homan. Before he took over as Trump’s “border czar” and prior to the election, FBI agents last year caught Tom Homan accepting a bag containing $50,000 in cash from agents posing as business executives, MSNBC reported this weekend. Homan had promised to help the businessmen win government contracts related to border security should President Trump return to office. 

    One notable hiccup: At the time he accepted the bag of cash, Homan “was not a public official, and Trump was not president at the time he accepted money in the FBI’s undercover sting, so his actions didn’t clearly fit under a standard bribery charge,” Carol Leonnig and Ken Dilanian reported for MSNBC. 

    After Trump took office, the case was dropped by the Justice Department. According to the New York Times, “One person familiar with the case said the evidence gathered had not met all the necessary elements of relevant federal crimes, while another contended that the case was effectively ended prematurely, before such additional evidence could be gathered.”

    Expert reax: “If someone who is not yet a public official, but expects to be, takes bribes in exchange for agreeing to take official acts after they are appointed, they can’t be charged with bribery. But they can be charged with conspiracy to commit bribery. In a conspiracy charge, the crime is the agreement to commit a criminal act in the future,” Randall Eliason, the former chief of public corruption prosecutions in the U.S. Attorney’s Office in D.C., told MSNBC. Story, here

    Pentagon: Journalists who obtain “unauthorized” information will lose their building passes. “[Department of War] information must be approved for public release by an appropriate authorizing official before it is released, even if it is unclassified,” says a document released Friday with a Sept. 18 memo from Pentagon spokesman Seth Parnell. 

    Parnell’s office is requiring Pentagon reporters to sign an agreement to this effect. Washington Post: “The agreement represents a sharp departure from the practice over decades of military and civilian defense leaders who have felt comfortable openly talking to and even going into war zones with the press.” Read on, here, with other coverage from the New York Times and Politico.

    Outgoing GOP Rep. Don Bacon: “This is so dumb that I have a hard time believing it is true,” the retired Air Force one-star wrote on social media Saturday. While occasionally critical of Trump, it’s worth noting that Bacon is not seeking re-election. “We don’t want a bunch of Pravda newspapers only touting the Government’s official position,” he said Saturday, adding, “A free press makes our country better. This sounds like more amateur hour.” 

    The National Press Club: “If the news about our military must first be approved by the government, then the public is no longer getting independent reporting,” NPC President Mike Balsamo said in a statement. “It is getting only what officials want them to see. That should alarm every American.”

    Reminder: “This will be the most transparent administration ever,” Defense Secretary Pete Hegseth vowed in a February social media post. Parnell’s document added, “DoW remains committed to transparency to promote accountability and public trust.” 

    Even the president seemed unenthused about this new idea from Hegseth’s department. “Should the Pentagon be part of deciding what reporters can report on?” a reporter asked Trump on Sunday. “No, I don’t think so. But nothing stops reporters, you know that,” he replied. 

    Additional reading: 

    Etc.

    Three Russian jets entered the airspace of NATO member Estonia on Friday. Italian jets with the alliance’s new Eastern Sentry operation responded and directed the Russians out after a 12-minute incursion. In response, Estonia requested a meeting of NATO members under Article 4, just as Poland did last week after Russian drones and jets entered its airspace.

    Capitol Hill reax: “These are calculated moves intended to normalize aggression, wear down our resolve, and send a signal that Moscow can push boundaries with impunity,” said co-chairs of the Senate's NATO Observer Group Thom Tillis, R-N.C., and Jeanne Shaheen, D-New Hampshire. These provocations also present a real risk of miscalculation that could lead to unforeseen escalation. “Putin has shown us time and again that he is a liar and a murderer with no desire for peace,” they added. 

    Should Russia declare war on NATO, Germany is already planning for as many as 1,000 wounded troops per day, Reuters reported Monday from Berlin. 

    But drones may complicate that process. “The Ukrainians often cannot evacuate their wounded fast enough because drones are buzzing overhead everywhere,” Germany's Surgeon General Ralf Hoffmann told the wire service in an interview. A bit more, here

    Additional reading: 

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Three of the cybersecurity industry’s most prominent vendors, Microsoft, SentinelOne, and Palo Alto Networks, have announced they will not participate in the 2026 MITRE ATT&CK Evaluations.

    The coordinated withdrawal marks a significant shift in how leading security companies approach independent product validation, with all three citing a strategic reallocation of resources toward internal innovation and customer-focused initiatives.

    The MITRE ATT&CK Evaluations are widely regarded as a crucial industry benchmark, providing transparent and objective assessments of security product capabilities against simulated real-world attack scenarios.

    For years, strong performance in these evaluations has been a key marketing and validation tool for vendors. However, the three giants have independently concluded that their resources are better spent elsewhere this year.

    In its official statement, Microsoft announced that after “extensive deliberation,” it decided to forgo this year’s evaluation to “focus all our resources on the Secure Future Initiative and on delivering product innovation to our customers”.

    Similarly, SentinelOne stated its decision came after a “thorough review internally” and was made to “prioritize our product and engineering resources on customer-focused initiatives while accelerating our platform roadmap”.

