Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11798

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-07-29 13:55:31 bleepingcomputer CYBERCRIME FBI Confiscates $2.4 Million in Bitcoin From Chaos Ransomware Group
FBI Dallas seized approximately 20 Bitcoins valued over $2.3 million from a member of the Chaos ransomware operation. The seized cryptocurrency was traced back to an affiliate known as "Hors", linked to ransomware attacks on Texas companies. The U.S. Department of Justice filed a civil complaint on July 24, 2025, to seek the forfeiture of the seized funds now worth over $2,400,000. Civil forfeiture targets assets connected to criminal activities, seeking permanent ownership by the government. The Chaos ransomware group, believed to be a continuation of the BlackSuit ransomware group, evolved from the defunct Conti ransomware gang. Recent actions include the seizure of dark web extortion sites associated with BlackSuit by law enforcement. The investigation into the cryptocurrency wallet used by the group is part of broader law enforcement efforts against ransomware operations.
Details
2025-07-29 13:31:03 thehackernews MALWARE Chaos RaaS Demands $300K, Exploits Advanced Ransomware Tactics
Chaos, a new ransomware-as-a-service (RaaS) group, has emerged and is demanding $300,000 from its victims, primarily located in the U.S. Likely composed of ex-members of the BlackSuit crew, Chaos uses sophisticated methods such as double extortion and big-game hunting to execute its attacks. The group employs a mix of phishing, voice phishing, and exploitation of remote monitoring and management tools to gain and maintain access to victim networks. Techniques used include rapid, selective encryption, multi-layered anti-analysis to evade security measures, and the abuse of legitimate software for data exfiltration. Significant similarities in operational tactics suggest Chaos's ties to BlackSuit, and by extension to the infamous Conti ransomware lineage. The FBI and DOJ recently seized over $2.4 million in cryptocurrency from an associate of the Chaos group, indicating active law enforcement engagement against such cyber threats. Despite a wider drop in ransomware attacks in 2025 Q2, new groups like Chaos continue to present evolving threats in the cybersecurity landscape.
Details
2025-07-29 11:39:39 theregister MISCELLANEOUS UK MoD Integrates Esports to Boost Military Cyber Skills
The UK Ministry of Defence (MoD) has tasked the British Esports Federation to create a new esports tournament designed to enhance the digital and cyber skills of servicepeople. Recognizing esports as a military sport last year, the MoD views competitive gaming as a valuable tool for preparing troops for 21st-century challenges by improving team coordination and decision-making. Esports initiatives include installing gaming facilities on military vessels, such as the HMS Prince of Wales, to foster teamwork and strategic thinking akin to traditional sports. Lieutenant General Sir Tom Copinger-Symes highlighted how esports aid in warfighting readiness, helping personnel operate effectively in both physical and virtual battlegrounds. Inspired by the Ukrainian military's use of gaming technology to train drone operators and cybersecurity experts, the MoD sees potential for similar applications within the British armed services. The MoD aims to address a skills gap in cybersecurity among military personnel by promoting the use of esports and serious games, featuring an upcoming International Defence Esports Games in 2026. The role of video games and their relevance to modern military strategies, like drone operation, is increasingly recognized as crucial in training and operational preparedness.
Details
2025-07-29 11:30:25 thehackernews CYBERCRIME Shifting Cybersecurity Frontlines: The Browser as Battleground
Recent cyber-attacks have increasingly targeted digital identities managed through web browsers, exploiting the SaaS-based operational models prominent in modern enterprise IT. High-profile breaches, such as the Snowflake campaign and the activities of Scattered Spider, have underscored the shift towards identity-driven attacks, using stolen credentials and session tokens for unauthorized access. Attackers deploy numerous methods to obtain these credentials, including data breaches, phishing campaigns, and malicious browser extensions, capitalizing on unmitigated vulnerabilities in browser security. The primary tactics employed by hackers include sophisticated phishing operations that leverage detection evasion techniques and exploit alternative authentication methods, bypassing traditional security measures like MFA. Security responses lag behind attackers’ tactics, often due to the complexity and variability of account settings across different applications, making comprehensive oversight challenging. The browser, as a central point where both identities are accessed and attacks occur, presents an opportunity for security teams to monitor and intercept identity-based threats effectively. Comprehensive browser-based security platforms like Push Security are crucial in detecting, blocking, and mitigating identity attacks by providing real-time intelligence and proactive vulnerability management within the browser environment.
Details
2025-07-29 11:15:27 thehackernews MALWARE Extensive Mobile Malware Campaign Targets Users in Asia
Cybersecurity experts have identified a massive malware campaign, dubbed SarangTrap, aimed at Android and iOS users through counterfeit apps mimicking dating and social platforms. Over 250 malicious Android apps and 80 domains have been crafted to look like genuine apps and sites, tricking users into downloading malware which then exfiltrates sensitive data like contact lists and images. The malware acquires invasive access to device data under the guise of delivering promised functionalities, capturing SMS messages, contacts, and files through deceptive permissions. iOS users are tricked into installing nefarious mobile configuration profiles which facilitate further infections, emphasizing the cross-platform nature of the threat. The attackers also engage in blackmail, threatening to share private data and videos with victims' contacts, employing psychological manipulation. Continuous development of the malware underscores an active threat, with new versions focusing on collecting only specific types of data to avoid detection. The campaign leverages social engineering, frequently using emotional lures like the promise of companionship, to trick users into installing these harmful apps. Recommendations for mitigation include caution with app permissions, avoidance of unofficial app sources, and regular reviews of installed device profiles and permissions.
