Article Details

Scrape Timestamp (UTC): 2025-03-03 12:07:37.426

Source: https://thehackernews.com/2025/03/thn-weekly-recap-alerts-on-zero-day.html

Original Article Text

Click to Toggle View

⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists. This week, a 23-year-old Serbian activist found themselves at the crossroads of digital danger when a sneaky zero-day exploit turned their Android device into a target. Meanwhile, Microsoft pulled back the curtain on a scheme where cybercriminals used AI tools for harmful pranks, and a massive trove of live secrets was discovered, reminding us that even the tools we rely on can hide risky surprises. We've sifted through a storm of cyber threats—from phishing scams to malware attacks—and broken down what it means for you in clear, everyday language. Get ready to dive into the details, understand the risks, and learn how to protect yourself in an increasingly unpredictable online world. ⚡ Threat of the Week Serbian Youth Activist Targeted by Android 0-Day Exploit Chain — A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit chain developed by Cellebrite to unlock the device and likely deploy an Android spyware called NoviSpy. The flaws combined CVE-2024-53104 with CVE-2024-53197 and CVE-2024-50302 to escalate privileges and achieve code execution. The vulnerabilities, originally present within the Linux kernel, were addressed in December 2024. CVE-2024-53104 has since been addressed in Android as of early February 2025. In response to the development, Cellebrite said it will no longer allow Serbia to use its software, stating "we found it appropriate to stop the use of our products by the relevant customers at this time." The CISO Guide to Detecting and Preventing Identity Attacks 🔔 Top News ‎️‍🔥 Trending CVEs Your go-to software could be hiding dangerous security flaws—don't wait until it's too late! Update now and stay ahead of the threats before they catch you off guard. This week's list includes — CVE-2025-27364 (MITRE Caldera), CVE-2025-24752 (Essential Addons for Elementor plugin), CVE-2025-27090 (Sliver), CVE-2024-34331 and its bypass (Parallels Desktop), CVE-2025-0690 (GRUB2), CVE-2024-12084, CVE-2024-12085,CVE-2024-12086, CVE-2024-12087, CVE-2024-12088 (RSync), CVE-2025-0475, CVE-2025-0555 (GitLab), CVE-2025-20111 (Cisco Nexus 3000 and 9000 Series Switches), CVE-2025-23363 (Siemens Teamcenter), CVE-2025-0514 (CVE-2025-0514), CVE-2025-1564 (SetSail Membership plugin), CVE-2025-1671 (Academist Membership plugin), CVE-2025-1638 (Alloggio Membership plugin), CVE-2024-12824 (Nokri – Job Board WordPress Theme theme), CVE-2024-9193 (WHMpress - WHMCS WordPress Integration Plugin plugin), CVE-2024-8420 (DHVC Form plugin), CVE-2024-8425 (WooCommerce Ultimate Gift Card plugin), CVE-2025-25570 (Vue Vben Admin), CVE-2025-26943 (Jürgen Müller Easy Quotes plugin), and CVE-2025-1128 (Everest Forms – Contact Forms, Quiz, Survey, Newsletter & Payment Form Builder for WordPress plugin). 📰 Around the Cyber World 🎥 Expert Webinar P.S. Know someone who could use these? Share it. 🔧 Cybersecurity Tools 🔒 Tip of the Week The Hidden Dangers of Copy-Paste: How to Secure Your Clipboard from Cyber Threats — Clipboard security is often overlooked, yet it's a prime target for attackers. Malware can hijack your clipboard to steal sensitive data, swap cryptocurrency addresses, or execute malicious commands without your knowledge. Tools like Edit Clipboard Contents Tool allow you to inspect and modify clipboard data at a raw level, providing visibility into potential threats. Sysinternals Process Monitor (ProcMon) can detect suspicious access to the clipboard, helping you catch rogue processes. Additional tools like InsideClipboard and Clipboardic log clipboard history and show all formats, revealing hidden malicious content that could otherwise go unnoticed. To protect against clipboard-based attacks, use clipboard-clearing practices after copying sensitive data, and avoid pasting from untrusted sources. Developers should implement auto-clearing of clipboard data and sanitize pasted input to prevent exploits. Cybersecurity professionals can monitor clipboard access via Sysmon or DLP systems to alert on suspicious behavior. By incorporating these tools and habits, you can better defend against clipboard hijacking and ensure sensitive information remains secure. Conclusion As we close this week's update, remember that staying informed is the first step to protecting yourself online. Every incident—from targeted exploits to AI misuse—shows that cyber threats are real and constantly changing. Thank you for reading. Stay alert, update your systems, and use these insights to make smarter choices in your digital life. Stay safe until next week.

Daily Brief Summary

NATION STATE ACTIVITY // Serbian Activist Targeted by Zero-Day Android Exploit

A 23-year-old Serbian activist's Android phone was compromised using a sophisticated zero-day exploit chain.

The exploit leveraged vulnerabilities within the Linux kernel to gain escalated privileges and execute malicious code.

Cellebrite, the security software used in the exploit, has since barred its use in Serbia, citing misuse.

Microsoft revealed emerging threats involving AI tools used for cyber pranks, highlighting a new landscape of digital threats.

Ongoing updates to combat vulnerabilities in widely used software, including those identified in popular plugins and systems.

Cybersecurity strategies now must also secure routine operations like clipboard usage against new forms of malware attacks.

Regular system updates and vigilant cybersecurity practices are recommended to protect against evolving online threats.