• Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The “Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file,” Trellix researcher Sagar Bade said in a technical write-up. “The payload isn’t hidden inside the file content or a macro, it’s encoded directly

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ransomware-as-a-Service (RaaS) models continue to democratize sophisticated attacks in the ever-changing world of cybercrime by allowing affiliates with little technical know-how to distribute ransomware through profit-sharing or subscription models. A newly identified strain, BQTLock, has emerged since mid-July 2025, operating under this RaaS paradigm and marketed aggressively on dark web forums and Telegram channels. Overview […]

    The post BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Lumma information stealer has evolved from its 2022 origins into one of the most sophisticated malware-as-a-service (MaaS) ecosystems in the cybercriminal landscape.

    Operating through a vast network of affiliates, Lumma has established itself as the dominant infostealer platform, accounting for approximately 92% of stolen credential listings on major underground marketplaces by late 2024.

    The malware’s success stems not from technical innovation alone, but from its comprehensive ecosystem of operational enablers designed to maximize stealth, ensure operational continuity, and facilitate rapid adaptation to security countermeasures.

    Unlike traditional malware operations that rely on single-vector attacks, Lumma affiliates employ a multi-layered approach that integrates proxy networks, virtual private networks, anti-detect browsers, exploit services, and crypting tools.

    This interconnected infrastructure enables affiliates to simultaneously operate multiple criminal schemes, including rental fraud and cryptocurrency theft, while maintaining operational security across diverse attack vectors.

    The ecosystem’s resilience was demonstrated following major law enforcement takedowns in May 2025, when Lumma infrastructure was reestablished within days, showcasing the platform’s operational discipline and distributed architecture.

    The malware’s attack methodology centers on credential harvesting from Chromium and Mozilla-based browsers, targeting approximately 70 browser cryptocurrency extensions and two-factor authentication plugins.

    Lumma’s technical sophistication includes server-side log decryption, adaptive file grabbing capabilities, and integrated reverse proxy functionality, all packaged in builds weighing between 150-300 KB to minimize detection signatures.

    Recorded Future analysts identified previously undocumented tools circulating within Lumma affiliate networks, including a cracked email credential validation utility and AI-powered phishing page generators.

    EMAIL SOFTWARE 1.4.0.9 cracked by Maksim advertised on forum[.]cnsec[.]org (Source – Recordedfuture)

    These discoveries highlight the ecosystem’s continuous evolution and the collaborative nature of modern cybercriminal operations, where specialized service providers enhance affiliate capabilities through dedicated toolkits and infrastructure services.

    Advanced Evasion Infrastructure: The GhostSocks Integration

    The most significant advancement in Lumma’s evasion capabilities emerged through its partnership with the GhostSocks team in early 2024.

    Announcement of GhostSocks-Lumma partnership (Source – Recordedfuture)

    This collaboration introduced residential proxy functionality that transforms infected victim machines into SOCKS5 proxy endpoints, enabling affiliates to route malicious traffic through compromised systems.

    The integration creates a self-sustaining proxy network where each successful infection potentially becomes a relay point for future operations.

    # Example SOCKS5 proxy configuration used by Lumma affiliates
    proxy_config = {
        "type": "socks5",
        "host": "infected_victim_ip",
        "port": 1080,
        "authentication": "none",
        "tunnel_traffic": "all_http_https"
    }

    By 2025, Lumma expanded this offering to include backconnect proxy access, allowing threat actors to conduct attacks that appear to originate directly from victim devices.

    This capability proves particularly effective against Google’s cookie-based protection mechanisms, as attacks launched through victim machines can bypass location-based security controls and refresh expired authentication tokens seamlessly.

    The system’s sophistication lies in its ability to maintain persistent connections to compromised machines, creating a distributed anonymization network that complicates attribution efforts.

    Complementing the proxy infrastructure, Lumma affiliates extensively utilize anti-detect browsers, particularly Dolphin, which facilitates multi-account management without triggering platform security measures.

    These browsers generate unique digital fingerprints for each session, enabling affiliates to operate dozens of fraudulent accounts simultaneously across different platforms while maintaining apparent legitimacy through consistent behavioral patterns and device characteristics.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated new ransomware strain named BQTLOCK has emerged in the cyberthreat landscape since mid-July 2025, operating under a comprehensive Ransomware-as-a-Service (RaaS) model that democratizes access to advanced encryption capabilities for cybercriminals.

    The malware, associated with ‘ZerodayX’, the alleged leader of the pro-Palestinian hacktivist group Liwaa Mohammed, represents a concerning evolution in ransomware distribution and monetization strategies.

