• A sophisticated cyber espionage campaign has emerged targeting Ukrainian and Polish organizations through weaponized PDF invitation files designed to execute malicious shell scripts.

    The campaign, active since April 2025, demonstrates a calculated approach to infiltrating government and private sector networks through carefully crafted social engineering tactics.

    The threat actors behind this operation have leveraged seemingly legitimate invitation documents, including meeting invitations and official government communications, to establish initial access to target systems.

    These malicious PDF files serve as decoys while simultaneously deploying multi-stage infection chains that culminate in the execution of shell scripts and the deployment of sophisticated implants for persistent access and data collection.

    Infection chain for May archive (Source – HarfangLab)

    The campaign exhibits notable sophistication in its execution methodology, utilizing compressed archive files containing XLS spreadsheets embedded with VBA macros.

    These macros are responsible for dropping and loading Dynamic Link Libraries (DLLs) that collect comprehensive system information and retrieve next-stage malware from command and control servers.

    The systematic nature of the attacks suggests a well-resourced threat actor with extensive operational capabilities.

    HarfangLab researchers identified striking similarities between this campaign and previously reported activities associated with UAC-0057, also known as UNC1151, FrostyNeighbor, or Ghostwriter.

    This cyber espionage group has documented ties to the Belarusian government and has consistently targeted Eastern European nations, particularly Ukraine and Poland, with sophisticated information-gathering operations designed to support state-sponsored intelligence objectives.

    The malware’s impact extends beyond simple data theft, as the threat actors have demonstrated the ability to maintain persistent access to compromised systems while avoiding detection through careful operational security practices.

    Infection chain for July archives (Source – HarfangLab)

    The infection chains reveal a methodical approach to system reconnaissance, with implants designed to collect detailed information about compromised environments before deploying additional payloads for extended exploitation.

    Infection Mechanism and Execution Flow

    The UAC-0057 infection mechanism represents a carefully orchestrated multi-stage attack that begins with the delivery of malicious archive files through suspected spearphishing campaigns.

    The primary infection vector involves compressed archives containing XLS spreadsheets that embed sophisticated VBA macros, which serve as the initial execution point for the malware deployment process.

    Infection chain for April archives (Source – HarfangLab)

    Once executed, these VBA macros demonstrate varying levels of obfuscation consistent with tools like MacroPack, an offensive security framework available on GitHub.

    The execution logic has evolved throughout the campaign, with earlier samples directly dropping DLLs to temporary directories, while more recent variants employ additional layers of complexity including Microsoft Cabinet (CAB) files and Link (LNK) files to obscure the deployment process.

    The infection chain progresses through a systematic approach where the VBA macro writes encrypted DLL payloads to specific system directories such as %LOCALAPPDATA%\Serv\0x00bac729fe.log or %TEMP%\DefenderProtectionScope.log.

    These DLLs are subsequently loaded using Windows’ built-in regsvr32.exe utility with parameters designed to execute the malicious code while minimizing system alerts.

    The first-stage implants, written in C# and obfuscated using ConfuserEx, establish persistence through Windows Registry modifications and scheduled tasks.

    These implants collect comprehensive system intelligence including operating system details, hostname information, CPU specifications, and installed antivirus products before transmitting this data to command and control infrastructure designed to blend with legitimate web traffic.

    Figure 1 shows the complete infection chain for the May archive variant, illustrating the sophisticated multi-layered approach employed by UAC-0057 to achieve system compromise while maintaining operational security throughout the deployment process.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post UAC-0057 Hackers Weaponizing PDF Invitation Files to Execute Shell Scripts appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has announced significant restrictions on the use of default onmicrosoft.com domains for email communication, implementing new throttling measures to combat spam and improve email deliverability across its Microsoft 365 platform. Policy Changes Target Spam Prevention The technology giant will introduce throttling limits that restrict messages sent from onmicrosoft.com domains to just 100 external recipients […]

    The post Microsoft to Restrict Use of OnMicrosoft Domains for Email Sending appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have developed an artificial intelligence system capable of automatically generating working exploits for published Common Vulnerabilities and Exposures (CVEs) in just 10-15 minutes at approximately $1 per exploit, fundamentally challenging the traditional security response timeline that defenders rely upon. The breakthrough system employs a sophisticated multi-stage pipeline that analyzes CVE advisories and code […]

    The post AI Systems Capable of Generating Working Exploits for CVEs in Just 10–15 Minutes appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Socket’s Threat Research Team has uncovered a deceptive Go module named golang-random-ip-ssh-bruteforce, which masquerades as an efficient SSH brute-forcing tool but secretly exfiltrates stolen credentials to its creator. Published on June 24, 2022, this package remains active on the Go Module ecosystem and GitHub, despite efforts to petition for its removal and the suspension of […]

    The post Rogue Go Module Doubles as Fast SSH Brute-Forcer, Sends Stolen Passwords via Telegram appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that involves abusing trusted relationships in the cloud to breach enterprise networks. “The adversary has also shown considerable ability to quickly weaponize N-day and zero-day vulnerabilities and frequently achieves initial access to their targets by

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • INTERPOL on Friday announced that authorities from 18 countries across Africa have arrested 1,209 cybercriminals who targeted 88,000 victims. “The crackdown recovered $97.4 million and dismantled 11,432 malicious infrastructures, underscoring the global reach of cybercrime and the urgent need for cross-border cooperation,” the agency said. The effort is the second phase of an ongoing law

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cyber threat actors have launched sophisticated phishing operations aimed at military and government personnel in South Asia, leveraging defense-related lures to distribute malicious archives and applications. Recent detections include ZIP files like “Coordination of the Chief of Army Staff’s Visit to China.zip,” which contain compressed PDFs designed as phishing decoys. These documents, upon extraction, redirect […]

    The post Hackers Target Phones of Military-Linked Individuals in South Asia Using New Spy Tools appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The National Institute of Standards and Technology (NIST) has unveiled a comprehensive concept paper outlining proposed NIST SP 800-53 Control Overlays for Securing AI Systems, marking a significant milestone in establishing standardized cybersecurity frameworks for artificial intelligence applications. 

