Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12589

Checks for new stories every ~15 minutes

Title Summary
ROWS
2026-01-29 07:22:51 thehackernews CYBERCRIME Google and Partners Dismantle Major Residential Proxy Network IPIDEA
Google, in collaboration with partners, has dismantled IPIDEA, a large residential proxy network, by taking legal action and shutting down its controlling domains. IPIDEA's network, which boasted over 6.1 million daily updated IP addresses, was used by more than 550 threat groups for cybercrime and espionage activities. The network exploited residential proxy services to mask malicious activities, affecting consumer devices worldwide, including those in China, North Korea, Iran, and Russia. Threat actors used IPIDEA to execute password spray attacks and infiltrate SaaS environments, leveraging compromised IoT devices to propagate malware. Google filed a lawsuit against unidentified operators in China, targeting the botnet and proxy infrastructure linked to IPIDEA. The network's SDKs were embedded in various applications, turning consumer devices into proxy nodes and posing significant security risks. Google has enhanced Google Play Protect to warn users and remove apps containing IPIDEA code from certified Android devices, aiming to mitigate future threats.
Details
2026-01-28 23:33:14 bleepingcomputer MALWARE TA584 Expands Operations Using Tsundere Bot for Ransomware Attacks
TA584, an initial access broker, has adopted the Tsundere Bot and XWorm trojan to facilitate network access potentially leading to ransomware incidents. Proofpoint researchers have monitored TA584 since 2020, noting a recent surge in activity and a sophisticated attack chain that challenges static detection methods. Tsundere Bot, linked to Russian-speaking operators, enables data exfiltration, lateral movement, and additional payload installation, posing a significant threat. The attack chain involves emails from compromised accounts via SendGrid and Amazon SES, directing targets through geofenced and IP-filtered URLs to execute malicious PowerShell commands. Tsundere Bot operates as malware-as-a-service, utilizing Node.js and retrieving command-and-control addresses from the Ethereum blockchain, with fallback options embedded. The malware aborts execution in CIS countries, collects system data, executes JavaScript from C2, and uses infected systems as SOCKS proxies. TA584's expanded targeting now includes Germany, other European countries, and Australia, with expectations of further payload experimentation. Organizations should enhance email security measures and monitor for unusual network activity to mitigate risks associated with this evolving threat.
Details
2026-01-28 22:21:46 bleepingcomputer NATION STATE ACTIVITY Russian-Linked Electrum Group Targets Polish Energy Infrastructure
A coordinated cyberattack on Poland's energy grid impacted approximately 30 facilities, targeting distributed energy resources like combined heat and power, wind, and solar systems. Despite significant equipment damage, the attack did not disrupt power supply, which constitutes 5% of Poland's energy capacity, highlighting the resilience of the grid. Dragos, an OT and ICS security firm, attributes the attack to the Russian threat actor Electrum, known for its overlap with Sandworm but identified as a distinct entity. Electrum employed sophisticated tactics, exploiting vulnerabilities in dispatch systems, RTUs, and network edge devices, demonstrating deep operational knowledge. While power generation continued, the attack disabled communications and monitoring systems, compromising OT/ICS devices and wiping Windows systems at affected sites. The attack serves as a warning about the vulnerabilities in decentralized energy systems, especially during winter when civilian populations are most reliant on stable power supply. Although the attack's scope was limited, it posed a risk of destabilizing system frequency, potentially leading to cascading failures similar to past incidents in other regions.
Details
2026-01-28 21:29:05 theregister CYBERCRIME FBI Seizes RAMP Forum, Disrupting Major Ransomware Marketplace
The FBI, in collaboration with the US Attorney's Office, has seized the domains of the RAMP cybercrime forum, a key platform for ransomware gangs and digital criminals. RAMP, known as the Russian Anonymous Marketplace, was a hub for ransomware-as-a-service operations, extortionists, and initial access brokers. The seizure notice humorously included a banner stating "The Only Place Ransomware Allowed!" alongside a winking character from Russian animation. Although the forum's shutdown disrupts a major criminal infrastructure, experts predict users will migrate to other underground marketplaces. The takedown offers law enforcement and cybersecurity teams rare insights into criminal networks, potentially aiding in future operations. Threat actors face increased risks during this transition, including loss of reputation and operational exposure as they seek new platforms. Groups such as Nova and DragonForce are reportedly moving activities to alternative forums like Rehub, demonstrating the cybercrime ecosystem's resilience.