    BQTLOCK employs a tiered subscription model offering three service levels: Starter, Professional, and Enterprise packages, each providing customizable features including ransom note personalization, wallpaper modification, file extensions, and configurable anti-analysis options.

    Subscription Models (Source – K7 Security Labs)

    The ransomware demands between 13 to 40 Monero (XMR) tokens, equivalent to $3,600 to $10,000, with payment deadlines that double the ransom after 48 hours and threaten permanent data deletion after seven days.

    K7 Security Labs analysts identified the malware’s sophisticated architecture, which combines traditional double extortion tactics with modern evasion techniques.

    The ransomware encrypts files using a hybrid AES-256 and RSA-4096 encryption scheme, appending the .bqtlock extension to compromised files while simultaneously exfiltrating sensitive data through Discord webhooks for command-and-control communications.

    Tweet (Source – K7 Security Labs)

    The malware’s distribution mechanism involves ZIP archives containing the primary executable Update.exe alongside 20 supporting DLL files.

    Upon execution, BQTLOCK performs comprehensive system reconnaissance, collecting computer names, IP addresses, hardware identifiers, and disk space information before establishing persistence and initiating its encryption routine.

    An updated variant discovered on August 5, 2025, demonstrates the threat actors’ commitment to continuous development, incorporating enhanced credential theft capabilities targeting popular browsers including Chrome, Firefox, Edge, Opera, and Brave.

    This evolution significantly expands the malware’s data harvesting potential beyond file encryption.

    Advanced Evasion and Persistence Mechanisms

    BQTLOCK implements a multi-layered approach to detection evasion and system persistence that sets it apart from conventional ransomware families.

    The malware begins its evasion sequence by employing the IsDebuggerPresent() API to detect active debugging environments, immediately terminating execution if analysis tools are detected.

    Additionally, it creates a global mutex named “Global\{00A0B0C0-D0E0-F000-1000-200030004000}” to prevent multiple instances from running simultaneously.

    BQTLock Ransomware Builder (Source – K7 Security Labs)

    The ransomware achieves privilege escalation through SeDebugPrivilege enablement using OpenProcessToken and AdjustTokenPrivileges APIs, followed by sophisticated process hollowing techniques targeting explorer.exe.

    This approach allows BQTLOCK to inject malicious code into legitimate system processes, effectively masking its presence from security monitoring tools.

    For persistent access, the malware establishes a scheduled task masquerading as “Microsoft\Windows\Maintenance\SystemHealthCheck”, leveraging legitimate Windows maintenance nomenclature to avoid suspicion.

    It simultaneously creates a backdoor administrator account named “BQTLockAdmin” with the password “Password123!”, ensuring continued access even after initial compromise detection.

    The updated variant introduces multiple UAC bypass techniques, including abuse of CMSTP.exe with crafted .inf files and registry manipulation targeting fodhelper.exe and eventvwr.exe auto-elevation features.

    These methods enable the malware to execute with elevated privileges without triggering User Account Control prompts, significantly reducing the likelihood of user intervention during the attack sequence.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post BQTLOCK Ransomware Operates as RaaS With Advanced Evasion Techniques appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft Threat Intelligence has spotlighted the escalating adoption of the ClickFix social engineering technique, a sophisticated method that manipulates users into executing malicious commands on their devices, bypassing traditional automated security defenses. Observed since early 2024, this tactic has targeted thousands of enterprise and end-user systems daily, delivering payloads such as Lumma Stealer infostealers, remote […]

    The post ClickFix Exploit Emerges: Microsoft Flags Cross-Platform Attacks Targeting Windows and macOS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated supply chain attack has emerged targeting developers through a malicious Go module package that masquerades as a legitimate SSH brute forcing tool while covertly stealing credentials for cybercriminal operations.

    The package, named “golang-random-ip-ssh-bruteforce,” presents itself as a fast SSH brute forcer but contains hidden functionality that exfiltrates successful login credentials to a Telegram bot controlled by threat actors.

    The malicious package operates by continuously scanning random IPv4 addresses for exposed SSH services on TCP port 22, attempting authentication using an embedded username-password wordlist, and immediately transmitting any successful credentials to its operators.

    What makes this attack particularly insidious is that victims believe they are conducting legitimate penetration testing or security research, while unknowingly feeding their discoveries directly to cybercriminals.

    Socket.dev analysts identified the malicious behavior embedded within the seemingly legitimate security tool, revealing that the package has been active since June 24, 2022.

    The researchers discovered that upon the first successful SSH login, the package automatically sends the target IP address, username, and password to a hardcoded Telegram bot endpoint controlled by a Russian-speaking threat actor known as “IllDieAnyway” on GitHub.

