Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11792

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-08-08 07:38:07 bleepingcomputer CYBERCRIME Royal and BlackSuit Ransomware Groups Breach 450 US Companies
The U.S. Department of Homeland Security reported that Royal and BlackSuit ransomware groups compromised over 450 U.S. companies before their takedown. These cybercriminals targeted sectors including healthcare, education, public safety, energy, and government, extracting over $370 million in ransom payments. The ransomware operations employed double-extortion tactics, encrypting systems and threatening to leak stolen data to pressure victims into paying. Operation Checkmate, a collaborative international law enforcement effort, led to the seizure of BlackSuit’s dark web extortion domains. Initially linked to the Conti syndicate, the group evolved from using others' encryptors to developing their own, rebranding as Royal and later BlackSuit. Cisco Talos researchers suggest the group may now be rebranding as Chaos ransomware, continuing double extortion attacks with advanced social engineering techniques. The new Chaos ransomware operation reportedly uses voice-based social engineering and targets both local and remote storage for maximum impact.
Details
2025-08-08 07:21:37 thehackernews CYBERCRIME GreedyBear Campaign Exploits Malicious Extensions to Steal Cryptocurrency
GreedyBear has stolen over $1 million in cryptocurrency using more than 150 malicious Firefox extensions, targeting popular wallets like MetaMask and TronLink. The campaign employs "Extension Hollowing," a technique to bypass Mozilla's security checks by initially uploading benign extensions and later modifying them with malicious code. The fake extensions capture wallet credentials and IP addresses, sending data to a command-and-control server linked to a single IP address. GreedyBear's operation includes scam sites posing as cryptocurrency services and distributing malware through Russian sites offering pirated software. Evidence suggests the campaign is expanding to other browser marketplaces, with a similar attack detected on a Google Chrome extension. AI-powered tools are suspected in the creation of these malicious extensions, showcasing the increasing misuse of AI in cybercrime. The campaign's scale and scope have evolved, indicating a sophisticated and adaptable malware distribution network targeting cryptocurrency assets.
Details
2025-08-08 06:53:23 theregister MISCELLANEOUS UK's Online Safety Act Faces Challenges and Privacy Concerns
The UK's Online Safety Act aims to enhance online safety, particularly for children, by enforcing age verification and content restrictions on platforms like Spotify and Discord. Companies face potential penalties of up to 10% of global revenue or service blocks if they fail to comply, prompting widespread adoption of age-restriction measures. The Wikimedia Foundation expresses concerns over potential data breaches and privacy risks, fearing exposure of editor identities under the Act's stringent requirements. Critics, including the Electronic Frontier Foundation, argue that mandatory age verification tools threaten privacy and free speech, potentially causing more harm than protection. The Act has driven a surge in VPN usage, with ProtonVPN reporting a 1,400% increase in UK sign-ups, as users seek to bypass age verification requirements. The Age Verification Providers Association claims to conduct 5 million age checks daily, assuring data safety, though privacy concerns persist over data storage practices. Comparisons to historical prohibition efforts suggest that restrictive measures may lead to circumvention rather than compliance, questioning the Act's long-term effectiveness.
Details
2025-08-07 23:27:41 theregister VULNERABILITIES Researchers Reveal Critical Satellite Software Vulnerabilities at Black Hat
German researchers from VisionSpace Technologies demonstrated vulnerabilities in satellite and ground station software at the Black Hat conference, highlighting potential risks to space infrastructure. The presentation showcased how software flaws in applications like Yamcs and OpenC3 Cosmos could allow unauthorized control over satellite operations. Critical vulnerabilities were identified, including remote code execution and denial-of-service attacks, which could disrupt satellite functionality and control. The researchers found multiple CVEs in NASA's open-source software, affecting both satellite communication and encryption libraries. The vulnerabilities, while alarming, have been responsibly disclosed and addressed, mitigating immediate threats to satellite systems. The findings stress the need for robust security measures in satellite software to prevent potential exploitation and ensure the integrity of space assets. The rapid increase in satellite numbers, driven by commercial and military interests, underscores the urgency for enhanced cybersecurity protocols in space operations.
