• Cybercriminals are increasingly leveraging Virtual Private Server (VPS) infrastructure to orchestrate sophisticated attacks against Software-as-a-Service (SaaS) platforms, exploiting the anonymity and clean reputation of these hosting services to bypass traditional security controls.

    A coordinated campaign identified in early 2025 demonstrated how threat actors systematically abuse VPS providers like Hyonix, Host Universal, Mevspace, and Hivelocity to compromise enterprise email accounts and establish persistent access to organizational systems.

    The attack methodology centers on session hijacking techniques, where attackers utilize compromised credentials to log into SaaS accounts from VPS-hosted infrastructure.

    Timeline of activity for Case 1 – Unusual VPS logins and deletion of phishing emails (Source – Darktrace)

    This approach allows malicious actors to circumvent geolocation-based security measures by appearing as legitimate traffic from trusted hosting providers.

    The clean IP reputation associated with newly provisioned VPS instances enables attackers to evade conventional blacklist-based detection systems, making their activities blend seamlessly with normal business operations.

    Timeline of activity for Case 2 – Coordinated inbox rule creation and outbound phishing campaign (Source – Darktrace)

    Recent investigations spanning March through May 2025 revealed a surge in anomalous login activities originating from Hyonix’s Autonomous System Number (ASN AS931), with threat actors demonstrating remarkable consistency in their attack patterns across multiple victim environments.

    Darktrace analysts identified suspicious activities including improbable travel scenarios where users appeared to access accounts simultaneously from distant geographical locations, indicating clear signs of credential compromise and session hijacking.

    The campaign’s sophistication extends beyond initial access, incorporating Multi-Factor Authentication (MFA) bypass techniques through token manipulation and the systematic creation of obfuscated email rules designed to maintain stealth.

    Attackers established persistence by creating inbox rules with minimal or generic names to avoid detection during routine security audits, automatically redirecting or deleting incoming emails to conceal their malicious activities.

    Advanced Persistence and Evasion Mechanisms

    The threat actors demonstrated advanced understanding of email security systems by implementing targeted inbox rule manipulation techniques that operate below the threshold of typical security monitoring.

    The malicious rules specifically targeted emails containing sensitive organizational information, including communications from VIP personnel and financial documents.

    Technical analysis revealed the use of MITRE ATT&CK technique T1098.002 (Exchange Email Rules) combined with T1071.001 (Web Protocols) for command and control operations.

    Key indicators of compromise include IP addresses 38.240.42[.]160 and 194.49.68[.]244 associated with Hyonix infrastructure, alongside 91.223.3[.]147 from Mevspace Poland.

    The attackers employed domain fluxing techniques for infrastructure resilience while maintaining operational security through carefully timed activities that coincided with legitimate user sessions, effectively masking their presence within normal business communications.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Hackers Abuse VPS Servers To Compromise Software-as-a-service (SaaS) Accounts appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Inside the Pentagon plan to Americanize drone warfare. Years of talk about rapidly scaling up drone forces have produced interesting prototypes and lively experiments with relatively small numbers of drones—but no clear sense of how the United States would conduct the kind of sustained drone warfare pioneered in Ukraine. A combination of recent developments, tech breakthroughs, and policy changes suggests that could soon change.

    The T-REX event in Indiana brought together drone makers, AI, data, and communications software companies to show off not just how well new autonomous drones can hit targets, but also next steps for mass, coordinated drone warfare. Defense One’s Patrick Tucker was there, and pulls the strings together in this report.

    The Army is equipping its Black Hawks to launch drones. Helo maker Sikorsky will make software and hardware upgrades under a $43 million contract that will also give the venerable rotorcraft a “more powerful engine, airframe enhancements and a main fuel upgrade,” reports Defense One’s Meghann Myers.

    Black Hawk crew will be able to launch and operate drones in flight, part of a larger push toward so-called “launched effects,” one of the cornerstones of the Army Transformation Initiative.

    But how long will the UH-60 be central to the Army’s operations? Myers wraps up the signs of a decline in importance, here.

    Developing: The U.S. military is “preparing target sets” for strikes against alleged drug cartels in Mexico, independent investigative journalist Ken Klippenstein reported Thursday. 