    Telegram Bot and user info (Source – Socket.dev)

    The attack vector exploits the trust relationship between developers and open-source packages, representing a growing trend of malicious actors distributing offensive security tools with backdoor functionality.

    Users who download and execute the package inadvertently become unwitting participants in a larger credential harvesting operation, with their successful penetration attempts being redirected to criminal networks rather than serving their intended security assessment purposes.

    Technical Implementation and Evasion Mechanisms

    The malware’s technical implementation demonstrates sophisticated evasion tactics designed to maintain operational security while maximizing credential collection.

    The package includes a deliberately minimal wordlist containing only common default credentials such as “root:toor,” “admin:password,” and IoT-specific combinations like “root:raspberry” and “root:dietpi,” which reduces network noise and speeds up the scanning process while maintaining plausible deniability for its operators.

    The core malicious functionality centers around a hardcoded Telegram API endpoint: https://api.telegram.org/bot5479006055:AAHaTwYmEhu4YlQQxriW00a6CIZhCfPQQcY/sendMessage.

    When successful authentication occurs, the package executes an HTTP GET request to this endpoint, transmitting the compromised credentials in the format “ip:username:password” to chat ID 1159678884, associated with the Telegram user @io_ping.

    The malware deliberately configures SSH connections with HostKeyCallback: ssh.InsecureIgnoreHostKey() to bypass server verification and enable rapid credential testing across diverse targets.

    Socket’s AI scanner detected a malicious package golang-random-ip-ssh-bruteforce (Source – Socket.dev)

    Here it’s the Socket AI Scanner’s detection of the embedded wordlist file (wl.txt) within the malicious package, highlighting the targeted credential combinations designed to compromise IoT devices, single-board computers, and hastily configured Linux systems.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Malicious Go Module Package as Fast SSH Brute Forcer Exfiltrates Passwords via Telegram appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated South Asian Advanced Persistent Threat (APT) group has been conducting an extensive espionage campaign targeting military personnel and defense organizations across Sri Lanka, Bangladesh, Pakistan, and Turkey.

    The threat actors have deployed a multi-stage attack framework combining targeted phishing operations with novel Android malware to compromise the mobile devices of military-adjacent individuals.

    The campaign demonstrates a high level of operational security and technical sophistication, utilizing legitimate cloud services and modified open-source tools to evade detection.

    Top level PDF phish and Decoy shown post cred theft (Source – StrikeReady)

    The attack chain begins with highly targeted phishing emails containing malicious PDF attachments disguised as official military documents.

    One notable sample, titled “Coordination of the Chief of Army Staff’s Visit to China.pdf” (MD5: cf9914eca9f8ae90ddd54875506459d6), exemplifies the group’s social engineering tactics.

    These documents redirect victims to credential harvesting pages hosted on compromised Netlify domains, including mail-mod-gov-bd-account-conf-files.netlify.app and coordination-cas-visit.netlify.app, which closely mimic legitimate government and military email portals.

    StrikeReady analysts identified the threat actor’s infrastructure through pivoting on shared code elements and domain registration patterns.

    The researchers discovered a network of over 50 malicious domains spoofing various South Asian military and government organizations, including the Bangladesh Air Force, Directorate General of Defence Purchase (DGDP), and Turkish defense contractors like Roketsans and Aselsan.

    The group’s most concerning capability involves the deployment of modified Android Remote Access Trojans (RATs) based on the open-source Rafel RAT framework.

    The malware, distributed through APK files such as Love_Chat.apk (MD5: 9a7510e780ef40d63ca5ab826b1e9dab), masquerades as legitimate chat applications while establishing persistent backdoor access to compromised devices.

    Analysis of the decompiled application reveals extensive data exfiltration capabilities, with the malware programmed to upload various document types to command-and-control servers.

    Android RAT Infrastructure

    The Android component represents a significant evolution in the group’s capabilities, demonstrating sophisticated mobile malware development skills.

    The threat actors modified the original Rafel RAT source code, removing attribution credits and implementing custom command-and-control communications through domains like quickhelpsolve.com and kutcat-rat.com.

    Decoys (Source – StrikeReady)

    The malware requests dangerous permissions including ADD_DEVICE_ADMIN, READ_EXTERNAL_STORAGE, MANAGE_APP_ALL_FILES_ACCESS_PERMISSION, and READ_CONTACTS, enabling comprehensive device compromise.

    The C2 infrastructure utilizes base64-encoded communication channels, with the primary command endpoint located at https://quickhelpsolve.com/public/commands.php.