Details
2025-08-07 21:46:19 bleepingcomputer MALWARE Malicious NPM Packages Target WhatsApp Developers with Data-Wiping Code
Researchers at Socket identified two NPM packages, naya-flore and nvlore-hsc, masquerading as WhatsApp development tools, which deploy destructive data-wiping code on developers' systems. These packages were downloaded over 1,100 times, posing a significant risk to developers using them for WhatsApp Business API integrations. The malicious code executes a 'rm -rf *' command, recursively deleting files on affected systems, while excluding certain Indonesian phone numbers from this action. Although Socket filed takedown requests, the packages remain available, and the publisher has submitted additional non-malicious packages that could potentially be weaponized. A dormant data exfiltration function exists within the packages, capable of extracting sensitive information, though it is currently disabled. In related findings, 11 malicious Go packages were discovered, using obfuscation techniques to execute remote payloads, affecting Linux CI servers and Windows workstations. Developers are advised to exercise extreme caution and thoroughly vet third-party libraries to mitigate risks of inadvertent code execution or data loss.
Details
2025-08-07 20:29:21 theregister VULNERABILITIES Critical Flaw Found in Microsoft's Windows Hello Biometric System
German researchers identified a critical vulnerability in Microsoft's Windows Hello system, allowing unauthorized biometric data injection, potentially compromising business security. The flaw enables local administrators or compromised accounts to insert facial or fingerprint scans, bypassing standard authentication protocols. The vulnerability affects business users relying on Hello for authentication with platforms like Entra ID and Active Directory. Microsoft's Enhanced Sign-in Security (ESS) can block the attack but is not universally supported across all devices. Researchers demonstrated the exploit at Black Hat, showcasing the ease of bypassing Hello's protections with minimal code. A comprehensive fix requires significant code changes or leveraging TPM modules, but feasibility remains uncertain. Users are advised to disable biometrics in favor of PINs if using Hello without ESS, pending further updates from Microsoft. The research, backed by Germany's Federal Office for IT Security, is ongoing, with more findings anticipated next spring.
Details
2025-08-07 20:20:25 bleepingcomputer VULNERABILITIES CISA Mandates Urgent Patch for Critical Microsoft Exchange Flaw
CISA has issued an emergency directive for Federal Civilian Executive Branch agencies to address a critical Microsoft Exchange vulnerability, CVE-2025-53786, by Monday morning. The flaw allows attackers with administrative access to on-premises Exchange servers to infiltrate Microsoft cloud environments, risking complete domain compromise. Impacted systems include Microsoft Exchange Server 2016, 2019, and Subscription Edition, with potential lateral movement into cloud environments. Microsoft has provided a hotfix and guidance for mitigation, but manual actions are necessary to fully secure systems. Security researcher Dirk-Jan Mollema demonstrated the vulnerability at Black Hat, coordinating disclosure with Microsoft and CISA. Agencies must update systems, apply the hotfix, and switch to a dedicated service principal to prevent exploitation. While the directive targets federal agencies, CISA strongly advises all organizations using Microsoft Exchange to implement the recommended mitigations. Failure to address this vulnerability could lead to severe security breaches, affecting both government and private sector entities.
Details
2025-08-07 18:34:10 thehackernews MALWARE SocGholish Malware Utilizes Ad Tools to Facilitate Cybercrime Networks
SocGholish malware, a JavaScript loader, is distributed via compromised websites, posing as browser or software updates to deceive users into downloading malicious payloads. The malware operates under a Malware-as-a-Service model, selling access to infected systems to cybercriminal groups, including Evil Corp, LockBit, Dridex, and Raspberry Robin. Traffic Distribution Systems like Parrot TDS and Keitaro TDS are employed to redirect web traffic to malicious sites, filtering users based on predefined criteria to maximize infection rates. Keitaro TDS, while having legitimate uses, complicates blocking efforts due to its dual-use nature, leading to potential false positives in network defenses. Recent campaigns show Raspberry Robin being used as a distribution vector for SocGholish, indicating collaboration among threat actors to enhance malware spread. Technical advancements in Raspberry Robin include improved obfuscation, changes in network communication, and a new local privilege escalation exploit, CVE-2024-38196. The ongoing evolution of malware like DarkCloud Stealer, which uses advanced obfuscation and process hollowing, reflects a broader trend in cyber threats adapting to evade detection. Organizations are advised to update security policies and employ robust detection mechanisms to mitigate risks associated with these evolving threats.