    “The strikes were discussed at a July meeting at NORTHCOM HQ in Colorado Springs led by Colby Jenkins, Acting Assistant Secretary of Defense for Special Operations,” he writes. “Within days, Gen. Gregory M. Guillot, commander of NORTHCOM, hosted the two highest ranking Mexican military officials: Gen. Ricardo Trevilla Trejo, Secretary of National Defense, and Adm. Raymundo Pedro Morales Ángeles, Secretary of the Navy.”

    Targets allegedly include the Sinaloa Cartel and the Jalisco New Generation Cartel. “Direct attacks could also involve air and drone strikes,” Klippenstein writes. 

    It’s unclear just yet how Mexican President Claudia Sheinbaum would respond. She’s said recently she’s flatly opposed to U.S. troops on the ground inside Mexico. However, “Trump, military sources also tell me, is focused on results, willing to ignore law, rules, and even policy recommendations in his zeal to have ‘progress’ towards his goals with regard to national security,” Klippenstein says. More, here

    • ICYMI: We discussed strikes against cartels in a recent podcast conversation with special operations author Kevin Maurer. Find that discussion, here

    Also: Drug traffickers in Colombia allegedly used a drone to shoot down a Black Hawk helicopter carrying a dozen police Thursday morning, the Wall Street Journal reports. All 12 passengers perished in the attack. 

    Notable uptick: “Since the first attack by drone in Colombia in April of last year, the military here says there have been 301 strikes with unmanned aerial vehicles,” the Journal’s Juan Forero reports from Bogota. “At least 22 soldiers and police officers have died in the attacks.”

    The U.S. military says it killed an ISIS official during a raid in northern Syria on Tuesday. Neither militant was named, but Central Command officials described them as “a senior ISIS member and key financier who planned attacks in Syria and Iraq.” 

    The Middle East Institute’s Charles Lister says the man killed was Saleh Nouman, who was allegedly spotted by Syrian forces “in al-Dana, but he fled to Atmeh—where a joint US airborne raid was planned.” Tiny bit more from CENTCOM, here

    Additional reading: 

    Insider POV: Allvin’s surprise exit signals a pivot for the Air Force, not Hegseth pressure, sources say. On Monday, Allvin announced his plans to retire after serving just two years as the service’s highest-ranking officer, typically a four-year job. No reason was given in the Air Force press release that contained his announcement. Allvin’s abrupt retirement wasn’t driven by Defense Secretary Pete Hegseth, but by growing frustration with the service’s priorities, multiple people familiar with the decision told Defense One’s Audrey Decker. 


    Welcome to this Friday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson with Bradley Peniston. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1844, U.S. Navy officer George Francis De Long was born in New York City. In the fall of 1879, De Long led an expedition searching for a way to the North Pole via the Bering Strait. Nearly two years into the quest, his ship was crushed in an ice pack in the East Siberian Sea. De Long, 37, died of starvation about four months later.  

    Deportation nation

    The Pentagon is offering its civilians a chance to work for ICE. “Volunteers will serve in critical support roles up to 180 days at an [Immigration and Customs Enforcement] or [Customs and Border Protection] facility,” the online alert reads. The offer extends to civilians of “any grade,” and notes, “Travel, lodging, and per diem may be reimbursed by the receiving agency.” 

    Work includes: “Data Entry” and “Operational Planning Support,” as well as various processing tasks such as helping agents with the “physical flow of detained illegal aliens from arrest to deportation,” and other logistical considerations “to improve efficiencies and the effectiveness of operations.”

    There are no education requirements, and applicants must have worked at “their current agency for more than 90 days and are no longer in a probationary period.” 

    Note: “Conditions at some locations could be austere,” and “Deployment locations are based on need and are not negotiable,” according to the bulletin. More, here

    New: A judge has ordered Florida to stop expanding its “Alligator Alcatraz” detention center because “state officials never sufficiently explained why the facility needed to be in the middle of the Florida Everglades,” the Associated Press reports. “What is apparent, however, is that in their haste to construct the detention camp, the State did not consider alternative locations,” District Judge Kathleen Williams of the Southern District of Florida said in her 82-page order. 

    “Every Florida governor, every Florida senator, and countless local and national political figures, including presidents, have publicly pledged their unequivocal support for the restoration, conservation, and protection of the Everglades,” Williams wrote. “This Order does nothing more than uphold the basic requirements of legislation designed to fulfill those promises.” More, here

    Related: AP also takes readers “Inside the facility where ICE is training recruits to take on Trump's deportation goals” at the Federal Law Enforcement Training Center in Brunswick, Georgia.

