Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12611

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-12-23 08:22:57 thehackernews CYBERCRIME U.S. DoJ Seizes Domain Behind Major Bank Account Fraud Scheme
The U.S. Department of Justice seized a domain used in a bank account takeover scheme, impacting 19 victims across the U.S., including two companies in Georgia. The fraudulent operation involved fake advertisements on search engines like Google and Bing, redirecting users to counterfeit bank websites to harvest credentials. Stolen login details were used to access legitimate bank accounts, resulting in approximately $14.6 million in actual losses and attempted losses of $28 million. The international operation, led by U.S. and Estonian authorities, dismantled the backend web panel, web3adspanels[.]org, used to manage the stolen data. The FBI's Internet Crime Complaint Center reported over 5,100 bank account takeover complaints since January 2025, with losses exceeding $262 million. Individuals are urged to use complex passwords, verify banking URLs, monitor financial accounts for irregularities, and be cautious of phishing attempts. This case highlights the ongoing threat of sophisticated cybercriminal operations targeting financial institutions and the importance of international cooperation in combating cybercrime.
Details
2025-12-23 07:38:50 thehackernews VULNERABILITIES Critical n8n Vulnerability Threatens Thousands of Workflow Instances Globally
A critical flaw in the n8n workflow automation platform, CVE-2025-68613, allows arbitrary code execution, posing significant security risks. The vulnerability, with a CVSS score of 9.9, affects versions from 0.211.0 to below 1.120.4, impacting over 100,000 instances worldwide. Exploitation could lead to unauthorized access, data compromise, and system-level operations, affecting business operations and data integrity. The issue has been addressed in versions 1.120.4, 1.121.1, and 1.122.0, and users are urged to update immediately to mitigate risks. Instances are predominantly located in the U.S., Germany, France, Brazil, and Singapore, highlighting a widespread potential impact. Until updates are applied, limiting workflow permissions and deploying in a secure environment are recommended to reduce exposure. This incident stresses the importance of timely patch management and robust access controls to safeguard against similar vulnerabilities.
Details
2025-12-23 06:59:22 thehackernews NATION STATE ACTIVITY FCC Bans Foreign-Made Drones to Protect U.S. National Security
The FCC announced a ban on drones and critical components made in foreign countries, citing national security risks, particularly from China-based manufacturers like DJI and Autel Robotics. This move aligns with the 2025 National Defense Authorization Act, aiming to protect U.S. airspace and citizens from potential threats posed by foreign-made unmanned aircraft systems (UAS). The ban follows a review by a White House-convened interagency body, determining that foreign-made UAS pose unacceptable risks to U.S. national security and citizen safety. The FCC's decision is part of broader efforts to safeguard upcoming mass-gathering events, such as the 2026 FIFA World Cup and 2028 Summer Olympics, from potential drone-related threats. Exemptions may apply if the Department of Homeland Security assesses certain drones or components as non-threatening, ensuring flexibility in national security measures. The ban does not affect current consumer use or sales of previously approved drone models, maintaining market stability while enhancing security protocols. This development follows recent security measures, including the addition of Russian cybersecurity firm Kaspersky to the Covered List, reflecting ongoing U.S. efforts to mitigate foreign threats.
Details
2025-12-22 22:13:17 theregister MALWARE Malicious npm Package Exploits WhatsApp API for Data Theft
A malicious npm package, "lotusbail," has been downloaded over 56,000 times, posing as a legitimate WhatsApp Web API library, compromising user data and account security. The package operates as a fork of the Baileys library, providing genuine WhatsApp messaging functionality while secretly capturing and exfiltrating user credentials and communications. Stolen data includes authentication tokens, messages, contact lists, and media files, all encrypted with a custom RSA implementation and multiple obfuscation layers before reaching attacker-controlled servers. The malware exploits WhatsApp's device pairing process, allowing attackers to maintain access to user accounts even after the package is uninstalled. This incident underscores the growing supply chain risks in software development, following previous cases of secret-stealing npm libraries and token farming campaigns. In response to these threats, stakeholders are urged to enhance supply chain security protocols to prevent similar vulnerabilities and protect user data integrity. The incident serves as a warning for organizations to scrutinize third-party libraries and implement robust security measures to safeguard against such threats.
Details
2025-12-22 21:34:12 bleepingcomputer DATA BREACH Nissan Customer Data Exposed Following Red Hat Security Breach
Nissan confirmed a data breach affecting approximately 21,000 customers due to unauthorized access at Red Hat, its customer management systems developer. The breach involved data from Nissan Fukuoka Sales Co., Ltd., but financial information, such as credit card details, was not compromised. The incident was part of a larger breach involving the theft of sensitive data from 28,000 private GitLab repositories by the Crimson Collective group. ShinyHunters extortion group further complicated the breach by hosting stolen data samples, increasing pressure on Red Hat. Nissan has not found evidence of misuse of the leaked data and continues to assess the impact on its operations. This breach marks the second cybersecurity incident for Nissan Japan this year, following a ransomware attack in August. The incident underscores the ongoing challenges companies face in protecting customer data and the need for robust cybersecurity measures.