    Released on August 14, 2025, this initiative addresses the growing need for structured risk management approaches in both AI system development and deployment phases, encompassing generative AI, predictive AI, and multi-agent AI architectures.

    Key Takeaways
    1. NIST released Control Overlays for AI cybersecurity risk management.
    2. Covers generative/predictive AI and single/multi-agent systems.
    3. COSAIS project launched with Slack channel for stakeholder collaboration

    Comprehensive Framework for AI Security Controls

    The newly released concept paper establishes a foundation for managing cybersecurity risks across diverse AI implementations through the NIST SP 800-53 control framework. 

    The proposed overlays specifically target four critical use cases: generative AI systems that create content, predictive AI models for forecasting and analysis, single-agent AI applications, and multi-agent AI systems involving coordinated artificial intelligence entities. 

    These control overlays extend the existing NIST cybersecurity framework to address unique vulnerabilities inherent in AI systems, including data poisoning attacks, model inversion techniques, and adversarial machine learning threats.

    The framework incorporates essential technical components such as AI model validation procedures, training data integrity controls, and algorithmic transparency requirements. 

    Organizations implementing these overlays will need to establish continuous monitoring mechanisms for AI system behavior, implement proper access controls for AI development environments, and maintain comprehensive audit trails for model training and deployment processes.

    Control Overlays

    The overlays also emphasize the importance of establishing clear governance structures for AI risk management, including regular security assessments and incident response procedures specifically tailored for AI-related security events.

    NIST has launched the Control Overlays for AI Project (COSAIS) alongside a dedicated Slack channel (#NIST-Overlays-Securing-AI) to facilitate stakeholder collaboration and real-time feedback collection. 

    This community-driven approach enables cybersecurity professionals, AI developers, and risk management specialists to contribute directly to the overlay development process through facilitated discussions with NIST principal investigators.

    The implementation strategy encourages active participation from industry stakeholders who can provide insights into the practical challenges of securing AI systems in production environments. 

    The collaborative framework ensures that the final control overlays reflect real-world security requirements while maintaining alignment with established NIST cybersecurity standards and best practices for enterprise risk management.

    Safely detonate suspicious files to uncover threats, enrich your investigations, and cut incident response time. Start with an ANYRUN sandbox trial → 

    The post NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn’t kept pace. Most organizations still rely on traditional reporting methods—static PDFs, emailed documents, and spreadsheet-based tracking. The problem? These outdated workflows introduce delays,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Telecommunications giant Colt Technology Services has confirmed that customer data was compromised in a sophisticated cyber attack that began on August 12, 2025. 

    The company disclosed that threat actors accessed sensitive files containing customer information and subsequently posted document titles on the dark web, prompting immediate containment measures and law enforcement notification.

    Key Takeaways
    1. Colt breached on August 12, customer data accessed, and document titles on the dark web.
    2. Key platforms offline as precaution, customer networks secure.
    3. Forensics engaged, law enforcement notified.

    Customer Data Exfiltrated

    The ransomware attack specifically targeted Colt’s business support systems, which the company emphasized remain segregated from customer infrastructure networks. 

    Upon detection at approximately 11:00 AM BST on August 12, Colt immediately activated its major incident response protocol and engaged external forensic investigators to assess the breach scope.

    The threat actors successfully exfiltrated files from Colt’s systems before publishing the document titles on dark web forums, a common tactic used by ransomware groups to pressure victims into paying demands. 

    Colt has established a dedicated call center where customers can request lists of the specific filenames posted online to determine if their data may be affected.

    As a precautionary measure, Colt proactively disabled multiple critical systems, including the Colt Online customer portal, Number Hosting APIs, and Colt On Demand Network-as-a-Service (NaaS) platform. 

    The company also suspended its Voice On Demand services and temporarily halted new service ordering capabilities to prevent further unauthorized access.

    Mitigations

    Colt’s incident response team has implemented comprehensive containment protocols, including enhanced access controls, improved detection capabilities, and strengthened security visibility across their infrastructure. 

    The company promptly notified the UK’s National Cyber Security Centre (NCSC) and law enforcement agencies to ensure regulatory compliance and leverage external expertise in the investigation.

    The telecommunications provider has deployed specialist third-party investigation and forensic teams working around the clock to determine the full extent of the data compromise. 

    While customer-facing network services remain operational due to the segregated architecture, automated business processes have been temporarily suspended, resulting in extended response times for customer inquiries and service requests.

    Colt has assured customers that authentication systems remain secure due to the architectural separation between business support and customer infrastructure environments. 

    The company continues providing customer support through dedicated phone lines and email channels across multiple regions, including the UK, France, and Germany, while working to restore full service capabilities.

    Safely detonate suspicious files to uncover threats, enrich your investigations, and cut incident response time. Start with an ANYRUN sandbox trial → 

    The post Colt Confirms Customer Data Stolen in Ransomware Attack appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