    Developing: ICE wants to spend millions of dollars on “custom, gold-detailed vehicle wraps” (see here) for its SUVs patrolling the nation’s capital, the Washington Post reported Wednesday. Critics call it excessive and unnecessary. More, here

    Big picture consideration: Republican lawmakers’ “Big Beautiful Bill” funds an unprecedented surge in federal law enforcement. But is that even possible? Eric Katz of GovExec tallied up many of the planned personnel changes and stacked those against past pledges to boost hiring. Consulting history, he found that “Even when some agencies previously received authorization and funding to hire, they failed to do so in significant numbers.”

    “Potential bottlenecks include background checks and training capacity,” Katz writes. On the other hand, “Early returns show some positive signs for the administration. ICE recently boasted it has received 100,000 job applications. CBP has seen a surge in applicants. The rate at which applicants are onboarded, however, has barely moved.” Continue reading, here

    One way to add more federal agents: Lower recruiting standards, as the F.B.I. has done in a change that is “alarming agents,” according to the New York Times, reporting Thursday. 

    Trump 2.0

    ODNI to shrink further under new reorganization plan. The Office of the Director of National Intelligence, which has already shrunk its workforce by about one-quarter this year, will lose another 200 workers in coming weeks under an “ODNI 2.0” restructuring, the U.S. spy chief said Wednesday.

    The office had slightly less than 2,000 employees at the start of the Trump administration and now has around 1,500. The additional cut would bring the year's total reduction to about 35 percent. In a press release this week, Director of National Intelligence Tulsi Gabbard claimed the changes would “reduce ODNI by over 40%” by Sept. 30 and “save taxpayers over $700 million per year.” More, here

    Also: On July 20, Gabbard ordered U.S. intelligence agencies to stop sharing information with the so-called Five Eyes allies, which includes the U.K., Canada, Australia and New Zealand, CBS News reported Thursday. “The memo also limited distribution of material regarding peace talks to within the agencies that created or originated the intelligence,” Jim LaPorta writes for CBS. 

    Reminder: President Donald Trump and his Republican allies have long criticized the U.S. intelligence community, particularly after it concluded that Russia interfered in the 2016 presidential election on behalf of Trump. And just last month, Gabbard issued a report that she said showed a contradiction between the IC's internal assessments and public statements about Russian interference. But in fact, the public statement matched the internal assessments.

    Related commentary: Former CIA Director Bill Burns wrote “A Letter to America’s Discarded Public Servants” this week in The Atlantic. In short, “You all deserved better” than to be downsized under the current administration.

    One week ago, Trump met with Russia’s Vladimir Putin to find an end to Putin’s Ukraine invasion. Seven days later, nothing has changed. But Trump’s effort stalled out in a mere four days, according to the Wall Street Journal, reporting Friday. 

    What’s going on: “The failure to reach a diplomatic breakthrough stems in part from sharp differences in negotiating style between Putin and Trump,” the Journal writes. “The U.S. president, former aides said, has an improvisational approach that is heavily dependent on personal relationships.” However, “Putin is playing a longer game, calculating that Russia can gradually improve its position on the battlefield while the diplomats talk, even if it is at the expense of thousands of casualties on both sides.”

    Expert reax: “We are where we were two weeks ago, we are where we were six months ago,” said Kurt Volker, who was Trump’s representative for Ukraine negotiations during his first term. “There’s never going to be an agreement. Putin will never agree.” 

    Read more: 

    Lastly this week: “The Trump White House has launched an official TikTok account, despite [Congress’] TikTok sale-or-ban law and another looming deadline,” CNN’s Brian Stelter reported this week. 

    Additional reading: 

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Lumma infostealer affiliates’ complex operating framework was revealed by Insikt Group in a ground-breaking report published on August 22, 2025, underscoring their reliance on cutting-edge evasion technologies to support cybercrime operations. The Lumma malware, a prominent malware-as-a-service (MaaS) platform since 2022, facilitates data exfiltration from browsers, cryptocurrency wallets, and system credentials, supported by a decentralized […]

    The post Lumma Operators Deploy Cutting-Edge Evasion Tools to Maintain Stealth and Persistence appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • CISA has issued an urgent warning regarding a critical zero-day vulnerability affecting Apple’s iOS, iPadOS, and macOS operating systems that threat actors are actively exploiting. 

    The vulnerability, tracked as CVE-2025-43300, has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog, signaling immediate action is required from organizations and individual users to protect their systems from potential compromise.

