• A critical authentication bypass vulnerability has emerged in Nokia’s CloudBand Infrastructure Software (CBIS) and Nokia Container Service (NCS) Manager API, designated as CVE-2023-49564.

    This high-severity flaw, scoring 9.6 on the CVSS v3.1 scale, enables unauthorized attackers to circumvent authentication mechanisms through specially crafted HTTP headers, potentially granting complete access to restricted API endpoints without valid credentials.

    The vulnerability affects CBIS 22 and NCS 22.12 versions, impacting enterprises, service providers, and public sector organizations utilizing Nokia’s cloud and network infrastructure solutions.

    The flaw was publicly disclosed on September 18, 2025, following discovery by Orange Cert researchers who identified the security gap during routine security assessments.

    Nokia security researchers identified the root cause as a weak verification mechanism embedded within the authentication implementation of the Nginx Podman container running on the CBIS/NCS Manager host machine.

    This architectural weakness allows threat actors to manipulate HTTP header fields to trick the authentication system into believing a request is legitimate.

    The exploitation vector requires adjacent network access (CVSS AV:A), making it particularly concerning for enterprise environments where attackers might already have gained initial network foothold.

    Once exploited, the vulnerability provides complete compromise capabilities with high confidentiality, integrity, and availability impact, allowing attackers to access sensitive configuration data, modify system settings, and potentially disrupt network operations.

    Technical Attack Mechanism

    The authentication bypass operates through header manipulation targeting the Nginx container’s verification logic.

    When processing API requests, the system fails to properly validate authentication tokens embedded in HTTP headers, creating an opportunity for crafted requests to bypass security controls.

    The vulnerability allows unauthenticated users to reach sensitive endpoints that should require administrative privileges.

    Vulnerability DetailsInformation
    CVE IDCVE-2023-49564
    CVSS Score9.6 (Critical)
    Attack VectorAdjacent Network
    Affected ProductsCBIS 22, NCS 22.12
    Fix VersionsCBIS 22 FP1 MP1.2, NCS 22.12 MP3

    Organizations can partially mitigate risks by implementing external firewall restrictions on management network access while applying the patches provided in CBIS 22 FP1 MP1.2 and NCS 22.12 MP3 versions.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In early 2025, cybersecurity researchers observed an unprecedented collaboration between two Russian APT groups targeting Ukrainian organizations.

    Historically, Gamaredon has focused on broad spear-phishing campaigns against government and critical infrastructure, while Turla has specialized in high-value cyberespionage using sophisticated implants.

    Their joint operations mark a significant escalation: Gamaredon gains initial access using its established toolkit, then Turla deploys its advanced Kazuar backdoor to maintain stealthy long-term presence.

    This alliance leverages Gamaredon’s noisy compromise methods to deliver Turla’s modular espionage implant on carefully selected machines, suggesting a strategic alignment within the FSB’s internal cyber-intelligence apparatus.

    Emerging primarily through malicious LNK files and spear-phishing emails delivered via removable media, the attack chain begins with Gamaredon’s PteroGraphin downloader.

    Once on a victim system, PteroGraphin retrieves additional payloads through encrypted Telegra.ph channels. On February 27, 2025, PteroGraphin, residing at %APPDATA%\86.ps1, fetched and decrypted a second-stage downloader, PteroOdd, using a hardcoded 3DES key.

    PteroGraphin token partially redacted (Source – Welivesecurity)

    PteroOdd then retrieved and executed Kazuar v3 in memory by side-loading into legitimate processes, effectively evading conventional defenses.

    Welivesecurity analysts noted this dual-stage delivery mechanism was critical in restarting and deploying Kazuar implants after initial crashes or installation of endpoint security products.

    The seamless handoff between Gamaredon tools and Turla’s backdoor illustrates an evolution in Russian APT tactics, where inter-group cooperation amplifies impact while limiting detection.

