Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12731

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-07-08 14:10:01 bleepingcomputer CYBERCRIME Enhancing Security in Virtual Desktop and Application Environments
Virtual desktop and application virtualization are critical for remote and hybrid work setups, prioritizing flexibility, scalability, and security. Virtual environments face cyber threats due to centralized structures and vulnerabilities in remote access protocols. Implementing Zero Trust architecture and Multi-Factor Authentication (MFA) ensures that only authenticated users and trusted devices access the virtual settings. TruGrid SecureRDP enhances security by preventing exposure of firewall ports and implementing MFA to protect against credential-based threats. The product leverages global fiber optics to optimize network performance, reducing latency and packet loss, crucial for maintaining efficient virtual desktop operations. TruGrid SecureRDP simplifies regulatory compliance and licensing management while providing tools to scale virtual desktop infrastructure effectively as organizations grow. Enhanced user experience is achieved through smoother remote desktop performance, addressing common user frustrations and supporting broader adoption. Future enhancements in virtual desktop technologies will continue to address performance and security, aiming to support the growing trend of remote workforces.
Details
2025-07-08 14:00:06 bleepingcomputer MALWARE Malicious Chrome Extensions Impact Over 1.7 Million Users
Researchers found nearly a dozen malicious extensions in Google's Chrome Web Store, cumulatively downloaded 1.7 million times. These extensions, disguised as legitimate tools like VPNs and emoji keyboards, could track users, steal browser activity, and redirect to potentially harmful URLs. Some of the problematic extensions, such as ‘Volume Max — Ultimate Sound Booster,’ were previously flagged for suspicious activities but remained unconfirmed for malicious behavior until now. The harmful functionalities, hidden in background service workers using the Chrome Extensions API, capture and exfiltrate user data to remote servers. Despite the malicious updates, Google's auto-update feature deployed these versions without user interaction, raising concerns about silent update practices. Extensions originally safe at launch may have been compromised over time, introducing malware through updates by potentially external actors. Koi Security also discovered similar malicious extensions in the Microsoft Edge store, affecting an additional 600,000 downloads. Recommendations include immediate removal of the identified extensions, clearing browser data, system malware checks, and monitoring for account irregularities.
Details
2025-07-08 13:33:13 theregister MISCELLANEOUS SUSE Introduces Sovereign Premium Support for Data Sovereignty
SUSE has launched "SUSE Sovereign Premium Support," targeting European organizations concerned about data sovereignty. This service ensures that support is strictly provided within a specific region, complying with local data sovereignty laws and reducing dependence on non-European entities. The traditional follow-the-sun support model is avoided to prevent data transfers that could violate regional data sovereignty regulations. SUSE's initiative reflects a broader trend where companies, including tech giants like AWS and Microsoft, are actively addressing European data sovereignty concerns through local solutions. CEO Dirk-Peter van Leeuwen highlighted a significant interest in developing technology that can be built and supported within Europe, though he noted minimal migration away from major hyperscalers. The move by SUSE is seen as a response to the increasing demand for digital autonomy in Europe, especially in light of evolving geopolitical climates and local regulatory demands. The additional cost for the sovereign support service is around 15%, which some customers are willing to pay to ensure compliance and maintain data within controlled regions.
Details
2025-07-08 13:07:30 thehackernews CYBERCRIME Supply Chain Attack Targets Ethcode Extension, Infects Developers
Cybersecurity firm ReversingLabs uncovered a supply chain attack affecting the Ethcode Visual Studio Code extension, used by over 6,000 developers for Ethereum blockchain development. The attack was initiated through a pull request by a newly created GitHub user, Airez299, which included malicious code hidden among extensive legitimate updates. The malicious code introduced a dependency on a compromised npm package, "keythereum-utils," which was found to be obfuscated and designed to download a second-stage payload. The exact nature of the downloaded malware is unknown but suspected to be involved in cryptocurrency theft or contract poisoning. After detection, the malicious code and dependency were removed, and the Ethcode extension was reinstated in the VS Code Extensions Marketplace. This incident is part of a larger trend of software supply chain attacks, leveraging public repositories to infiltrate development environments with malware. ReversingLabs emphasized the increasing use of such tactics, noting an alarming rise in open-source malware discovered in recent quarters.
Details
2025-07-08 11:54:56 theregister NATION STATE ACTIVITY Arrest of Alleged Chinese Cyberespionage Agent in Italy after US Tipoff
Zewei Xu, suspected Chinese cyberespionage agent, was arrested in Milan following intel from the US. US authorities link Xu to the Chinese state-sponsored group Silk Typhoon, accused of spying during COVID-19 on vaccine developments and carrying out the Microsoft Exchange hack. The US has filed an extradition request, with a court hearing at Milan's Court of Appeals set to decide on it. Xu's family claims confusion over his arrest, asserting he is an employee at a semiconductor firm and not involved with Chinese espionage. Silk Typhoon, associated with Xu, was previously implicated in significant security breaches at the US Treasury and against US networks. Italian-US diplomatic relations face strain, highlighted by recent contentious extradition cases and Italy's nuanced stance towards China. The upcoming court decision on Xu's extradition could further impact international relations and cybersecurity policies.