Details
2025-08-07 18:05:22 bleepingcomputer CYBERCRIME New EDR Bypass Tool Utilized by Multiple Ransomware Groups
A sophisticated EDR killer tool, an evolution of 'EDRKillShifter,' has been deployed by eight ransomware groups, including RansomHub and Medusa, to disable security systems. The tool employs a heavily obfuscated binary, self-decoding at runtime, injected into legitimate applications to evade detection and escalate privileges. It targets security vendors like Sophos, Microsoft Defender, and Kaspersky by using a 'bring your own vulnerable driver' attack to gain kernel privileges. The tool masquerades as legitimate files, such as the CrowdStrike Falcon Sensor Driver, to disable AV/EDR processes and stop security services. Variants of this tool, differing in driver names and build characteristics, suggest a collaborative framework among threat groups, rather than a single leaked binary. Sophos notes the tool's development involves shared knowledge and resources among competing ransomware operators, a common practice in the cybercrime landscape. Complete indicators of compromise for this EDR killer tool are publicly available, aiding in defensive measures against these sophisticated attacks.
Details
2025-08-07 17:58:22 theregister VULNERABILITIES Microsoft and CISA Urge Immediate Action on Exchange Server Flaw
Microsoft and CISA have issued warnings about a critical Exchange Server vulnerability, CVE-2025-53786, which could lead to a total domain compromise in hybrid deployments. Although no active exploits have been reported, the bug is considered highly likely to be targeted, prompting urgent mitigation measures. The vulnerability affects hybrid Exchange setups due to shared identity authentication between on-premises and cloud environments, allowing privilege escalation. CISA has mandated that government agencies address this issue by August 11, emphasizing the urgency of the situation. Organizations are advised to apply the April Hotfix and follow specific configuration steps to secure their Exchange environments. This flaw follows a series of security challenges for Microsoft, including previous breaches by state actors and financially motivated attackers. The vulnerability's exploitation requires existing administrative access, but successful attacks could be stealthy and difficult to detect. The incident underscores the importance of robust security measures and timely patch management in hybrid cloud deployments.
Details
2025-08-07 17:26:11 bleepingcomputer DATA BREACH Bouygues Telecom Data Breach Exposes 6.4 Million Customer Records
Bouygues Telecom, a major French telecom provider, experienced a data breach affecting 6.4 million customers, exposing personal information but not credit card details or account passwords. The breach was executed by a known cybercriminal group targeting specific internal resources; the company has since blocked access and enhanced security measures. The incident occurred on August 4, 2025, with Bouygues Telecom swiftly resolving the situation and notifying relevant French authorities, including ANSSI and CNIL. Impacted customers are at increased risk of fraud and phishing; they are advised to remain vigilant against unsolicited requests for sensitive information. Bouygues Telecom is proactively informing affected customers via SMS and email, urging them to monitor bank accounts for suspicious activities. This breach follows a similar incident at Orange, another French telecom provider, indicating a potential trend of targeted attacks on European telecoms. The breach reflects broader cybersecurity threats faced by telecom companies globally, with parallels drawn to attacks by Chinese cyber-espionage groups.