    Key Takeaways
    1. CVE-2025-43300 in Apple devices allows code execution through malicious images.
    2. Actively exploited by threat actors targeting iOS, iPadOS, and macOS systems.
    3. Install Apple security updates immediately; federal deadline September 11, 2025.
    • Out-of-Bounds Write Flaw 

    The newly disclosed vulnerability represents an out-of-bounds write weakness within Apple’s Image I/O framework, classified under CWE-787 (Out-of-bounds Write). 

    This type of vulnerability allows attackers to write data beyond the intended boundaries of allocated memory buffers, potentially leading to arbitrary code execution, system crashes, or privilege escalation. 

    The Image I/O framework is responsible for reading and writing image data across Apple’s ecosystem, making this vulnerability particularly concerning due to its widespread usage in processing various image formats, including JPEG, PNG, and HEIF files.

    Security researchers indicate that the flaw could be triggered through maliciously crafted image files, enabling attackers to execute arbitrary code with the privileges of the affected application. 

    The vulnerability affects multiple Apple operating system versions, creating a broad attack surface that encompasses iPhones, iPads, and Mac computers across enterprise and consumer environments.

    CISA’s inclusion of CVE-2025-43300 in the KEV catalog, dated August 21, 2025, establishes a mandatory remediation deadline of September 11, 2025, for all federal civilian executive branch agencies. 

    Under Binding Operational Directive (BOD) 22-01), these organizations must apply vendor-supplied mitigations or discontinue use of affected products if patches remain unavailable.

    The agency’s swift response underscores the severity of active exploitation attempts targeting this vulnerability. 

    While CISA has not yet determined whether the flaw is being leveraged in ransomware campaigns, the agency’s guidance emphasizes treating this as a high-priority security issue requiring immediate attention from network defenders and cybersecurity teams.

    Risk FactorsDetails
    Affected ProductsApple iOSApple iPadOSApple macOS
    ImpactArbitrary Code ExecutionPotential Privilege Escalation
    Exploit PrerequisitesMaliciously crafted image fileUser interaction with image processingAccess to Image I/O framework
    CVSS 3.1 Score8.8 (High)

    Immediate Patching Required 

    Apple has released security updates addressing the vulnerability across affected platforms, with detailed mitigation guidance available through multiple support bulletins. 

    Organizations should prioritize implementing these patches as part of their vulnerability management frameworks, particularly given the zero-day nature of the threat and confirmed exploitation in the wild.

    The vulnerability’s presence in the KEV catalog serves as a critical input for cybersecurity professionals developing risk-based remediation strategies. 

    Network defenders should leverage CISA’s authoritative vulnerability intelligence to enhance their threat detection capabilities and ensure comprehensive coverage of known attack vectors targeting Apple’s widely deployed operating systems.

    Safely detonate suspicious files to uncover threats, enrich your investigations, and cut incident response time. Start with an ANYRUN sandbox trial → 

    The post CISA Warns of Apple iOS, iPadOS, and macOS 0-day Vulnerability Exploited in Attacks appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated traffic direction system known as Help TDS has been weaponizing compromised websites since 2017, transforming legitimate sites into gateways for elaborate tech support scams.

    The operation specializes in deploying PHP code templates that redirect unsuspecting visitors to fraudulent Microsoft Windows security alert pages designed to deceive users into believing their systems are compromised.

    The malicious infrastructure operates through a distinctive URL pattern using “/help/?d{14}” redirects, with examples including domains like gadbets[.]site/help/?29511696874942 and radiant.growsier[.]shop/help/?30721707351057.

    These redirects lead victims to sophisticated scam pages that employ full-screen browser manipulation and exit prevention techniques, effectively trapping users within fabricated security warnings that mimic legitimate Microsoft alerts.

    Help TDS has evolved into a comprehensive malware-as-a-service platform, providing standardized PHP injection templates and fully-featured malicious WordPress plugins to criminal affiliates.

    The operation’s reach extends across multiple monetization channels, including dating, cryptocurrency, and sweepstakes scams for traffic that doesn’t meet tech support scam criteria.

    GoDaddy researchers identified that the system has infected over 10,000 WordPress sites worldwide, with the malicious “woocommerce_inputs” plugin serving as the primary infection vector.

    The campaign’s technical sophistication becomes evident through its integration with established malware operations, including DollyWay and Balada Injector.