Details
2025-12-22 21:27:49 theregister MISCELLANEOUS Palo Alto Networks Expands Google Cloud Partnership for AI Integration
Palo Alto Networks announced a new multibillion-dollar agreement with Google Cloud, focusing on migrating key internal workloads to enhance AI integration and security tool unification. The company aims to leverage Google Cloud's AI infrastructure to provide a seamless security experience, potentially reducing cloud costs by $114 million by 2027. SEC filings reveal Palo Alto's cloud purchase commitments are projected to reach $6.3 billion by 2031, with significant allocations likely directed towards Google Cloud. The partnership is expected to accelerate Google Cloud adoption, offering deeper integrations and a unified platform that simplifies security and development processes. Palo Alto plans to utilize Google Cloud's Vertex AI and Gemini LLM to power its security copilots, enhancing market reach with a Google-led strategy. Despite increased cloud hosting service costs, Palo Alto's gross margin saw a slight improvement, indicating effective cost management and strategic alignment with cloud services. The collaboration underscores a strategic shift towards AI-driven security solutions, positioning Palo Alto to capitalize on emerging cloud and AI technologies.
Details
2025-12-22 20:51:29 bleepingcomputer MALWARE New MacSync Malware Variant Bypasses macOS Gatekeeper Protections
A new variant of the MacSync information stealer targets macOS systems, utilizing a digitally signed, notarized Swift application to evade Gatekeeper security checks. Distributed via a disk image from a deceptive website, the malware eliminates the need for terminal interaction, marking a shift from previous delivery methods. The malware's signature was initially valid, allowing it to bypass macOS security; however, Apple has since revoked the associated certificate following a report. Researchers identified evasion tactics such as inflating the DMG file size, embedding decoy PDFs, and wiping execution scripts to avoid detection. MacSync Stealer, active since April 2025, can extract sensitive data including iCloud credentials, browser passwords, and cryptocurrency wallet information. The malware's developer, known as ‘Mentalpositive’, adapted to macOS's tighter app notarization policies, influencing the evolution of their tactics. This development emphasizes the need for enhanced vigilance and updated security measures to protect against evolving threats targeting macOS environments.
Details
2025-12-22 19:41:34 theregister VULNERABILITIES AI Accelerates Exploitation of Vulnerabilities, Warns Zafran CEO
Sanaz Yashar, CEO of Zafran Security, warns of AI's role in accelerating vulnerability exploitation, with attackers now exploiting flaws a day before patches are issued. Mandiant's analysis shows a negative time-to-exploit in 2024, indicating a shift in the speed at which vulnerabilities are weaponized. 78% of vulnerabilities are reportedly being exploited using AI and large language models, increasing the efficiency of cybercriminal activities. The misuse of corporate AI systems and inherent software vulnerabilities expand the attack surface, posing significant risks to organizations. Yashar anticipates a major AI-driven cyber incident akin to the WannaCry ransomware attack, urging proactive risk mitigation strategies. Zafran's AI-driven platform aims to manage threat exposure by identifying and remediating vulnerabilities, emphasizing the need for proactive threat hunting. Despite technological advancements, human oversight remains crucial in cybersecurity operations, as AI alone cannot fully manage risk.
Details
2025-12-22 18:38:10 bleepingcomputer CYBERCRIME Interpol's Operation Sentinel Results in 574 Arrests, $3M Recovered
Operation Sentinel, led by Interpol, resulted in 574 arrests and the recovery of $3 million linked to cybercrime activities, including business email compromise and ransomware. The initiative spanned 19 countries, dismantling over 6,000 malicious links and decrypting six ransomware variants between October 27 and November 27. Cybercrime cases investigated during the operation were associated with financial losses exceeding $21 million, emphasizing the growing threat landscape. African law enforcement, in collaboration with international partners, played a crucial role in tackling sophisticated cyberattacks targeting critical sectors like finance and energy. Private sector partners, including Team Cymru and Trend Micro, assisted in tracing IP addresses and freezing proceeds from ransomware and sextortion attacks. Previous Interpol operations, such as Serengeti 2.0 and Red Card, have also successfully disrupted cybercriminal activities, highlighting ongoing international efforts. The outcomes of these operations demonstrate the effectiveness of global collaboration in combating cybercrime and protecting critical infrastructure.
Details
2025-12-22 17:31:02 theregister CYBERCRIME Hacktivists Scrape 86 Million Spotify Tracks for Cultural Preservation
Hacktivist group Anna's Archive claims to have scraped 86 million Spotify tracks, aiming to create a "fully open" music preservation archive. The group asserts its mission is to protect musical heritage from potential loss due to disasters and other threats. Despite their claims, the archive only covers about a third of Spotify's catalog, with the rest represented by metadata. Spotify has responded by disabling the accounts involved in the scraping and enhancing safeguards against such activities. The incident raises questions about the balance between cultural preservation and intellectual property rights. Spotify views the act as piracy, emphasizing its commitment to protecting artists' rights and intellectual property. Anna's Archive plans to release the music files in order of popularity, but the logistics and legality of this remain uncertain.