    Palo Alto Networks, a consistent participant for six years, echoed this sentiment. The company, which achieved 100% technique-level detections with its Cortex XDR platform in previous evaluations, said it will “adjust the focus of our engineering and testing resources” to “further accelerate critical platform innovations that directly address our customers’ most pressing security challenges”.

    Despite stepping back from the high-profile MITRE evaluations, all three companies reaffirmed their commitment to independent, third-party testing through other avenues.

    Palo Alto Networks highlighted its continued participation in assessments from organizations like SE Labs, where it earned an AAA rating for 100% ransomware prevention, and AV-Comparatives, which awarded its Cortex XDR a unique dual certification.

    This collective move suggests a broader trend where major vendors are diversifying their validation strategies. While they continue to value their relationships with MITRE, the companies are increasingly prioritizing agile development cycles and direct responses to the rapidly evolving threat landscape over participation in standardized annual evaluations.

    The decisions underscore the dynamic nature of the cybersecurity industry, where balancing independent benchmarking with accelerated innovation has become a critical strategic consideration.

    The withdrawals have sparked discussion within the cybersecurity community about the future of standardized testing and whether other vendors will follow suit.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Microsoft, SentinelOne, and Palo Alto Networks Withdraw from 2026 MITRE ATT&CK Evaluations appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The cybersecurity landscape faces a growing threat from sophisticated Phishing-as-a-Service (PhaaS) platforms that are democratizing cybercrime by lowering technical barriers for fraudsters worldwide.

    Among these emerging threats, the Lucid PhaaS platform has established itself as a formidable force in the underground economy, enabling massive-scale phishing operations across multiple continents and industry sectors.

    Security researchers have uncovered an extensive criminal infrastructure centered around Lucid PhaaS, which has successfully deployed over 17,500 phishing domains targeting 316 prominent brands spanning 74 countries.

    This scale represents one of the largest documented PhaaS operations to date, demonstrating the platform’s sophisticated capabilities and widespread adoption among cybercriminals.

    Lucid Phishing-as-a-Service site impersonating finance company Kuda (Source – Netcraft)

    The operation encompasses diverse industries including financial institutions, government agencies, postal services, and toll companies, indicating the platform’s versatility in mimicking various organizational structures and brand identities.

    The campaign’s geographical reach extends from major financial centers in North America and Europe to emerging markets across Asia, Africa, and Latin America, suggesting a coordinated global operation rather than isolated regional activities.

    Netcraft analysts identified the malware through advanced fingerprinting techniques and correlation analysis that linked Lucid to its companion platform, Lighthouse PhaaS, through shared anti-monitoring infrastructure and identical template systems.

    The investigation revealed that Lucid operates through a subscription-based model where cybercriminals pay monthly fees for access to pre-configured phishing templates and hosting infrastructure.

    Each phishing template within the platform receives a unique identifier, such as the “kuda295” theme discovered during analysis of a financial institution impersonation campaign.

    This naming convention allows operators to efficiently manage multiple concurrent campaigns while maintaining operational security.

    Advanced Evasion and Anti-Monitoring Mechanisms

    Lucid PhaaS employs sophisticated detection evasion techniques that represent a significant evolution in phishing technology.

    The platform implements a multi-layered filtering system that protects malicious content from security researchers and automated detection systems through several technical mechanisms.

    The primary evasion technique requires visitors to access specific URL paths, such as “/servicios,” which are dynamically configured by fraudsters and vary significantly across campaigns targeting identical brands.

    This path-based filtering makes automated detection challenging, as security systems cannot predict the required access patterns.

    Additionally, the platform enforces geographical restrictions by requiring connections from specific proxy countries, effectively limiting exposure to security researchers operating from known analysis centers.

    User-Agent filtering represents another critical evasion layer, with Lucid requiring mobile device signatures to display phishing content.

    This restriction aligns with the platform’s targeting strategy, as mobile users often exhibit reduced security awareness and operate on devices with limited security tooling.

    When visitors fail to meet these criteria, Lucid displays convincing fake e-commerce storefronts featuring products like shoes or women’s clothing, complete with professional layouts and product catalogs.

    These anti-monitoring pages serve a dual purpose by maintaining the illusion of legitimate commerce while concealing the underlying criminal infrastructure.

    Security researchers analyzing suspicious domains encounter apparently benign shopping websites, potentially causing them to classify the domains as false positives.

    This deception technique significantly extends the operational lifespan of malicious domains and reduces the likelihood of successful takedown efforts.

    Sake storefronts (Source – Netcraft)

    The sophisticated fake storefronts demonstrating the platform’s attention to visual authenticity and user experience design, making detection increasingly challenging for both automated systems and human analysts.

    Follow us on Google NewsLinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.

    The post Lucid PhaaS With 17,500 Phishing Domains Mimics 316 Brands From 74 Countries appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • BlockBlasters, a vibrant 2D platformer/shooter from Genesis Interactive, launched on July 31, 2025 to wide acclaim. However, on August 30, 2025, the developers released Build 19799326, ostensibly a routine patch. Security analysts at G DATA MXDR discovered that this update carries multiple malicious components capable of harvesting sensitive data from players’ PCs—including cryptocurrency wallet credentials—making […]

    The post BlockBlasters Steam Game Disguises Malware as Patch for Computer Download appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