Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11759

Checks for new stories every ~15 minutes

Title Summary
ROWS
2025-09-24 14:03:26 bleepingcomputer NATION STATE ACTIVITY Chinese Hackers Exploit Brickstorm Malware in Long-Term Espionage Campaigns
Google identified the Brickstorm malware used by suspected Chinese hackers in prolonged espionage operations against U.S. technology and legal sectors, with an average dwell time of 393 days. Brickstorm, a Go-based backdoor, functions as a web server, file manipulation tool, and SOCKS relay, facilitating data exfiltration and stealthy network infiltration. The malware targets edge devices lacking EDR support, such as VMware vCenter/ESXi endpoints, masking communications as legitimate traffic to evade detection. Attackers employed Bricksteal, a malicious Java Servlet Filter, to capture credentials and clone Windows Server VMs, enabling lateral movement and persistent access. The operations focus on exfiltrating emails and code repositories, with UNC5221 activity cluster linked to China's economic and security interests. Mandiant released a scanner script to help detect Brickstorm, though it may not identify all variants or persistence mechanisms. The campaign's complexity is heightened by UNC5221's use of unique C2 domains and malware samples, complicating forensic investigations.
Details
2025-09-24 13:55:36 thehackernews VULNERABILITIES Critical Flaws in Wondershare RepairIt Expose User Data and AI Models
Trend Micro discovered two critical vulnerabilities in Wondershare RepairIt, compromising user data and exposing AI models to potential tampering and supply chain risks. The flaws enable attackers to bypass authentication, execute arbitrary code, and potentially distribute malicious payloads via vendor-signed updates. Poor DevSecOps practices, including embedding permissive cloud access tokens, contributed to unencrypted data storage and increased risk exposure. Sensitive cloud storage contained user data, AI models, and company source code, raising concerns about intellectual property theft and regulatory penalties. Despite responsible disclosure through the Zero Day Initiative, Wondershare has yet to respond, prompting recommendations for users to limit product interaction. The incident underscores the need for robust security processes, particularly in the CI/CD pipeline, to prevent overlooked vulnerabilities. Broader implications highlight the risks of rapid AI tool adoption without clear security policies, potentially opening new attack vectors.
Details
2025-09-24 13:15:48 bleepingcomputer CYBERCRIME PyPI Faces Credential Phishing Threats Targeting Python Developers
The Python Software Foundation has alerted users to phishing attacks using a fake PyPI website to steal credentials, posing a risk to Python package security. Attackers send emails urging users to verify their email addresses, threatening account suspension, and redirecting them to a fraudulent site. Compromised credentials could allow attackers to tamper with existing Python packages or introduce new malicious ones on PyPI. Users are advised to change passwords immediately if credentials were shared and to monitor account security history for irregularities. PyPI recommends employing password managers and phishing-resistant two-factor authentication, such as hardware keys, to secure accounts. The Foundation encourages reporting malicious domains to registrars to aid in dismantling phishing operations and protect the developer community. In response to previous threats, PyPI invalidated stolen tokens from the GhostAction attack to prevent unauthorized package publications.
Details
2025-09-24 12:53:42 theregister CYBERCRIME UK Arrests Suspect in Global Airport Ransomware Attack Investigation
The UK's National Crime Agency arrested a suspect linked to a ransomware attack disrupting global airport operations, affecting major hubs like London Heathrow and Brussels Airport. The attack targeted Collins Aerospace's ARINC SelfServ cMUSE software, critical for traveler check-ins and baggage processing, causing significant delays and flight cancellations. The incident began on September 19, leading to chaos across European airports and impacting transatlantic travel, with manual check-ins temporarily implemented. The EU's cybersecurity agency confirmed the incident as a ransomware attack, yet no group has claimed responsibility, and investigations are ongoing. The suspect, arrested in West Sussex, is under conditional bail as authorities continue to explore the full extent of the attack and identify further culprits. This event underscores the persistent threat cybercrime poses to critical infrastructure, highlighting the need for robust cybersecurity measures in aviation technology. The National Crime Agency, with international partners, remains committed to mitigating cyber threats and safeguarding public safety.
Details
2025-09-24 12:38:01 bleepingcomputer CYBERCRIME GitHub Phishing Campaign Targets Cryptocurrency Through Fake Y Combinator Invites
A phishing campaign exploited GitHub’s notification system to impersonate Y Combinator, targeting developers with fake invitations to the Winter 2026 funding program. Attackers created issues in multiple repositories, tagging users to trigger legitimate-looking notifications, which bypassed email filters and reached recipients' inboxes. The fraudulent invitations directed recipients to a spoofed Y Combinator site, using a misspelled domain and obfuscated JavaScript to steal cryptocurrency. Users were misled into verifying their wallets, inadvertently authorizing malicious transactions that drained their crypto assets. GitHub, IC3, and Google Safe Browsing responded by removing the fraudulent repositories following community reports. Developers who interacted with the phishing site are advised to transfer their assets to new wallets to prevent potential losses. The incident underscores the need for vigilance against phishing tactics exploiting trusted platforms and services.