Details
2026-01-28 21:03:06 bleepingcomputer DATA BREACH eScan Antivirus Update Server Breach Leads to Malicious Software Distribution
MicroWorld Technologies confirmed a breach of its eScan antivirus update server, resulting in a malicious update being distributed to a subset of customers on January 20, 2026. The breach involved unauthorized access to a regional update server, leading to a corrupted file being placed in the update distribution path for two hours. eScan has isolated and rebuilt the affected infrastructure, rotated authentication credentials, and provided remediation to impacted customers. Security firm Morphisec reported detecting malicious activity linked to the update, involving a modified "Reload.exe" file used to deploy multi-stage malware. The malicious update utilized eScan's legitimate infrastructure, with the altered file signed by an invalid code-signing certificate, enabling persistence and command execution. eScan disputes Morphisec's claims of being the first to discover the breach, asserting internal detection and customer notifications were conducted promptly. Both eScan and Morphisec recommend blocking identified command and control servers to enhance security and prevent further malicious activity. The incident highlights the importance of securing update infrastructures to prevent unauthorized access and potential exploitation by threat actors.
Details
2026-01-28 20:29:52 bleepingcomputer VULNERABILITIES Insecure Moltbot Deployments Risk Data Leaks and Credential Theft
Security researchers have identified vulnerabilities in Moltbot AI assistant deployments, risking exposure of API keys, OAuth tokens, and user credentials in enterprise environments. Moltbot, an open-source AI assistant, integrates deeply with user systems, running locally on devices and interacting with apps and files, increasing its popularity and potential risk. Misconfigured reverse proxies have led to exposed admin interfaces, allowing unauthorized access to sensitive data and system commands, as reported by pentester Jamieson O’Reilly. O'Reilly demonstrated a supply-chain attack by promoting a malicious skill on MoltHub, quickly downloaded by developers worldwide, revealing vulnerabilities in the platform's ecosystem. Token Security reports that 22% of its enterprise clients have employees using Moltbot without IT approval, raising concerns over unregulated access and data security. Security firms warn that malware like RedLine and Lumma may target Moltbot's local storage, emphasizing the need for secure deployment practices, including virtual machine isolation. Experts advise isolating Moltbot instances and configuring strict firewall rules to mitigate risks, highlighting the importance of cautious deployment and ongoing security assessments.
Details
2026-01-28 19:02:57 theregister VULNERABILITIES Ongoing Exploitation of WinRAR Vulnerability by Cybercriminals and State Actors
The CVE-2025-8088 vulnerability in WinRAR, patched in July, is actively exploited by various cyber actors, including state-sponsored and financially motivated groups. The flaw, a path traversal issue, allows attackers to hide malware using Alternate Data Streams, impacting military, government, and technology sectors. Russian-aligned groups like RomCom, APT44, Temp.Armageddon, and Turla are targeting Ukrainian entities with geopolitical lures exploiting this vulnerability. A Chinese group is using the vulnerability to deliver PoisonIvy RAT, while criminal gangs target sectors like hospitality and finance with phishing campaigns. Despite the patch, the vulnerability remains a lucrative target for cybercriminals, with exploits being sold on dark web forums by individuals like "zeroplayer." Zeroplayer's offerings include high-priced zero-day exploits for various platforms, indicating a thriving underground market for sophisticated attack tools. Organizations are advised to update WinRAR to the latest version and enhance monitoring for suspicious activities to mitigate potential threats.