    Example contents from the trafficredirect telegram channel (Source – GoDaddy)

    After the disruption of the LosPollos affiliate network, Help TDS positioned itself as the dominant monetization platform, utilizing a Telegram channel called “trafficredirect” for distributing fresh redirect domains alongside fallback infrastructure through pinkfels[.]shop servers.

    Advanced Plugin Evolution and Persistence Mechanisms

    The malicious woocommerce_inputs plugin represents the pinnacle of Help TDS’s technical evolution, progressing through multiple versions with increasingly sophisticated capabilities.

    Obfuscated woocommerce_inputs/woocommerce-load.php file (Source – GoDaddy)

    Version 1.4 introduced advanced traffic filtering mechanisms, creating database tables such as “wp_ip_tracking” to monitor visitor IP addresses and prevent multiple redirections.

    The malware implements temporal evasion by avoiding redirects on Sundays, geographic targeting focusing on USA, Canada, and Japan, and device filtering that exclusively targets desktop computers while ignoring mobile traffic.

    The plugin’s persistence strategy involves delayed activation, waiting 24 hours post-installation before initiating redirects to obscure the connection between plugin installation and malicious activity.

    Cookie management through “redirect” and “partner_” identifiers ensures visitors aren’t redirected multiple times within a 24-hour period, maintaining operational stealth while maximizing victim conversion rates.

    Version 2.0.0 introduced autonomous update capabilities through the Help TDS command-and-control infrastructure, enabling dynamic plugin modifications via API endpoints at pinkfels[.]shop/wp-plugin.

    The system generates customized plugin versions for each campaign identifier, demonstrating the operation’s sophisticated infrastructure management.

    Threat actors gain initial access through stolen WordPress administrator credentials, with server logs revealing swift 22-second attack sequences from login to plugin activation.

    The redirect mechanism employs dual JavaScript methods for browser compatibility: window.location.replace('$redirectUrl'); window.location.href='$redirectUrl'; ensuring reliable traffic redirection regardless of browser security settings.

    This technical approach, combined with credential harvesting functionality that exfiltrates WordPress user data bi-weekly, creates a self-perpetuating cycle of compromise where stolen credentials facilitate further infections across the WordPress ecosystem.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated HTTP request smuggling attack that exploits inconsistent parsing behaviors between front-end proxy servers and back-end application servers. 

    This newly discovered technique leverages malformed chunked transfer encoding extensions to bypass established security controls and inject unauthorized secondary requests into web applications.

    Key Takeaways
    1. Exploits malformed HTTP chunked encoding to create front-end/back-end parsing discrepancies.
    2. Bypasses security controls by injecting hidden secondary requests.
    3. Apply patches and migrate to the HTTP/2 protocol.

    The attack targets a fundamental vulnerability in HTTP/1.1 protocol implementation, where different servers interpret ambiguous request formatting inconsistently. 

    Attackers can exploit these parsing discrepancies to circumvent Web Application Firewalls (WAFs), Content Delivery Networks (CDNs), and load balancers, potentially gaining unauthorized access to sensitive backend resources.

    HTTP Smuggling Vulnerability

    Imperva reports that the attack mechanism centers on HTTP/1.1’s chunked transfer encoding feature, which allows message bodies to be transmitted in segments using the Transfer-Encoding: chunked header. 

    Transfer-Encoding: chunked header
    Transfer-Encoding: chunked header

    According to RFC 9112 specifications, each chunk includes a header containing the size in hexadecimal format, followed by optional chunk extensions prefixed with semicolons.

    Researchers discovered that attackers can manipulate chunk extension parsing by sending malformed headers containing bare semicolons without proper extension names. 

    This creates a critical parsing discrepancy where front-end systems interpret the malformed syntax differently than backend servers.

    The attack sequence follows this pattern: the attacker sends a chunk size line ending with a semicolon but no extension name, causing the front-end parser to treat the entire sequence as a single request while the back-end parser interprets the newline after the semicolon as marking the end of the chunk header. 

    smuggled request

    Smuggled request

    This allows attackers to embed secondary HTTP requests after zero-length chunks, which backend systems process as legitimate separate requests, effectively bypassing front-end security validation.

    The vulnerability stems from HTTP/1.1’s inherent design weaknesses, particularly its reliance on text-based parsing and multiple methods for expressing message boundaries through Content-Length headers, Transfer-Encoding specifications, or delimiters. 

    Many server implementations prioritize compatibility over strict RFC compliance, leading to lenient parsing of malformed requests that create exploitable inconsistencies.