    This centralized control mechanism allows operators to issue arbitrary commands to compromised devices, collect stolen data, and maintain persistent access to victim networks.

    Security researchers discovered that the threat actors had successfully compromised military personnel across multiple countries, with stolen data including SMS messages, contact lists containing military ranks and duty stations, and sensitive organizational documents.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Zscaler ThreatLabz team has uncovered significant advancements in the Anatsa malware, also known as TeaBot, an Android banking trojan that has been active since 2020. Originally designed for credential theft, keylogging, and facilitating fraudulent transactions, Anatsa has evolved into a more sophisticated threat, now targeting over 831 financial institutions worldwide. This expansion includes new […]

    The post Anatsa Malware Escalates: Android Under Siege as Hackers Harvest Credentials and Track Keystrokes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical zero-day vulnerability affecting Apple iOS, iPadOS, and macOS systems that is being actively exploited in the wild. CVE-2025-43300, an out-of-bounds write vulnerability in Apple’s Image I/O framework, poses significant security risks to millions of users across Apple’s ecosystem. Critical Vulnerability […]

    The post CISA Warns of Actively Exploited 0-Day Vulnerability in Apple iOS, iPadOS, and macOS appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A newly disclosed vulnerability in Docker Desktop for Windows has revealed how a simple Server-Side Request Forgery (SSRF) attack could lead to complete host system compromise. 

    CVE-2025-9074, discovered by Felix Boulet and reported on August 21, 2025, affects all Docker Desktop versions prior to 4.44.3 and demonstrates how container isolation can be completely bypassed through unauthenticated API access. 

    Key Takeaways
    1. Docker Desktop containers can access unauthenticated API for full host compromise.
    2. Two HTTP requests create privileged container with host filesystem access.
    3. Update to Docker Desktop immediately.

    The vulnerability was found accidentally during routine network scanning and highlights critical gaps in Docker’s internal security architecture. 

    Philippe Dugre from Pvotal Technologies independently discovered a similar issue on macOS platforms, emphasizing the cross-platform nature of this security flaw.

    The vulnerability stems from Docker Desktop exposing its internal HTTP API endpoint at http://192.168.65.7:2375/ without any authentication mechanisms. 

    Any container running within the Docker environment could access this endpoint and execute privileged operations against the host system. 

    This represents a fundamental breakdown of the container isolation model, where workloads should be completely separated from their host environment. 

    The attack surface was particularly concerning because it required minimal technical sophistication—attackers needed only basic HTTP request capabilities rather than complex exploit chains or memory corruption techniques.

    Docker Container Exploitation Process

    The exploitation process requires just two HTTP POST requests executed from within any container environment. 

    The first request targets the /containers/create endpoint with a JSON payload that configures a new privileged container with host filesystem bindings. 

    The critical configuration parameter involves mounting the Windows C: drive (/mnt/host/c) to a container path (/host_root), effectively providing unrestricted access to the entire host filesystem. 

    The JSON payload also specifies execution commands that run automatically upon container startup, enabling immediate post-exploitation activities.

    The second HTTP request initiates container execution through the /containers/{id}/start endpoint, triggering the malicious container with elevated privileges. 

    This two-step process bypasses all Docker security controls and grants attackers the same level of access as local administrator accounts. 

    The vulnerability is particularly insidious because it can be exploited through SSRF attacks, meaning attackers don’t require direct code execution within containers—they only need the ability to trigger HTTP requests from compromised web applications or services running in containerized environments.

    Risk FactorsDetails
    Affected ProductsDocker Desktop for Windows (versions < 4.44.3)Docker Desktop for macOS (similar issue reported)
    ImpactFull host system compromise
    Exploit Prerequisites– Access to any container environment- Ability to make HTTP requests- Network connectivity to 192.168.65.7:2375
    CVSS 3.1 ScoreNot specified

    Proof of Concept 

    The proof of concept demonstrates the vulnerability’s simplicity using standard wget commands executable from any Alpine Linux container. 

    The exploit creates a privileged container that mounts the host C: drive and executes arbitrary commands:

    Windows Docker Desktop Vulnerability

    Docker responded quickly to this disclosure, releasing version 4.44.3 with complete remediation of the vulnerability. 

    The fix implements proper authentication controls for internal API endpoints and strengthens network segmentation between container workloads and Docker’s control plane. 

    Security researchers recommend immediate updating to the patched version, as no workarounds exist for affected systems.

    Safely detonate suspicious files to uncover threats, enrich your investigations, and cut incident response time. Start with an ANYRUN sandbox trial → 

    The post Windows Docker Desktop Vulnerability Leads to Full Host Compromise appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