    Despite Gamaredon’s hundreds of noisy intrusions, Turla selectively installs Kazuar only on machines deemed highly valuable.

    This precision targeting reduces the implant’s exposure and minimizes forensic footprints.

    Beautified JSON reply (Source – Welivesecurity)

    Once deployed, Kazuar v3 establishes encrypted command-and-control channels over WebSockets and Exchange Web Services, supporting three distinct roles—KERNEL, BRIDGE, and WORKER—to modularize functionality and maintain resilience against takedown attempts.

    Infection Mechanism Deep Dive

    The infection mechanism of Kazuar centers on sophisticated PowerShell loaders and side-loading techniques that exploit legitimate Windows processes. After PteroOdd retrieves the base64-encoded PowerShell payload, it executes a command similar to:-

    Start-Process -FilePath "C:\Program Files\SomeApp\vncutil64[.]exe" -ArgumentList "- EncodedCommand","[base64-encoded Kazuar loader]"

    This approach masks the backdoor as part of a trusted application, preventing signature-based detection.

    The loader writes a DLL named LaunchGFExperienceLOC[.]dll alongside LaunchGFExperience[.]exe, initiating Kazuar’s launch through DLL side-loading.

    In memory, two distinct KERNEL payloads appear, labeled AGN-RR-01 and AGN-XX-01, indicating redundant execution paths that enhance implant robustness.

    Once active, Kazuar collects system metadata—computer name, volume serial number, running processes—and exfiltrates these via a Cloudflare Workers subdomain under Turla’s control.

    Subsequent HTTP POSTs confirm successful implant launch and provide bridge nodes with adaptive payloads. By leveraging dynamic loader scripts and dual-payload execution chains, Turla ensures continuous access even if one delivery path fails or is detected.

    This infection mechanism underscores the sophistication of modern APT alliances: combining Gamaredon’s wide reach with Turla’s stealth backdoor yields a versatile espionage capability capable of infiltrating high-value targets while minimizing detection risk.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Russian Hacking Groups Gamaredon and Turla Attacking Organizations to Deploy Kazuar Backdoor appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding sophisticated malware campaigns targeting Ivanti Endpoint Manager Mobile (EPMM) systems.

    Cybercriminals are actively exploiting two critical vulnerabilities, CVE-2025-4427 and CVE-2025-4428, to deploy advanced persistent threats that enable complete system compromise and arbitrary code execution on targeted servers.

    The attack campaign emerged shortly after Ivanti disclosed the vulnerabilities on May 13, 2025, with threat actors beginning exploitation around May 15, 2025, following the publication of proof-of-concept code.

    The vulnerabilities affect all Ivanti EPMM versions including 11.12.0.4 and prior, 12.3.0.1 and prior, 12.4.0.1 and prior, and 12.5.0.0 and prior, representing a significant attack surface for organizations relying on mobile device management infrastructure.

    The malicious actors demonstrate sophisticated techniques by chaining CVE-2025-4427, an authentication bypass vulnerability, with CVE-2025-4428, a code injection flaw, to gain unauthorized access to EPMM deployments.

    Once inside the system, attackers target the /mifs/rs/api/v2/ endpoint using HTTP GET requests with malicious remote commands embedded in the ?format= parameter, enabling them to collect system information, download malicious payloads, enumerate network resources, and extract LDAP credentials.

    CISA Cyber Team analysts identified two distinct malware sets during their investigation, each containing sophisticated loaders and malicious listeners designed to maintain persistent access to compromised infrastructure.

    The first set consists of three components: Loader 1 (web-install.jar), ReflectUtil.class, and SecurityHandlerWanListener.class, while the second set includes Loader 2 (web-install.jar) and WebAndroidAppInstaller.class, with each component serving specific functions in the attack chain.

    The threat actors employ advanced evasion techniques to bypass security controls and deliver their malware effectively.

    Rather than uploading complete malicious files that might trigger security alerts, the attackers segment their payloads into multiple Base64-encoded chunks and transmit each segment through separate HTTP requests.