Details
2026-01-28 17:52:28 thehackernews MALWARE Fake Moltbot AI Extension on VS Code Deploys Malware
A malicious Visual Studio Code extension, posing as an AI coding assistant, was identified and removed from the VS Code Marketplace after deploying malware on user systems. The extension, "ClawdBot Agent AI Coding Assistant," exploited Moltbot's popularity, tricking developers into installing it, leading to unauthorized remote access on their devices. Upon installation, the extension executed a binary that deployed a legitimate remote desktop program, ConnectWise ScreenConnect, granting attackers persistent access. Attackers established a ScreenConnect relay server, distributing a pre-configured client installer through the extension, ensuring immediate connection to their infrastructure. The extension included fallback mechanisms, using a DLL written in Rust to maintain payload delivery even if primary command-and-control servers were unreachable. Security researchers found numerous misconfigured Moltbot instances online, exposing sensitive data and enabling potential impersonation and data exfiltration by attackers. Users are advised to audit their Moltbot configurations, revoke service integrations, and implement network controls to mitigate risks associated with default settings.
Details
2026-01-28 17:52:28 bleepingcomputer VULNERABILITIES Critical Vulnerabilities in n8n Platform Expose Instances to RCE Risks
Two critical vulnerabilities, CVE-2026-1470 and CVE-2026-0863, in the n8n workflow automation platform could allow attackers to gain full control over affected instances. CVE-2026-1470, with a severity score of 9.9, permits arbitrary code execution on the main node, requiring authentication but still posing a significant threat. The vulnerabilities affect self-hosted n8n instances, with the cloud platform already patched; users are urged to update to the latest versions immediately. JFrog researchers highlight the challenges of securely sandboxing dynamic languages like JavaScript and Python, even with multiple security layers in place. The slow patching rate is concerning, with 39,900 instances still exposed as of late January, despite initial disclosures earlier in the month. A proof-of-concept exploit for CVE-2026-0863 is expected, potentially increasing the risk of targeted attacks on vulnerable self-hosted deployments. Organizations relying on n8n for task automation should prioritize patching and review access controls to mitigate potential security breaches.
Details
2026-01-28 17:44:31 bleepingcomputer CYBERCRIME FBI Seizes RAMP Forum, Disrupting Ransomware Operations Network
The FBI has taken control of the RAMP cybercrime forum, a key platform for ransomware gangs, in collaboration with the U.S. Attorney's Office and the Department of Justice. Both the forum's Tor site and clearnet domain now display an FBI seizure notice, potentially deterring future cybercriminal activities. Law enforcement now possesses access to extensive user data from the forum, including email and IP addresses, which could lead to further arrests. RAMP was launched in July 2021 by Mikhail Matveev, known as Orange, after the banning of ransomware promotions on other Russian-speaking forums. The forum served as a hub for ransomware groups to recruit affiliates and trade network access, becoming a significant player in the cybercrime ecosystem. Matveev, previously involved with Babuk ransomware, was indicted in 2023 for multiple ransomware operations targeting U.S. critical infrastructure. The seizure of RAMP marks a significant step in disrupting organized cybercrime and highlights the ongoing efforts of U.S. law enforcement to combat ransomware.
Details
2026-01-28 17:23:46 bleepingcomputer CYBERCRIME Empire Market Co-Creator Pleads Guilty to Federal Drug Charges
Raheim Hamilton, co-creator of Empire Market, pled guilty to federal drug conspiracy charges, facilitating $430 million in illegal transactions from 2018 to 2020. Empire Market, operating on the dark web via TOR, was modeled after AlphaBay, with 1.68 million users at its peak, including 360,000 buyers and over 5,000 vendors. The marketplace primarily trafficked drugs, with $375 million in drug sales and 166,029 vendor listings for controlled substances. Hamilton and co-defendant Thomas Pavey designed the platform to evade law enforcement, conducting all transactions in cryptocurrency to maintain anonymity. Law enforcement made undercover purchases from Empire Market vendors, seizing significant quantities of heroin and methamphetamine during the investigation. Authorities seized $75 million in cryptocurrency, with Hamilton and Pavey agreeing to forfeit substantial assets, including bitcoin, gold bars, and properties. Hamilton's guilty plea could result in a sentence ranging from 10 years to life in federal prison, with Pavey facing similar sentencing.