Details
2025-07-08 11:31:15 thehackernews DATA BREACH Recent Identity Attacks Expose Major Retailers' Vulnerabilities
Recent incidents highlight how identity-driven attacks are successfully targeting major retailers like Adidas, The North Face, and Victoria's Secret. Attackers leverage overprivileged access and unmonitored service accounts, bypassing the need for malware or direct system breaches. Tactics such as credential stuffing, third-party breaches, and social engineering are being employed to access sensitive customer data. These security incidents primarily exploit poor identity management and lax MFA (Multi-Factor Authentication) implementations on SaaS platforms. Retailers' experiences underscore the importance of securing not just direct user access but also the extended access provided to vendors. The breaches reveal critical gaps in identity controls, overprivileged roles, and the need for robust monitoring of SaaS identities to prevent similar attacks. Security experts recommend stringent access controls, continuous monitoring of high-impact identities, and targeted training to mitigate risks from such identity-first attacks.
Details
2025-07-08 11:09:59 thehackernews DDOS RondoDox Botnet Launches DDoS Using Compromised DVRs and Routers
Cybersecurity experts have identified a new botnet, RondoDox, exploiting vulnerabilities in TBK DVRs and Four-Faith routers to conduct DDoS attacks. The botnet targets specific flaws designated as CVE-2024-3721 in TBK DVRs and CVE-2024-12856 in Four-Faith routers, often found in unmonitored environments like retail or office settings. RondoDox utilizes compromised devices to disguise command-and-control traffic, enabling multifaceted cyber-attacks including financial scams. The malware leverages a complex a shell script to provide multi-architecture support, ensuring widespread compatibility across devices. RondoDox implements advanced evasion techniques, such as DoH-based C2 resolution and XOR-encryption, to avoid detection by traditional IDS systems. The botnet actively terminates any running processes that could potentially interfere with its operations or aid in detection, like network utilities or other malware. The malware contacts external servers to receive commands for launching targeted DDoS attacks, simulating traffic from various popular platforms to remain undetected. Researchers emphasize the sophistication and adaptive capabilities of RondoDox, highlighting its potential to remain operational and undetected for prolonged periods.
Details
2025-07-08 10:36:40 thehackernews CYBERCRIME Global Scam Using Fake News Sites to Promote Investment Frauds
CTM360 uncovered over 17,000 fake news websites fueling online investment scams across 50 countries. These sites mimic reputable news outlets like CNN and BBC, using fake articles to endorse fraudulent financial platforms. Scammers engage victims through ads with clickbait headlines and direct them to phony trading systems following initial contact. A two-phase scam process involves gaining trust via fake advisors and fake profit dashboards, followed by requests for money and personal information. The scams are sophisticated, utilizing local languages, media logos, and targeting specific regional audiences. Victims are induced to invest small initial amounts, which later escalate through pressure and manipulated profit displays. These schemes also harvest personal data for potential use in phishing, identity theft, and secondary scams. CTM360 tracks these fraudulent operations, providing takedown support and risk protection to affected regions and organizations.
Details
2025-07-08 08:27:46 thehackernews MALWARE Batavia Spyware Targets and Steals Data from Russian Organizations
Russian firms are facing an ongoing cyber-espionage effort utilizing a new malware dubbed Batavia, effective since July 2024. The attack is initiated with phishing emails disguised as contract agreements, containing malicious links from the domain "oblast-ru[.]com." The malware deploys by downloading an encoded script which gathers system profiling data and introduces more malicious payloads for deeper infiltration. Batavia, written in Delphi, masquerades as a contract document to mislead victims while it silently collects various data types, including office documents and screenshots. The collected data is sent to another attacker-controlled domain and further escalates the attack by downloading additional payloads targeting even more file types. Kaspersky has identified over 100 victims in several dozen organizations who have received these phishing emails in the last year, reflecting the attack's broad impact. Disclosed findings are part of a broader pattern of information-stealing campaigns, including another detailed instance dubbed NordDragonScan that affects Windows systems via similar attack vectors.
Details
2025-07-08 08:05:03 theregister DATA BREACH Navigating Password Management Regulations and Compliance in 2025
A significant portion of data breaches in 2025 still involve stolen credentials, emphasizing ongoing issues with password security. Regulatory bodies worldwide are enforcing stricter guidelines on password management, stressing on password length and the necessity of multi-factor authentication (MFA). EU’s updated NIS2 Directive and PCI-DSS 4.0 highlight these stringent requirements, potentially leading to severe consequences for non-compliance, including the removal of senior management. Organizations are finding it challenging to keep up with these evolving standards, risking regulatory actions and issues with cyber-insurance claims. Specops Software introduces tools like Password Auditor to help organizations assess and improve their compliance with password security best practices across various regulatory frameworks. These tools provide extensive reports and recommendations, helping close the audit visibility gap and ensure continuous monitoring of password policies. Password Auditor tool offers a free, robust solution for organizations to evaluate their current password policies against compliance standards and identify potential vulnerabilities.