Details
2025-07-29 10:03:24 thehackernews CYBERCRIME Advanced JavaScript Injection Techniques Challenge React Security
Attackers are bypassing frameworks like React, exploiting AI-generated code, prototype pollution, and supply chain vulnerabilities. A significant JavaScript injection attack in June 2024 compromised over 100,000 websites via Polyfill.io after a malicious acquisition. JavaScript injection attacks have become more sophisticated, utilizing methods like dangerousSetInnerHTML in React that bypass built-in XSS protections. The report indicates a 30% increase in CVEs by mid-2024 compared to 2023, highlighting a growing security concern as JavaScript usage soars. JavaScript web injections targeting the banking sector dynamically adjust tactics in real-time to steal user credentials, affecting over 40 banks globally. Traditional security practices are insufficient; a defense-in-depth approach that includes sanitizing user input is crucial. The guide emphasizes storing raw data and encoding output based on context, ensuring robust security against multiple encoding vulnerabilities. Emerging threats include AI-driven prompt injection attacks that trick AI models into generating malicious JavaScript code.
Details
2025-07-29 04:51:52 thehackernews CYBERCRIME CISA Identifies Critical CSRF Vulnerability in PaperCut Software
CISA has added a severe CSRF vulnerability in PaperCut NG/MF software to its KEV catalog due to active exploitation. The bug, labeled CVE-2023-2533 with a CVSS score of 8.4, allows for potential remote code execution. PaperCut NG/MF is widely utilized in educational institutions, businesses, and government entities for managing printing services. Attackers can exploit this vulnerability by deceiving an admin into clicking a malicious link, which may lead to unauthorized configuration changes or arbitrary code execution. There's no available public proof-of-concept, but the exploitation likely involves tricking a logged-in administrator via phishing or malicious websites. Federal agencies are mandated to update their software to a secured version by August 18, 2025, as per Binding Operational Directive (BOD) 22-01. Organizations are advised to patch the vulnerability, review session management, limit admin access based on IP, and enforce CSRF token validation. Enhanced monitoring using MITRE ATT&CK tactics such as Exploit Public-Facing Application and Application Layer Protocol is recommended.
Details
2025-07-29 02:41:35 bleepingcomputer CYBERCRIME Lovense Sex Toy App Flaw Exposes Users' Email Addresses
Lovense, an interactive sex toy manufacturer, is vulnerable due to a zero-day flaw that allows attackers to access users' email addresses. Attackers can exploit the flaw by using publicly known usernames paired with a simple scripting process, completed in less than a second per user. The vulnerability involves manipulating the XMPP chat system and backend API endpoints to extract real email addresses from disguised server responses. Despite disclosure of this issue and another critical account hijacking vulnerability on March 26, 2025, Lovense has only resolved the hijacking issue. The email exposure flaw remains and is anticipated to take 14 months to fix due to concerns with breaking app compatibility. Security researchers were compensated $3,000 for disclosing these vulnerabilities but criticized Lovense's approach to patch management and user security. Users are at risk of privacy breaches, doxxing, and harassment due to this persistent vulnerability in the Lovense platform.
Details
2025-07-28 22:45:34 theregister DATA BREACH Microsoft Uncovers Critical Apple macOS Data Leak Flaw
Microsoft revealed a previously patched vulnerability in Apple's macOS Sequoia that could enable data theft, including sensitive user details like geolocation and photo metadata. Tracked as CVE-2025-31199, the flaw was initially reported by Microsoft to Apple, which subsequently issued a fix in March. The vulnerability allowed exploitation through macOS's Spotlight feature, transforming plugins into a method for bypassing system privacy protections. The flaw, named "Sploitlight" by Microsoft, could lead to severe privacy invasions, such as stalking or harassment, by revealing detailed personal information. Apple devices connected to iCloud could sync sensitive data across devices, expanding the potential impact of a single compromised device. Despite Apple's immediate response with a patch, the flaw's disclosure coincides with Microsoft's struggles with its own security issues, including widespread exploitation of SharePoint vulnerabilities. The timing of Microsoft's disclosure, amidst its security patch failures, hints at a possible deflection from its cybersecurity challenges.