Details
2026-01-28 16:33:46 theregister VULNERABILITIES Fortinet Faces New Critical FortiCloud SSO Vulnerability Challenges
Fortinet has disclosed a new critical vulnerability (CVE-2026-24858) affecting FortiCloud SSO, with a CVSS score of 9.4, despite recent patches for previous flaws. The vulnerability allows authentication bypass, enabling attackers to access devices registered to different accounts if certain conditions are met. Affected products include FortiAnalyzer, FortiManager, FortiOS, and FortiProxy, with some safe versions available, though comprehensive patches are still pending. Initial attacks were detected by Arctic Wolf, exploiting the vulnerability through alternate means, bypassing earlier patches from December. Fortinet has blocked the two malicious accounts exploiting this flaw and advises customers to upgrade to recommended versions to mitigate risks. The vulnerability impacts any SAML-based SSO implementations, prompting a broader security review beyond FortiCloud SSO. Administrators are urged to disable the "Allow administrative login using FortiCloud SSO" option during device registration to prevent unauthorized access. Fortinet continues to investigate potential exposures in FortiWeb and FortiSwitch Manager, with further updates anticipated.
Details
2026-01-28 16:09:39 thehackernews NATION STATE ACTIVITY Russian ELECTRUM Group Targets Polish Power Grid in Cyber Attack
A coordinated cyber attack on the Polish power grid in December 2025 has been attributed to the Russian state-sponsored group ELECTRUM, affecting multiple distributed energy resources. The attack impacted communication and control systems at combined heat and power facilities, as well as renewable energy management systems, though it did not cause power outages. ELECTRUM gained access to critical operational technology systems, disabling key equipment beyond repair, signaling a significant breach in grid operations. The group shares operational ties with KAMACITE, which focuses on initial access via spear-phishing and exploitation, allowing ELECTRUM to perform targeted industrial control system actions. The breach involved exploiting vulnerabilities in Remote Terminal Units and communication infrastructure, demonstrating a sophisticated understanding of electrical grid systems. Despite the opportunistic nature of the attack, it highlights the potential for significant disruption and the need for enhanced OT security measures in energy infrastructure. The incident underscores the persistent threat posed by state-sponsored actors targeting critical infrastructure, emphasizing the importance of robust cybersecurity defenses.
Details
2026-01-28 15:08:21 bleepingcomputer MISCELLANEOUS AI Agents Challenge Traditional Compliance Frameworks and CISO Responsibilities
AI agents are increasingly embedded in enterprise workflows, impacting compliance frameworks like SOX, GDPR, PCI DSS, and HIPAA, which were designed for human decision-makers. These agents act autonomously, affecting financial reporting, data handling, and access decisions, creating new compliance challenges and risks for organizations. Traditional compliance controls assume predictable behavior, but AI operates probabilistically, leading to potential failures as agents adapt to new contexts and data inputs. CISOs face heightened accountability as AI-driven compliance risks shift towards identity, access, and security governance, areas traditionally managed by security teams. AI agents can inadvertently collapse segregation of duties and access boundaries, complicating auditability and accountability in regulated environments. Organizations must treat AI agents as non-human identities, implementing governance, access controls, and monitoring akin to those for privileged users. The evolving role of AI in compliance demands that CISOs ensure AI-driven systems remain auditable and defensible, with clear ownership and documented change control.
Details
2026-01-28 14:39:34 bleepingcomputer VULNERABILITIES SolarWinds Patches Critical Web Help Desk Security Vulnerabilities
SolarWinds released updates to address critical vulnerabilities in its Web Help Desk software, including authentication bypass and remote command execution flaws, potentially affecting over 300,000 customers globally. The vulnerabilities, identified as CVE-2025-40552, CVE-2025-40554, CVE-2025-40553, and CVE-2025-40551, could allow unauthenticated attackers to execute commands and access administrative functions. Security researchers from watchTowr and Horizon3.ai discovered these flaws, which involve low-complexity attacks and untrusted data deserialization, posing significant risks if left unpatched. SolarWinds advises immediate upgrades to Web Help Desk version 2026.1 to mitigate these risks, providing detailed instructions for secure implementation. Historical exploitation of Web Help Desk vulnerabilities by threat actors emphasizes the urgency for organizations, including government and healthcare sectors, to apply these patches promptly. The Cybersecurity and Infrastructure Security Agency (CISA) has previously flagged similar vulnerabilities as actively exploited, urging federal agencies to secure their systems rapidly. This incident reinforces the critical need for continuous monitoring and timely patching of IT management software to protect against potential cyber threats.
Details