    Security experts emphasize that comprehensive patches have been deployed across affected systems, with organizations maintaining current software versions receiving full protection against this attack vector. 

    However, the most effective long-term mitigation involves migrating to HTTP/2, which employs binary framing mechanisms that eliminate the ambiguous parsing scenarios, enabling request smuggling attacks.

    This reinforces the critical importance of protocol-level security considerations and highlights HTTP/1.1’s fundamental vulnerabilities that continue enabling sophisticated bypass techniques despite existing protective measures.

    Safely detonate suspicious files to uncover threats, enrich your investigations, and cut incident response time. Start with an ANYRUN sandbox trial → 

    The post New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A sophisticated cryptojacking campaign has emerged, exploiting misconfigured Redis servers across multiple continents to deploy cryptocurrency miners while systematically dismantling security defenses.

    The threat actor behind this operation, designated TA-NATALSTATUS, has been active since 2020 but has significantly escalated their activities throughout 2025, targeting exposed Redis instances with alarming success rates across major economies.

    The campaign demonstrates unprecedented scale and technical sophistication, with infection rates reaching alarming levels across affected regions.

    In Finland, 41% of Redis servers have been compromised, while Russia shows 39% infection rates. Germany faces a 33% compromise rate, with the United Kingdom at 27%, France at 23%, and the United States reporting 17% of Redis servers affected.

    Screenshot of the infected system where keys are set to cron tasks (Source – Cloudsek)

    The geographic distribution spans from Asia-Pacific regions including China, which hosts over 140,000 exposed Redis instances, to European and North American infrastructure.

    CountryTotal Redis InstancesUnauthenticated (No Auth)Percent Unauthenticated
    China140,17012,0308.58%
    United States50,1608,80617.56%
    Germany20,4006,85433.70%
    Hong Kong12,7608316.51%
    Singapore11,7102,12618.16%
    India7,4562,20629.60%
    Netherlands7,2491,31018.07%
    Russia7,0552,80539.77%
    South Korea5,9501,82030.50%
    Japan5,20273414.11%
    France5,1521,19623.22%
    United Kingdom4,0151,08627.06%
    Brazil3,87888222.74%
    Finland3,0341,26641.73%
    Canada2,82552718.65%
    Vietnam2,48487135.06%
    Indonesia2,39458824.57%
    Australia2,22735716.02%
    Ireland2,13130014.07%

    CloudSEK analysts identified this advanced persistent threat through their BeVigil platform monitoring, revealing that TA-NATALSTATUS has evolved from a simple cryptojacking operation into a comprehensive rootkit-style attack framework.

    The threat actors have systematically upgraded their stealth capabilities, incorporating process hijacking, command obfuscation, and timestomping techniques that transform compromised servers into long-term mining assets while remaining virtually undetectable to standard monitoring tools.

    The attack methodology exploits a fundamental security weakness known as the “Root by Inheritance” technique, where Redis servers running with elevated privileges become immediate targets for privilege escalation.

    Rather than exploiting traditional vulnerabilities, the attackers leverage legitimate Redis operations to achieve persistent access and control.

    Advanced Persistence and Evasion Mechanisms*

    The malware’s persistence strategy represents a masterclass in system manipulation and defensive evasion. TA-NATALSTATUS employs a multi-layered approach that begins with binary hijacking, where critical system utilities are systematically replaced with malicious wrappers.

    The attackers rename legitimate binaries like ps and top to ps.original and top.original, then install custom scripts that execute the original commands while filtering out evidence of their mining processes.

    The attack sequence involves sophisticated Redis manipulation through a series of CONFIG SET commands. Attackers redirect Redis database output to /var/spool/cron/root and inject malicious cron jobs that trigger automatic payload downloads.

    The technique exploits Redis’s ability to write arbitrary files when running with root privileges, effectively turning the database service into a delivery mechanism for persistent malware installation.

    To ensure long-term persistence, the malware implements immutable file protection using the chattr +i command, making core malware components undeletable even by root users.

    This technique, combined with SSH backdoor installation using the distinctive key comment “uc1”, creates multiple redundant access paths that survive system restarts and basic cleanup attempts.