Details
2025-07-08 06:29:58 theregister CYBERCRIME Scattered Spider's Phishing Campaign Targets Multiple Industries
Scattered Spider has created approximately 500 domains resembling corporate login pages to orchestrate phishing attacks across various sectors, impacting airlines, manufacturers, and restaurant chains. Although initially targeting the aviation industry, notably Qantas and other airlines, the criminal group has diversified its targets to include manufacturing, medical technology, financial services, and enterprise platforms. The fake domains are crafted to mimic legitimate portals like “victimname-servicedesk[.]com” or “victimname-okta[.]com”, intending to deceive employees into sharing login credentials. Check Point Research, which identified these domains, suggests the infrastructure might currently be in use or reserved for future attacks. Qantas recently experienced a breach involving the theft of 6 million customer records, followed by attempted extortion by the perpetrator to prevent data leakage. The shift in Scattered Spider’s focus from insurance and retail sectors to a broader range of industries illustrates an adaptive and opportunistic attack strategy. There is ongoing engagement with law enforcement to address these security incidents, without evidence to date of leaked personal data from the reported breaches.
Details
2025-07-08 05:13:09 thehackernews NATION STATE ACTIVITY CISA Flags Four New Flaws Due to Active Exploit Attempts
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) catalog, adding four critical security flaws. These updates were prompted by actual incidents of exploitation by cybercriminals, particularly highlighting a vulnerability linked to a China-associated threat actor, Earth Lusca, using CVE-2019-9621 to install web shells and Cobalt Strike. New technical disclosures reveal significant issues in the Citrix NetScaler ADC system, specifically CVE-2025-5777, known as Citrix Bleed 2, which has also been actively exploited. Hackers exploit these Citrix vulnerabilities to steal sensitive data such as credentials and session tokens by manipulating memory read functions in the server. Federal Civilian Executive Branch (FCEB) agencies are urged to rectify these vulnerabilities by July 28, 2025, to mitigate potential security risks. Technical insights provided by watchTowr and Horizon3.ai indicate that attackers are compromising endpoints by crafting malicious HTTP requests aimed at data exfiltration.
Details
2025-07-08 01:39:03 bleepingcomputer NATION STATE ACTIVITY Arrest of Chinese National Tied to Silk Typhoon Cyberespionage
Chinese national Xu Zewei was arrested in Milan for alleged links to the state-sponsored hacking group Silk Typhoon. Silk Typhoon, also known as Hafnium, has conducted cyberespionage against the U.S. and other nations, focusing on stealing sensitive data. Xu is accused of participating in the 2020 cyberattacks targeting COVID-19 vaccine researchers and healthcare organizations. The group attempted to steal intellectual property and public health data related to COVID-19 vaccines and treatments. Xu was apprehended at Milan's Malpensa Airport under an international warrant issued by the U.S. government. Recent activities of Silk Typhoon include campaigns against the U.S. Treasury's Office of Foreign Assets Control and cloud services to infiltrate networks. Xu is currently held in Busto Arsizio prison, with the U.S. seeking his extradition.
Details
2025-07-07 23:02:40 bleepingcomputer CYBERCRIME Critical Citrix NetScaler Vulnerability Exposed, Immediate Patch Urged
Researchers released PoC exploits for a critical vulnerability in Citrix NetScaler, identified as CVE-2025-5777 and named CitrixBleed2, susceptible to attackers exploiting it to steal user session tokens. The vulnerability allows attackers to extract memory contents from affected devices by sending malformed POST requests during login attempts. CitrixBleed2 enables extraction of approximately 127 bytes per request, potentially revealing sensitive data after numerous requests. Despite Citrix claiming there's no current exploitation, security findings suggest possible active exploitation, with indicators of memory dumping and session hijacking. Citrix has published patches for the vulnerability and recommends immediate application to prevent attacks. Observations from cybersecurity firms criticize Citrix's response and transparency concerning the exploit’s activity in the wild. All organizations using affected Citrix products are advised to review sessions for suspicious activity and terminate sessions as outlined by Citrix's guidelines.
Details
2025-07-07 20:37:34 theregister CYBERCRIME Critical CitrixBleed 2 Exploits Unpatched, Posing Severe Risks
CVE-2025-5777, known as CitrixBleed 2, is a critical security flaw in Citrix NetScaler devices, rated 9.3 CVSS, allowing attackers to access sensitive information. Despite the availability of patches, a significant number of Citrix users have not updated their systems, leaving them vulnerable to attacks. Exploits for this vulnerability are actively circulating, with security firms releasing vulnerability analyses and proof-of-concept tools. CitrixBleed 2 enables attackers to bypass multi-factor authentication, hijack user sessions, and potentially gain access to critical systems. The exploit involves sending malformed HTTP requests to Citrix gateways, which then leak session tokens and other sensitive data due to improper memory handling. Security researchers from watchTowr and Horizon3.ai have detailed the exploit process, emphasizing its simplicity and high potential for abuse. Citrix has yet to respond with comments regarding the extent of the attacks or additional mitigation measures since the initial patch release.
Details