Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11778

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-08-26 07:41:43 theregister MALWARE Over 19 Million Malware-Infested Apps Downloaded from Google Play Store
Zscaler's ThreatLabz identified 77 malicious apps on Google Play Store, downloaded over 19 million times, bypassing Google's security measures. The apps include an updated version of the Anatsa banking trojan, featuring a keylogger, SMS interception, and anti-detection capabilities. Anatsa targets 831 global financial institutions, including crypto exchanges and traditional banks, posing significant financial threats. The malware employs advanced evasion techniques, such as dynamic code loading and APK ZIP obfuscation, complicating detection and analysis. Google claims it addressed the security flaws before Zscaler's report, but questions about the effectiveness of its security processes remain. Joker malware, another persistent threat, accounts for a quarter of infections, focusing on credential harvesting via SMS. The incident raises concerns about app store security, stressing the need for enhanced detection and response strategies to protect users.
Details
2025-08-26 06:35:19 thehackernews MALWARE Google Tightens Developer Verification to Combat Malicious Android Apps
Google will implement mandatory identity verification for all Android app developers in Brazil, Indonesia, Singapore, and Thailand by September 2026 to curb malicious app distribution. This initiative aims to enhance accountability, making it difficult for malicious actors to distribute harmful apps after removal from certified Android devices. The verification process will gradually roll out starting October 2025, with full implementation expected by March 2026. Developers using the Google Play Store are largely unaffected, having already met similar verification requirements through the existing Play Console process. A new type of Android Developer Console account is planned for student and hobbyist developers, ensuring inclusivity while maintaining security standards. These measures are part of broader efforts to prevent impersonation and the distribution of fake apps via third-party marketplaces. The move aligns with Google's ongoing security enhancements, including past requirements for organizational accounts to provide a D-U-N-S number. This security upgrade coincides with potential Play Store reforms following an antitrust lawsuit, reflecting Google's commitment to a secure and competitive app ecosystem.
Details
2025-08-26 06:01:15 thehackernews VULNERABILITIES CISA Adds Citrix and Git Vulnerabilities to Exploited Catalog
CISA has identified three new vulnerabilities affecting Citrix Session Recording and Git, adding them to its Known Exploited Vulnerabilities catalog due to active exploitation evidence. Citrix addressed the security flaws in November 2024 after a responsible disclosure by watchTowr Labs in July 2024, ensuring timely mitigation. The Git vulnerability, CVE-2025-48384, was patched in July 2024; a proof-of-concept exploit was subsequently released by Datadog, raising awareness of potential risks. CVE-2025-48384 involves a submodule path issue that could lead to unintended code execution when combined with specific symlink and hook configurations. Federal Civilian Executive Branch agencies have been mandated to implement necessary mitigations by September 15, 2025, to protect their networks from these vulnerabilities. The inclusion in the KEV catalog signals the critical nature of these vulnerabilities and the need for immediate action to prevent exploitation.
Details
2025-08-25 23:47:48 bleepingcomputer VULNERABILITIES Surge in Scans Targets Microsoft RDP Authentication Servers
GreyNoise reports a significant increase in scanning activity targeting Microsoft Remote Desktop Web Access and RDP Web Client authentication portals, with nearly 1,971 IP addresses involved. The coordinated scans aim to exploit timing flaws in RDP systems, potentially setting the stage for future credential-based attacks like brute force or password-spray attempts. Timing flaws can inadvertently reveal valid usernames by the response time difference between valid and invalid login attempts, aiding attackers in username enumeration. Approximately 92% of the IP addresses involved have been flagged as malicious, with most originating from Brazil and targeting U.S. IP addresses, indicating a possible botnet operation. The timing aligns with the U.S. back-to-school season, increasing exposure risk as educational institutions bring RDP systems online with predictable username formats. The surge may also suggest a new vulnerability discovery, as spikes in malicious traffic often precede such disclosures. Administrators are advised to secure RDP portals with multi-factor authentication and consider placing them behind VPNs to mitigate potential threats.
Details
2025-08-25 21:36:33 bleepingcomputer VULNERABILITIES New AI Attack Exploits Image Resampling to Steal Data
Researchers at Trail of Bits unveiled a novel attack method using downscaled images to inject malicious prompts into AI systems, potentially leading to data theft. The attack exploits resampling algorithms like bicubic interpolation, revealing hidden instructions within images that AI models interpret as legitimate user input. Specific AI systems, including Gemini CLI, were tested, demonstrating the feasibility of exfiltrating data such as Google Calendar information to unauthorized destinations. The method requires tailoring to each AI model based on its image processing algorithms, indicating a broad potential attack surface across various platforms. To counteract such vulnerabilities, researchers recommend implementing dimension restrictions and user confirmation for sensitive actions within AI systems. An open-source tool, Anamorpher, has been developed to create images using different downscaling methods, aiding in understanding and mitigating such attacks. Emphasizing secure design patterns and systematic defenses is crucial to mitigate prompt injection vulnerabilities in AI systems.