Details
2025-08-07 15:31:47 bleepingcomputer VULNERABILITIES SonicWall Addresses Exploitation of 2024 SSLVPN Vulnerability in Gen 7 Firewalls
SonicWall confirmed that recent Akira ransomware attacks exploit a known vulnerability, CVE-2024-40766, in Gen 7 firewalls, dismissing initial concerns of a zero-day flaw. CVE-2024-40766 is a critical access control vulnerability in SonicOS, allowing unauthorized access and session hijacking, which was disclosed and patched in August 2024. The vulnerability has been exploited by ransomware groups like Akira and Fog, targeting networks that failed to implement recommended security measures during firewall migrations. SonicWall advises disabling SSL VPN services and limiting access to trusted IPs, while urging users to update to firmware version 7.3.0 or later for enhanced security. Customers are recommended to reset all local user passwords, particularly those for SSLVPN, to mitigate risks associated with the vulnerability. Some users have expressed skepticism about SonicWall's claims, noting discrepancies between their experiences and the vendor's statements, highlighting the need for continued vigilance. SonicWall's communication strategy and the ambiguity in its updates have led to uncertainty, stressing the importance of immediate action on recommended security measures.
Details
2025-08-07 15:06:54 theregister MISCELLANEOUS Inside Black Hat's Network Operations Center: A Unique Cybersecurity Hub
Black Hat's Network Operations Center (NOC) operates independently to meet the high-security demands of the conference, staffed by volunteers and equipped with cutting-edge technology. The NOC team, comprised of volunteers from various tech backgrounds, works in shifts to monitor and mitigate potential threats, ensuring the stability and security of the conference network. A notable incident involved the FBI when the NOC detected a private detective trailing an attendee, highlighting the NOC's role in addressing both digital and physical security concerns. The NOC frequently encounters malicious activity during the conference, often generated by attendees practicing newly learned hacking techniques, necessitating real-time intervention. Vendors donate hardware and expertise, with rigorous selection criteria ensuring only the most effective tools are employed, fostering collaboration even among industry rivals. The NOC's proactive approach includes sandboxing networks for training sessions and developing custom software to visualize network traffic and identify threats efficiently. The collaborative environment at Black Hat's NOC not only enhances security but also serves as a learning platform for volunteers and vendors, driving innovation and improvement in cybersecurity practices.
Details
2025-08-07 14:34:07 theregister VULNERABILITIES CISA Releases Analysis on Critical SharePoint Server Vulnerabilities
CISA has published a detailed report on "ToolShell" attacks exploiting vulnerabilities in Microsoft SharePoint Server, affecting over 400 organizations, including the U.S. Department of Energy. The report identifies a critical vulnerability, CVE-2025-53770, with a CVSS score of 9.8, enabling remote code execution via untrusted data deserialization. Threat actors, including APT groups like Linen Typhoon and Violet Typhoon, have exploited this vulnerability to gain unauthorized access to sensitive systems. The report includes analysis of six malicious files and introduces "SharpyShell," a stealthy web shell used for exfiltrating cryptographic secrets. CISA provides Sigma rules for detecting exploitation attempts, advising organizations to ensure their EDR/SIEM systems can handle the complex queries. The vulnerability was possibly leaked following its disclosure at the Pwn2Own contest, raising concerns about the security of vulnerability reporting processes. Organizations are urged to review CISA's report and apply the provided indicators of compromise and detection rules to safeguard their systems.
Details
2025-08-07 14:06:51 bleepingcomputer MALWARE GreedyBear Campaign Targets Firefox Users with Malicious Crypto Extensions
Koi Security identified the 'GreedyBear' campaign, which infiltrated Mozilla's add-ons store with 150 malicious extensions, stealing approximately $1,000,000 from Firefox users. The extensions impersonated popular cryptocurrency wallets like MetaMask and TronLink, initially appearing benign before injecting malicious code to capture wallet credentials. Attackers utilized keylogging techniques within the extensions to exfiltrate user credentials and IP addresses to a remote server, facilitating further tracking and targeting. The operation also involved Russian-speaking pirated software sites distributing 500 malware variants, including trojans and ransomware, linked to a single command-and-control hub. Mozilla has removed the malicious extensions, but the campaign's scale and AI-driven tactics highlight the ease of executing large-scale cyber schemes. Despite Mozilla's detection systems, fraudulent extensions continue to appear, with signs of expansion to the Chrome Web Store already detected. Users are advised to verify extension authenticity by checking reviews and details, and to download official wallet extensions directly from project websites.
Details