Article Details

Scrape Timestamp (UTC): 2025-11-03 13:04:50.338

Source: https://thehackernews.com/2025/11/weekly-recap-lazarus-hits-web3-intelamd.html

Original Article Text

Click to Toggle View

⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More. Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found. No system was fully safe. From spying and fake job scams to strong ransomware and tricky phishing, the attacks came from all sides. Even encrypted backups and secure areas were put to the test. Keep reading for the full list of the biggest cyber news from this week—clearly explained and easy to follow. ⚡ Threat of the Week Motex Lanscope Flaw Exploited to Drop Gokcpdoor — A suspected Chinese cyber espionage actor known as Tick has been attributed to a target campaign that has leveraged a recently disclosed critical security flaw in Motex Lanscope Endpoint Manager (CVE-2025-61932, CVSS score: 9.3) to infiltrate target networks and deploy a backdoor called Gokcpdoor. Sophos, which disclosed details of the activity, said it was "limited to sectors aligned with their intelligence objectives." Bad Actors Are Using New AI Capabilities and Powerful AI Agents Traditional firewalls and VPNs aren't helping—instead, they're expanding your attack surface and enabling lateral threat movement. They're also more easily exploited with AI-powered attacks. It's time for Zero Trust + AI. 🔔 Top News ‎️‍🔥 Trending CVEs Hackers move fast. They often exploit new vulnerabilities within hours, turning a single missed patch into a major breach. One unpatched CVE can be all it takes for a full compromise. Below are this week's most critical vulnerabilities gaining attention across the industry. Review them, prioritize your fixes, and close the gap before attackers take advantage. This week's list includes — CVE-2025-55315 (QNAP NetBak PC Agent), CVE-2025-10680 (OpenVPN), CVE-2025-55752, CVE-2025-55754 (Apache Tomcat), CVE-2025-52665 (Ubiquiti UniFi Access), CVE-2025-12044, CVE-2025-11621 (HashiCorp Vault), CVE-2025-43995 (Dell Storage Manager), CVE-2025-5842 (Veeder-Root TLS4B Automatic Tank Gauge System), CVE-2025-24893 (XWiki), CVE-2025-62725 (Docker Compose), CVE-2025-12080 (Google Messages for Wear OS), CVE-2025-12450 (LiteSpeed Cache plugin), CVE-2025-11705 (Anti-Malware Security and Brute-Force Firewall plugin), CVE-2025-55680 (Microsoft Cloud Files Minifilter driver), CVE-2025-6325, CVE-2025-6327 (King Addons for Elementor plugin), CVE-2025-49401 (Quiz and Survey Master plugin), CVE-2025-54603 (Claroty Secure Remote Access), and CVE-2025-10932 (Progress MOVEit Transfer). 📰 Around the Cyber World 🎥 Cybersecurity Webinars 🔧 Cybersecurity Tools Disclaimer: These tools are for educational and research use only. They haven't been fully security-tested and could pose risks if used incorrectly. Review the code before trying them, test only in safe environments, and follow all ethical, legal, and organizational rules. 🔒 Tip of the Week Why Attack Surface Reduction Matters More Than Ever — What if your biggest risk isn't a new zero-day—but something already sitting quietly inside your system? This week, the spotlight turns to Attack Surface Reduction (ASR)—a strategy that's fast becoming a must-have, not a nice-to-have. As companies spin up more cloud apps, APIs, and accounts, hackers are finding easy ways in through what's already exposed. Think forgotten subdomains, unused ports, old user accounts. The more you have, the more they have to work with. The good news? Open-source tools are stepping up. EasyEASM helps map what's live on the web. Microsoft's Attack Surface Analyzer shows what changes after updates or installs. ASRGEN lets you test smart rules in Windows Defender to shut down risky behaviors before they're exploited. Here's the truth: you don't have to stop building fast—you just have to build smart. Shrinking your attack surface doesn't slow innovation. It protects it. Don't wait for an alert. Take control before attackers do. Map it. Cut it. Lock it down. Conclusion The big lesson this week? Cyber threats don't always look like threats. They can hide in normal apps, trusted websites, or even job offers. It's no longer just about stopping viruses—it's about spotting tricks, acting fast, and thinking ahead. Every click, update, and login matters. Cybersecurity isn't a one-time fix. It's an everyday habit.

Daily Brief Summary

VULNERABILITIES // Critical Lanscope Flaw Exploited by Tick Group for Espionage

A critical vulnerability in Motex Lanscope Endpoint Manager (CVE-2025-61932) has been exploited by the Tick group, a suspected Chinese cyber espionage actor, to deploy the Gokcpdoor backdoor.

The flaw, with a CVSS score of 9.3, was quickly leveraged to infiltrate networks, targeting sectors aligned with the group's intelligence objectives, according to Sophos.

The exploitation of this vulnerability demonstrates the rapid pace at which attackers can weaponize newly discovered security flaws.

Traditional security measures like firewalls and VPNs are increasingly inadequate against AI-powered attacks, prompting a shift towards Zero Trust models.

Organizations are urged to prioritize patch management and adopt proactive measures to mitigate risks associated with emerging vulnerabilities.

The incident underscores the necessity for continuous monitoring and swift response strategies to protect sensitive data and infrastructure.

The cybersecurity landscape is evolving, with attackers using advanced tools and tactics, emphasizing the need for adaptive and resilient defense mechanisms.