Details
2025-08-25 19:31:22 bleepingcomputer DATA BREACH Farmers Insurance Data Breach Affects 1.1 Million Customers
Farmers Insurance disclosed a data breach impacting 1.1 million customers due to a compromise at a third-party vendor's database. The breach involved unauthorized access to sensitive customer information, including names, addresses, dates of birth, driver's license numbers, and partial Social Security numbers. The incident was linked to a broader series of Salesforce data thefts, where attackers used social engineering and vishing to infiltrate systems. Farmers Insurance promptly launched an investigation and informed law enforcement, while containment measures were implemented by the vendor. Notifications to affected individuals began on August 22, with details submitted to the Maine Attorney General's Office. The breach is part of a larger pattern of attacks by groups like ShinyHunters, who exploit OAuth app vulnerabilities to access and steal data. Other major companies, including Google and Cisco, have also been victims of similar attacks, indicating a widespread threat to organizations using Salesforce.
Details
2025-08-25 18:59:06 bleepingcomputer DATA BREACH Auchan Data Breach Exposes Customer Loyalty Account Information
French retailer Auchan experienced a cyberattack compromising sensitive data of several hundred thousand customer loyalty accounts, including names, addresses, and contact details. The breach did not affect financial data, passwords, or PINs, minimizing direct financial risk to customers. Auchan has notified affected customers and the French Data Protection Authority (CNIL) about the incident, ensuring regulatory compliance. Customers are advised to be vigilant against phishing attempts that may exploit the exposed data, with specific warnings about fraudulent communications. The incident follows recent data breaches involving other major French companies, although no direct connection between these events has been established. Auchan's proactive communication aims to mitigate potential reputational damage and reassure its customer base. The breach serves as a reminder of the ongoing risks to customer data and the need for robust cybersecurity measures in retail operations.
Details
2025-08-25 18:16:31 thehackernews NATION STATE ACTIVITY UNC6384 Targets Diplomats with Advanced PlugX Malware Campaign
UNC6384, linked to China's interests, has launched attacks targeting diplomats in Southeast Asia, utilizing advanced social engineering and valid code signing certificates to evade detection. The campaign, identified by Google's Threat Intelligence Group in March 2025, employs a captive portal hijack to deliver a digitally signed downloader called STATICPLUGIN. STATICPLUGIN facilitates in-memory deployment of PlugX, a backdoor capable of file exfiltration, keystroke logging, and remote command execution, often spread via USB drives and phishing emails. Attackers use adversary-in-the-middle tactics, redirecting web traffic through compromised edge devices, masquerading malware as an Adobe plugin update on a fake software update site. The downloader is signed by Chengdu Nuoxin Times Technology Co., Ltd, with over two dozen malware samples linked to China-nexus clusters, raising concerns about certificate acquisition methods. This campaign illustrates the evolving sophistication of UNC6384, showcasing the advanced techniques used by PRC-nexus threat actors to achieve strategic objectives.
Details
2025-08-25 17:55:54 thehackernews VULNERABILITIES Docker Addresses Critical Container Escape Vulnerability in Desktop App
Docker has patched a critical vulnerability, CVE-2025-9074, in its Desktop app for Windows and macOS, which could allow container escape with a CVSS score of 9.3. The flaw permits a malicious container to access the Docker Engine API without authentication, potentially leading to unauthorized host system access. Security researchers demonstrated that the vulnerability could enable attackers to mount the C:\ drive on Windows, gaining full host access, while macOS remains partially protected. The vulnerability does not affect Linux systems due to different API access methods, specifically using a named pipe instead of a TCP socket. Docker's advisory recommends upgrading to version 4.44.3 to mitigate the risk, emphasizing the importance of maintaining updated software. Security experts suggest that the simplest exploitation method involves deploying a threat actor-controlled container, with SSRF as an alternative vector. This incident stresses the need for robust authentication and access controls within container environments to prevent similar vulnerabilities.
Details
2025-08-25 16:42:02 bleepingcomputer MALWARE Malicious Android Apps with 19 Million Installs Removed from Google Play
Zscaler's ThreatLabs discovered 77 malicious Android apps with over 19 million installs on Google Play, delivering multiple malware families, including the Joker and Anatsa trojans. The Joker malware, found in nearly 25% of the apps, can read/send texts, take screenshots, make calls, and subscribe users to premium services without consent. Anatsa trojan's latest version targets 831 banking and cryptocurrency apps, using advanced evasion techniques and expanding its geographic reach to Germany and South Korea. Google has removed the identified malicious apps following Zscaler's report, emphasizing the importance of active Play Protect services for Android users. The discovery of these apps stresses the need for users to verify app publishers, read reviews, and limit permissions to essential functions only. The rise in adware and malware apps on Google Play indicates a growing threat landscape, requiring continuous vigilance and proactive security measures. Users with potential Anatsa infections should take additional steps with their banks to secure compromised e-banking credentials.