Details
2025-12-22 16:42:04 theregister CYBERCRIME Fraudster Ordered to Repay £125k to Romance Scam Victim
Mark Acklom, a convicted fraudster, must repay £125,000 to a victim he deceived through a romance scam, as ruled by the UK's Crown Prosecution Service (CPS). Acklom, posing as an MI6 agent and Swiss banker, defrauded Carolyn Woods in 2012, leading her to lend him money for fictitious property renovations. Despite pleading guilty to fraud charges totaling £300,000 in 2019, Acklom's total fraudulent activities were valued at £710,000 by Bristol Crown Court. The court determined Acklom's available assets at £125,000, which he must repay within three months or face an additional two-year prison term. The CPS continues to pursue proceeds of crime, having recovered £478 million from criminals over the past five years, returning £95 million to victims. Acklom's movements included time in the UK, Switzerland, and Spain, complicating efforts to bring him to justice before his eventual extradition and conviction. Judge Martin Picton expressed skepticism about Acklom's likelihood of repayment, suggesting the victim may find solace in his probable permanent absence from the UK.
Details
2025-12-22 16:30:41 thehackernews MALWARE Malicious npm Package "Lotusbail" Compromises WhatsApp Accounts
A malicious npm package named "lotusbail" has been identified, masquerading as a WhatsApp API while stealing credentials and intercepting messages from over 56,000 downloads since May 2025. The package installs a persistent backdoor, allowing attackers to maintain access to a victim's WhatsApp account by linking their device through a hard-coded pairing code. Data such as authentication tokens, session keys, contact lists, and media files are encrypted and sent to attacker-controlled servers, posing significant privacy risks. The malware employs a malicious WebSocket wrapper to capture and transmit sensitive information, exploiting legitimate library functionalities for unauthorized access. Anti-debugging features are embedded, causing the package to freeze if debugging tools are detected, complicating detection and analysis efforts. The incident underscores the increasing sophistication of supply chain attacks, exploiting trust in widely-used code repositories and bypassing traditional security measures. Organizations are advised to review their use of third-party libraries, implement stringent code audits, and monitor for unusual account activity to mitigate such threats.
Details
2025-12-22 16:10:42 bleepingcomputer MALWARE Malicious npm Package Compromises WhatsApp Accounts and Messages
A malicious npm package, masquerading as a WhatsApp Web API library, has been discovered stealing WhatsApp messages and account details, affecting over 56,000 downloads. The package, named "lotusbail," is a fork of the WhiskeySockets Baileys project, providing legitimate functionality while embedding malicious code to intercept and exfiltrate data. Koi Security identified the package's ability to capture WhatsApp authentication tokens, session keys, and intercept all messages, posing significant risks to user privacy. The malware encrypts stolen data using RSA, LZString compression, and AES encryption, complicating detection and analysis. Attackers gain persistent access to compromised accounts by linking their devices through WhatsApp's device pairing, remaining until manually removed by the victim. Developers are advised to remove the package and inspect WhatsApp for unauthorized linked devices, as well as monitor for unusual outbound connections. The package employs infinite loop traps to evade detection, emphasizing the need for runtime behavior monitoring beyond source code analysis.
Details
2025-12-22 15:30:13 bleepingcomputer CYBERCRIME Romanian Water Authority Suffers Major Ransomware Attack
Romanian Waters, the national water management authority, experienced a ransomware attack affecting approximately 1,000 systems across its network, including 10 regional offices. The attack compromised servers handling geographic information systems, databases, email, and web services, but operational technology systems controlling water infrastructure remained unaffected. Attackers utilized the Windows BitLocker feature to lock files and issued a ransom note demanding contact within seven days, although no group has claimed responsibility. Romanian security agencies, including the National Cyberint Center, are actively investigating and working to contain the impact, while integrating the authority's infrastructure into national cybersecurity systems. Despite the attack, hydrotechnical operations continue as normal, relying on voice communications and local personnel coordination, ensuring safety and functionality. The incident follows a pattern of ransomware attacks in Romania, with previous breaches affecting major utilities and healthcare systems, raising concerns about critical infrastructure security. The attack comes amid warnings from global cybersecurity agencies about pro-Russia hacktivist groups targeting critical infrastructure worldwide.
Details
2025-12-22 14:24:03 bleepingcomputer DATA BREACH University of Phoenix Data Breach Exposes 3.5 Million Individuals
The Clop ransomware group breached the University of Phoenix, compromising data of 3.5 million students, staff, and suppliers through an Oracle E-Business Suite vulnerability. The breach, detected on November 21, involved unauthorized access to sensitive personal and financial information, including social security numbers and bank details. The university disclosed the incident on its website and filed an 8-K with the SEC, indicating a significant operational and reputational impact. Affected individuals are being notified, and UoPX offers free identity protection services, including credit monitoring and a $1 million fraud reimbursement policy. Clop's campaign exploited a zero-day flaw, CVE-2025-61882, targeting multiple U.S. universities, including Harvard and the University of Pennsylvania. The U.S. Department of State is offering a $10 million reward for information linking Clop's activities to any foreign government. This incident underscores the critical need for robust cybersecurity measures and timely patch management to protect sensitive data in educational institutions.
Details