Details
2025-07-28 21:28:31 theregister MISCELLANEOUS Growing Cyber Threats Overwhelm Unprepared Security Teams
A study commissioned by Google Cloud and conducted by Forrester Consulting found that security teams are inundated with threat intelligence data, with 61% of respondents feeling overwhelmed. Of the survey participants, 60% reported a shortage of skilled security analysts to properly analyze and respond to the influx of data. The excessive volume of threat information makes it difficult for companies to verify threat validity and take actionable steps, increasing the risk of cyberattacks. Many organizations adopt a reactive rather than proactive approach to cybersecurity; 72% of respondents admitted their organizations are mostly reactive. The manufacturing sector is particularly concerned about missing real threats due to data overload, with 89% of respondents in this industry expressing concern. The most significant threats over the next 12 months include phishing and credential theft, ransomware, and AI prompt injections. The report highlights the need for security leaders to treat threat intelligence as a capability by integrating analysis, contextualization, and alignment with real-world threats into their processes. Recommendations urge security leaders to implement threat-intel tools and services based on specific intelligence requirements and business use cases to provide actionable insights.
Details
2025-07-28 21:03:44 bleepingcomputer DATA BREACH Extensive Leak of Women's Safety App Data Exposes Private Messages
A significant data breach affected the Tea app, compromising over 59 GB of data including private user chats. An additional exposure revealed another database with 1.1 million recent messages discussing sensitive personal issues. Personal details, such as selfies, driver’s licenses, and government IDs used for account verification, were leaked from an unsecured storage unit. The stolen data, including intimate private messages, has been shared on hacking forums, increasing the risk of social engineering attacks. The breach originally stemmed from a legacy data storage system vulnerability, impacting users registered before February 2024. Tea has enlisted the help of cybersecurity experts and notified law enforcement to manage the breach and prevent further data leaks. The breach not only compromises personal privacy but also the app's purpose as a safe space for women discussing sensitive topics.
Details
2025-07-28 19:46:19 bleepingcomputer MALWARE Stealth Exploit in Google's Gemini CLI Allows Undetected Code Execution
Google's Gemini CLI was found vulnerable to a stealthy code execution exploit using README.md and GEMINI.md files. Security firm Tracebit uncovered the flaw, enabling attackers to execute commands silently by manipulating code in project files. The vulnerable mechanism involved a poorly handled allow-list, which failed to adequately authenticate commands labeled as safe. Attackers could inject malicious commands that appeared innocuous, tricking the CLI into executing dangerous operations without user consent. Tracebit's proof of concept showed how seemingly benign operations could mask harmful actions, such as data exfiltration. Google fixed the vulnerability in an update released on July 25, urging developers to update their software immediately. Tracebit confirmed that similar AI coding tools from OpenAI and Anthropic were tested but found not vulnerable due to stronger allow-list controls.
Details
2025-07-28 18:53:17 bleepingcomputer MALWARE Malware Infected Endgame Gear’s Mouse Configuration Tool
Endgame Gear reported that its configuration tool for the OP1w 4k v2 mouse was infected with malware from June 26 to July 9, 2025, due to a breach on its website. The malware was present only in downloads from the specific product page and not from other distribution points like GitHub or Discord. The compromised installer was distinguished by an increased file size and an abnormal file description, suggesting a trojanized version. The malware, identified in user reports as the XRed backdoor, includes capabilities for keylogging, remote access, and data exfiltration. Endgame Gear advises affected users to delete specific files, run a comprehensive antivirus scan, and change passwords on sensitive accounts. The company plans to enhance security measures by discontinuing separate download pages and adding SHA hash verification and digital signing to all hosted files. This incident emphasizes the need for ongoing vigilance and security in software distribution even from respected manufacturers.
Details
2025-07-28 18:04:17 bleepingcomputer MALWARE Microsoft Discovers macOS Vulnerability Leaking Sensitive Data
Microsoft identified a macOS flaw, CVE-2025-31199, that bypasses Apple's TCC security checks, allowing unauthorized access to sensitive user data. The vulnerability, named Sploitlight, was exploited through Spotlight plugins to steal data including geolocation, face recognition data, and iCloud-linked device information. Apple has released patches for this vulnerability in macOS Sequoia 15.4, enhancing the data redaction processes to prevent such breaches. The flaw is particularly dangerous as it can also reveal remote information about devices linked to the same iCloud account. Past TCC bypasses reported by Microsoft security researchers include those exploited by Time Machine mounts, environment variable poisoning, and bundle inclusion flaws. Microsoft’s findings underscore ongoing security challenges in macOS environments and the critical need for continuous system updates and patches.
Details
2025-07-28 17:35:33 thehackernews MALWARE Hackers Compromise Toptal GitHub, Distribute Malicious npm Packages
Unknown hackers breached Toptal's GitHub organization account, compromising software integrity. Leveraged access to publish 10 malicious npm packages aimed at exfiltrating GitHub authentication tokens and destroying victim systems. Approximately 5,000 downloads occurred before malicious packages were detected and removed. Attack targeted specific scripts within npm packages to conduct unauthorized operations on both Windows and Linux systems. Several potential breach causes speculated, including credential compromise or insider threats. Incident occurred alongside other supply chain attacks involving npm and the Python Package Index (PyPI), spreading malware and surveillanceware. Followed a separate compromise involving a Visual Studio Code extension that aimed to delete user files and AWS resources. Immediate actions included revocation of compromised credentials and restoration of safe versions of affected packages.
Details