Details
2025-08-25 16:10:29 thehackernews MALWARE Phishing Campaign Uses UpCrypter to Deliver Remote Access Tools Globally
A phishing campaign has been identified using fake voicemails and purchase orders to distribute the UpCrypter malware loader, targeting sectors such as manufacturing, healthcare, and retail worldwide. The campaign's primary targets include countries like Austria, Belarus, Canada, Egypt, India, and Pakistan, with a focus on bypassing defenses and maintaining persistence. UpCrypter loads various remote access tools, including PureHVNC RAT, DCRat, and Babylon RAT, enabling attackers to control compromised systems fully. The infection chain begins with phishing emails that direct victims to fake landing pages designed to appear legitimate by displaying the victim's domain and logo. The downloaded payload is a ZIP archive containing obfuscated JavaScript, which connects to external servers to fetch additional malware while evading forensic detection. Techniques such as steganography and anti-analysis checks are employed to minimize detection and forensic traces, allowing the malware to operate covertly. The campaign is part of a broader trend exploiting trusted services like Google Classroom and Microsoft 365 to bypass security systems and deliver phishing emails effectively. Organizations are advised to enhance email security protocols and user awareness to mitigate risks associated with such sophisticated phishing tactics.
Details
2025-08-25 15:16:03 bleepingcomputer VULNERABILITIES Critical Docker Desktop Flaw Allows Host System Compromise
A critical vulnerability, CVE-2025-9074, in Docker Desktop for Windows and macOS allows host system compromise through malicious containers, rated at a severity of 9.3. The flaw involves a server-side request forgery (SSRF) that permits unauthorized access to the Docker Engine API from within a container, bypassing Enhanced Container Isolation (ECI). Security researcher Felix Boulet demonstrated the vulnerability, showing how a container could bind the Windows host’s C: drive using simple HTTP POST requests. Philippe Dugre confirmed the issue affects Docker Desktop on Windows and macOS, with Windows being more susceptible due to WSL2, enabling potential system DLL overwrites. On macOS, additional safeguards require user permission for directory access, reducing risk, yet attackers can still control applications and containers. Docker responded promptly to the vulnerability report, releasing version 4.44.3 to address the issue, emphasizing the importance of timely patch management. This incident underscores the critical need for robust container security practices and regular updates to mitigate potential exploits.
Details
2025-08-25 14:25:13 bleepingcomputer MALWARE Wazuh Enhances Defense Against Malware Persistence Techniques
The article discusses how malware persistence techniques allow attackers to maintain access to compromised systems, posing long-term security risks. Common techniques include scheduled tasks, boot scripts, system process modifications, and account manipulation, which enable continuous malicious activity. Wazuh, a security solution, provides tools like File Integrity Monitoring and Security Configuration Assessment to detect and mitigate persistence threats. The platform's Active Response module automates incident response, enhancing efficiency in managing security incidents and reducing dwell time. Wazuh's capabilities include vulnerability detection, log analysis, and system hardening, offering comprehensive protection against malware persistence. By leveraging Wazuh, organizations can improve their defense strategies, ensuring compliance with regulatory standards and reducing the risk of data breaches.
Details
2025-08-25 12:22:04 thehackernews VULNERABILITIES Password Manager Plugins Vulnerable to Clickjacking Exploits
Popular password manager plugins were found vulnerable to clickjacking, risking exposure of credentials, 2FA codes, and credit card details. The vulnerability, identified as DOM-based extension clickjacking, was presented by security researcher Marek Tóth at DEF CON 33. Affected password managers include Bitwarden, Dashlane, Enpass, KeePassXC-Browser, Keeper, LastPass, NordPass, ProtonPass, and RoboForm. As of August 22, these vendors have released patches to address the identified vulnerabilities. Organizations using these password managers should ensure all plugins are updated to the latest versions to mitigate risks. The incident emphasizes the need for continuous monitoring and swift patching of software to protect sensitive information.
Details
2025-08-25 11:52:42 thehackernews VULNERABILITIES Picus Blue Report Reveals Critical SIEM Detection Gaps in 2025
The Picus Blue Report 2025 analyzed over 160 million attack simulations, revealing that organizations only detect 1 in 7 simulated attacks, indicating significant detection vulnerabilities. Log collection failures are a primary issue, with 50% of detection rule failures in 2025 linked to problems in capturing comprehensive and reliable logs. Misconfigured detection rules, responsible for 13% of failures, result from incorrect thresholds and poorly constructed logic, leading to missed events and false positives. Performance issues, affecting 24% of detection failures, stem from resource-heavy rules and inefficient queries, slowing detection and delaying response times. Common log challenges include event coalescing and unavailable log sources, which prevent critical data from reaching SIEM systems, undermining threat detection capabilities. Continuous validation through real-world attack simulations is essential to ensure SIEM rules remain effective against evolving threats, reducing the risk of outdated defenses. Organizations must prioritize regular testing and tuning of SIEM rules to close detection gaps and protect critical assets from compromise.
Details