    The comprehensive approach transforms infected systems into resilient mining platforms that actively defend against both competing malware and administrator remediation efforts.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post New Cryptojacking Attack Exploits Redis Servers to Install Miners and Disable Defenses appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The “Linux-specific malware infection chain that starts with a spam email with a malicious RAR archive file,” Trellix researcher Sagar Bade said in a technical write-up. “The payload isn’t hidden inside the file content or a macro, it’s encoded directly

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Ransomware-as-a-Service (RaaS) models continue to democratize sophisticated attacks in the ever-changing world of cybercrime by allowing affiliates with little technical know-how to distribute ransomware through profit-sharing or subscription models. A newly identified strain, BQTLock, has emerged since mid-July 2025, operating under this RaaS paradigm and marketed aggressively on dark web forums and Telegram channels. Overview […]

    The post BQTLOCK Ransomware-as-a-Service Emerges, Boasting Sophisticated Evasion Tactics appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Lumma information stealer has evolved from its 2022 origins into one of the most sophisticated malware-as-a-service (MaaS) ecosystems in the cybercriminal landscape.

    Operating through a vast network of affiliates, Lumma has established itself as the dominant infostealer platform, accounting for approximately 92% of stolen credential listings on major underground marketplaces by late 2024.

    The malware’s success stems not from technical innovation alone, but from its comprehensive ecosystem of operational enablers designed to maximize stealth, ensure operational continuity, and facilitate rapid adaptation to security countermeasures.

    Unlike traditional malware operations that rely on single-vector attacks, Lumma affiliates employ a multi-layered approach that integrates proxy networks, virtual private networks, anti-detect browsers, exploit services, and crypting tools.

    This interconnected infrastructure enables affiliates to simultaneously operate multiple criminal schemes, including rental fraud and cryptocurrency theft, while maintaining operational security across diverse attack vectors.

    The ecosystem’s resilience was demonstrated following major law enforcement takedowns in May 2025, when Lumma infrastructure was reestablished within days, showcasing the platform’s operational discipline and distributed architecture.

    The malware’s attack methodology centers on credential harvesting from Chromium and Mozilla-based browsers, targeting approximately 70 browser cryptocurrency extensions and two-factor authentication plugins.

    Lumma’s technical sophistication includes server-side log decryption, adaptive file grabbing capabilities, and integrated reverse proxy functionality, all packaged in builds weighing between 150-300 KB to minimize detection signatures.

    Recorded Future analysts identified previously undocumented tools circulating within Lumma affiliate networks, including a cracked email credential validation utility and AI-powered phishing page generators.

    EMAIL SOFTWARE 1.4.0.9 cracked by Maksim advertised on forum[.]cnsec[.]org (Source – Recordedfuture)

    These discoveries highlight the ecosystem’s continuous evolution and the collaborative nature of modern cybercriminal operations, where specialized service providers enhance affiliate capabilities through dedicated toolkits and infrastructure services.

    Advanced Evasion Infrastructure: The GhostSocks Integration

    The most significant advancement in Lumma’s evasion capabilities emerged through its partnership with the GhostSocks team in early 2024.

    Announcement of GhostSocks-Lumma partnership (Source – Recordedfuture)

    This collaboration introduced residential proxy functionality that transforms infected victim machines into SOCKS5 proxy endpoints, enabling affiliates to route malicious traffic through compromised systems.

    The integration creates a self-sustaining proxy network where each successful infection potentially becomes a relay point for future operations.

    # Example SOCKS5 proxy configuration used by Lumma affiliates
    proxy_config = {
        "type": "socks5",
        "host": "infected_victim_ip",
        "port": 1080,
        "authentication": "none",
        "tunnel_traffic": "all_http_https"
    }

    By 2025, Lumma expanded this offering to include backconnect proxy access, allowing threat actors to conduct attacks that appear to originate directly from victim devices.

    This capability proves particularly effective against Google’s cookie-based protection mechanisms, as attacks launched through victim machines can bypass location-based security controls and refresh expired authentication tokens seamlessly.

    The system’s sophistication lies in its ability to maintain persistent connections to compromised machines, creating a distributed anonymization network that complicates attribution efforts.

    Complementing the proxy infrastructure, Lumma affiliates extensively utilize anti-detect browsers, particularly Dolphin, which facilitates multi-account management without triggering platform security measures.

    These browsers generate unique digital fingerprints for each session, enabling affiliates to operate dozens of fraudulent accounts simultaneously across different platforms while maintaining apparent legitimacy through consistent behavioral patterns and device characteristics.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Lumma Affiliates Using Advanced Evasion Tools Designed to Ensure Stealth and Continuity appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