    This approach serves dual purposes: circumventing signature-based detection systems and avoiding file size limitations that might prevent successful malware deployment.

    VulnerabilityCWE ClassificationAttack VectorCVSS Impact
    CVE-2025-4427Authentication Bypass Using Alternate PathRemoteHigh/High/High
    CVE-2025-4428Code InjectionRemoteHigh/High/High

    Advanced Payload Delivery and Persistence Mechanisms

    The malware deployment process showcases remarkable technical sophistication in how threat actors establish and maintain persistence on compromised systems.

    The attack begins with Java Expression Language injection techniques that create malicious JAR files in the /tmp directory through a methodical chunk-based reconstruction process.

    For the initial payload delivery, attackers craft HTTP GET requests containing Java EL injection code that creates FileOutputStream objects to write Base64-decoded malware segments directly to the target system.

    The malicious request structure follows this pattern: GET /mifs/rs/api/v2/featureusage?format=${""getClass().forName("java.io.FileOutputStream").getConstructor("".getClass(),"".getClass().forName("[Z").getComponentType()).newInstance("/tmp/web-install.jar",true).write("".getClass().forName("java.util.Base64").getMethod("getDecoder").invoke(null).decode("[BASE64_CHUNK]"))}.

    This technique enables the malware to evade signature-based detection while reconstructing complete executable files on the target system.

    Once the malware components are successfully deployed, Set 1 operates through a sophisticated three-stage process.

    Loader 1 contains and dynamically loads ReflectUtil.class, which then manipulates Java objects to inject SecurityHandlerWanListener into the Apache Tomcat server running on the compromised system.

    The ReflectUtil.class component bypasses Java Development Kit module restrictions, iterates through object contexts, and attempts to load the malicious listener class using hard-coded strings that masquerade as legitimate JUnit framework components.

    SecurityHandlerWanListener establishes a persistent backdoor by intercepting specific HTTP requests containing predetermined authentication tokens.

    The listener monitors for requests containing the string “pass 7c6a8867d728c3bb”, a “Referer” header, and the header value “https://www[.]live.com”.

    When these conditions are met, the malware retrieves Base64-encoded payloads from the request stream, decodes them, and decrypts the data using AES encryption with the stored key, creating new Java class files that enable arbitrary code execution.

    Malware ComponentSize (bytes)Primary FunctionEncryption Method
    Loader 1 (web-install.jar)30,996Contains ReflectUtil.classBase64 encoding
    ReflectUtil.class11,886Injects SecurityHandlerWanListenergzip compression
    SecurityHandlerWanListener.class4,690HTTP request interceptionAES with key 7c6a8867d728c3bb
    WebAndroidAppInstaller.class16,120Payload processingAES with key 3c6e0b8a9c15224a

    Set 2 operates through a more streamlined but equally effective approach, with Loader 2 containing and loading WebAndroidAppInstaller.class at runtime.

    This component masquerades as part of the legitimate com.mobileiron.service package and intercepts HTTP requests with specific Content-Type headers containing “application/x-www-form-urlencoded”.

    The malware retrieves password parameters from incoming requests, performs Base64 decoding and AES decryption using the hard-coded key “3c6e0b8a9c15224a”, and dynamically creates new malicious classes based on the decrypted instructions.

    The sophisticated nature of these attacks demonstrates the threat actors’ deep understanding of Java-based enterprise applications and their ability to exploit complex software architectures for persistent access.

    Organizations must immediately upgrade their Ivanti EPMM installations to the latest patched versions and implement additional monitoring for mobile device management systems, treating them as high-value assets requiring enhanced security controls and continuous surveillance.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post CISA Warns of Hackers Exploiting Ivanti Endpoint Manager Mobile Vulnerabilities to Deploy Malware appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A proxy network known as REM Proxy is powered by malware known as SystemBC, offering about 80% of the botnet to its users, according to new findings from the Black Lotus Labs team at Lumen Technologies. “REM Proxy is a sizeable network, which also markets a pool of 20,000 Mikrotik routers and a variety of open proxies it finds freely available online,” the company said in a report shared with

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Fortra has disclosed details of a critical security flaw in GoAnywhere Managed File Transfer (MFT) software that could result in the execution of arbitrary commands. The vulnerability, tracked as CVE-2025-10035, carries a CVSS score of 10.0, indicating maximum severity. “A deserialization vulnerability in the License Servlet of Fortra’s GoAnywhere MFT allows an actor with a validly forged

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New York, New York, September 19th, 2025, CyberNewsWire BreachLock, the global leader in offensive security, has been recognized as a Sample Vendor for Penetration Testing as a Service (PTaaS) in the 2025 Gartner Hype Cycle for Application Security. The company was also recognized as a sample vendor for Adversarial Exposure Validation (AEV) in the Gartner […]

    The post BreachLock Named Sample Vendor for PTaaS and AEV in Two New 2025 Gartner® Reports appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The phishing-as-a-service (PhaaS) offering known as Lighthouse and Lucid has been linked to more than 17,500 phishing domains targeting 316 brands from 74 countries. “Phishing-as-a-Service (PhaaS) deployments have risen significantly recently,” Netcraft said in a new report. “The PhaaS operators charge a monthly fee for phishing software with pre-installed templates impersonating, in some cases,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In today’s rapidly evolving digital landscape, APIs (Application Programming Interfaces) have become the backbone of online business, connecting services, and enabling new customer experiences. However, as the API footprint grows, so does the attack surface making robust API security testing a critical pillar of enterprise cyber defense in 2025. Whether you’re a security analyst, DevSecOps […]

    The post Top 10 Best API Security Testing Companies in 2025 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • ChatGPT agents can be manipulated into bypassing their own safety protocols to solve CAPTCHA, raising significant concerns about the robustness of both AI guardrails and widely used anti-bot systems.

    The SPLX findings show that through a technique known as prompt injection, an AI agent can be tricked into breaking its built-in policies, successfully solving not only simple CAPTCHA challenges but also more complex image-based challenges.

    The experiment highlights a critical vulnerability in how AI agents interpret context, posing a real risk to enterprise security where similar manipulation could be used to circumvent internal controls.

    ChatGPT CAPTCHA Bypass
    ChatGPT CAPTCHA Bypass

    ChatGPT Bypassing CAPTCHA Security

    CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) systems are designed specifically to block automated bots, and AI agents like ChatGPT are explicitly programmed to refuse attempts to solve them.

    As expected, when researchers directly asked a ChatGPT agent to solve a series of CAPTCHA tests on a public test website, it refused, citing its policy restrictions.

    However, the SPLX researchers bypassed this refusal using a multi-turn prompt injection attack. The process involved two key steps:

    1. Priming the Model: The researchers first initiated a conversation with a standard ChatGPT-4o model. They framed a plan to test “fake” CAPTCHAs for a project, getting the AI to agree that this was an acceptable task.
    2. Context Manipulation: They then copied this entire conversation into a new session with a ChatGPT agent, presenting it as a “previous discussion.” Inheriting the manipulated context, the agent adopted the prior agreement and proceeded to solve the CAPTCHAs without resistance.

    This exploit didn’t break the agent’s policy but rather sidestepped it by reframing the task. The AI was tricked by being fed a poisoned context, demonstrating a significant flaw in its contextual awareness and memory.

    Bypass CAPTCHA With ChatGPT

    The agent demonstrated a surprising level of capability. It successfully solved a variety of CAPTCHAs, including:

    • reCAPTCHA V2, V3, and Enterprise versions
    • Simple checkbox and text-based puzzles
    • Cloudflare Turnstile

    While it struggled with challenges requiring precise motor skills, like slider and rotation puzzles, it succeeded in solving some image-based CAPTCHAs, such as reCAPTCHA V2 Enterprise. This is believed to be the first documented case of a GPT agent solving such complex visual challenges.

    Captcha
    Captcha

    Notably, during one attempt, the agent was observed adjusting its strategy to appear more human. It generated a comment stating, “Didn’t succeed. I’ll try again, dragging with more control… to replicate human movement.”

    This emergent behavior, which was not prompted by the researchers, suggests that AI systems can independently develop tactics to defeat bot-detection systems that analyze cursor behavior.

    The experiment reveals that AI safety guardrails based on fixed rules or simple intent detection are brittle. If an attacker can convince an AI agent that a real security control is “fake,” it can be bypassed.

    In an enterprise environment, this could lead to an agent leaking sensitive data, accessing restricted systems, or generating disallowed content, all under the guise of a legitimate, pre-approved task.

    This includes deep context integrity checks, better “memory hygiene” to prevent context poisoning from past conversations, and continuous AI red teaming to identify and patch such vulnerabilities before they can be exploited.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The emergence of a new campaign weaponizing legitimate remote monitoring and management software has alarmed security teams worldwide.

    Attackers are distributing trojanized installers for ConnectWise ScreenConnect—now known as ConnectWise Control—to deliver dual payloads: the widely used AsyncRAT and a custom PowerShell-based RAT.

    By leveraging trusted software footprints and open directories, adversaries bypass signature-based defenses and maintain long-term access to compromised networks.

    Initial incidents surfaced in May 2025, when analysts observed anomalous ScreenConnect installers hosted on exposed file servers.

    These installers contained ClickOnce loaders that, upon execution, fetched malicious components at runtime rather than embedding payloads directly.

    In one instance, a compromised installer silently launched a VBS script that executed a weaponized shortcut, triggering PowerShell with execution-policy bypass to run a loader script.

    Hunt.io Cyber Team researchers identified this tactic after correlating telemetry from multiple exposed hosts and correlating IOCs across open directories.

    Attack chain (Source – Hunt.io)

    Subsequent analysis revealed a repeatable infrastructure pattern. Infected installers pivoted to repositories hosting .zip archives named logs.ldk, logs.idk, and logs.idr, which unpacked into dropper scripts (Ab.vbs or Ab.js), the PowerShell loader (Skype.ps1), a native injector DLL (libPK.dll), and a shortcut file (Microsoft.lnk).

    The VBS launcher uses WScript.Shell to invoke the shortcut, which in turn runs PowerShell with hidden windows to launch Skype.ps1.

    This script reconstructs an embedded payload blob, invokes the DLL’s exported Execute function for in-memory native staging, and creates a scheduled task named SystemInstallTask for persistence.

    Infection Mechanism

    The infection chain begins with a seemingly benign ScreenConnect client installer.

    Once executed, it drops the VBS loader (Ab.vbs) into a public folder and registers a Windows shortcut. The shortcut’s target is crafted to launch PowerShell with -ExecutionPolicy Bypass -WindowStyle Hidden, calling a small script file named Skype.ps1.

    Skype.ps1 contains base64-encoded payload segments that it decodes into a .NET assembly or native shellcode, depending on detected security products.

    If the script detects antivirus like TotalAV or Avast, it performs in-memory assembly loading via System.Reflection.Assembly.Load; otherwise it dynamically imports libPK.dll using PowerShell’s Add-Type and calls Execute to inject payloads into legitimate host processes.

    To maintain resilience, the loader also schedules recurring tasks (every 2–10 minutes) ensuring rapid re-execution if terminated.

    Additionally, the use of open directories for initial staging allows attackers to rotate files and domains frequently, complicating detection.

    The combination of modular scripts, scheduled tasks, and dual execution paths exemplifies a sophisticated multi-stage delivery framework that blends legitimate RMM software abuse with bespoke RAT payloads.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