Details
2025-09-24 12:26:59 theregister DATA BREACH Boyd Gaming Data Breach Exposes Employee Information to Cybercriminals
Boyd Gaming, a major hotel and casino operator, reported a cyberattack that compromised personal data of employees and some other individuals. The breach involved unauthorized access and data removal from Boyd Gaming's technology systems, though the exact timeline and responsible parties remain unidentified. The company has not detailed the specific types of data stolen or the identity of the additional affected individuals. Boyd Gaming's SEC filing indicates that the financial impact of the breach will be mitigated by its comprehensive cybersecurity insurance policy. Insurance coverage will address costs for external digital forensics, incident response, and potential legal or regulatory expenses. Boyd Gaming operates 27 locations across the U.S., primarily in Las Vegas, and employs approximately 16,000 people. The incident underscores the ongoing vulnerability of large enterprises to cyber threats and the importance of robust cybersecurity measures.
Details
2025-09-24 12:00:53 thehackernews CYBERCRIME Ransomware Attack Ends 158-Year Legacy of UK Transport Firm
KNP Logistics Group, a 158-year-old UK transport company, collapsed after a ransomware attack exploited a weak employee password, leading to the company's administration and loss of 700 jobs. The Akira ransomware group accessed KNP's systems through an easily guessed password, bypassing the company's lack of multi-factor authentication on internet-facing systems. Attackers encrypted critical data and destroyed backups, demanding a £5 million ransom, which the financially strained company could not pay, halting all operations. KNP's downfall underscores the critical need for robust password policies and multi-factor authentication to protect against credential-based attacks. The incident exemplifies the broader ransomware crisis in the UK, where approximately 19,000 businesses faced similar attacks last year, with significant financial and reputational impacts. Organizations are urged to implement zero-trust architectures, least privilege access controls, and regular backup testing to mitigate ransomware risks. The collapse of KNP serves as a stark reminder of the devastating real-world consequences of cybersecurity failures, emphasizing the importance of proactive security investments.
Details
2025-09-24 11:36:50 thehackernews MALWARE New YiBackdoor Malware Exhibits Links to IcedID and Latrodectus
Zscaler ThreatLabz has identified a new malware family, YiBackdoor, sharing significant code similarities with IcedID and Latrodectus, suggesting a potential shared developer origin. YiBackdoor can execute arbitrary commands, collect system information, capture screenshots, and deploy plugins, enhancing its functionality dynamically. The malware employs rudimentary anti-analysis techniques to evade detection and injects itself into the "svchost.exe" process for persistence, using the Windows Run registry key. Limited deployments indicate YiBackdoor is either under development or being tested, possibly serving as a precursor for ransomware attacks by facilitating initial access. Embedded encrypted configurations allow YiBackdoor to establish command-and-control communications, receiving commands via HTTP responses. Concurrently, new versions of ZLoader have been observed, featuring enhanced code obfuscation, network communications, and evasion capabilities, targeting specific entities. The ongoing development of YiBackdoor and ZLoader reflects an evolving threat landscape, necessitating vigilant monitoring and advanced defense strategies.
Details
2025-09-24 11:15:24 theregister MISCELLANEOUS UK Campaigners Oppose Proposed Mandatory Digital ID System
Seven campaign groups have urged UK Prime Minister Keir Starmer to abandon plans for a mandatory digital ID system, citing privacy and surveillance concerns. The proposed digital ID system is intended to address unauthorized migration but has faced criticism for potentially enabling mass surveillance. Critics argue that the digital ID could be expanded to access various public and private services, impacting those digitally excluded. Concerns have been raised about the lack of parliamentary oversight and public consultation, with accusations of introducing the scheme covertly. Historical attempts to implement a similar ID system under Labour in the 2000s faced significant legislative hurdles and political opposition. An online petition against the digital ID has garnered over 100,000 signatures, reflecting public discontent with the proposal. The UK government is considering the scheme but has not made any final decisions, with an announcement expected at the upcoming Labour Party Conference. Former political figures have publicly supported the digital ID initiative, while critics warn it could lead to increased societal control.
Details
2025-09-24 11:05:20 thehackernews VULNERABILITIES Evolving iframe Exploits Threaten Payment Security Across Websites
Recent attacks have exploited payment iframes, bypassing traditional security measures to skim credit card data, affecting 49 merchants using Stripe's platform. Attackers use malicious overlays and deprecated APIs to replace legitimate iframes, making theft undetectable to customers and compromising real-time card validation. The attack surface has widened, with 18% of websites using tools like Google Tag Manager within iframes, creating significant security vulnerabilities. Modern frameworks, while addressing legacy threats, introduce new vulnerabilities, with iframe-related CVE reports increasing by 30% over the past year. Advanced iframe monitoring and strict Content Security Policies (CSP) are recommended to mitigate these evolving threats, requiring minimal development effort. Organizations are urged to prioritize risk-based defenses, starting with iframe monitoring and CSP, to prevent costly breaches averaging $2 million in remediation. The Payment Card Industry Data Security Standard (PCI DSS) now emphasizes securing iframe hosting environments, highlighting the shared responsibility model for merchants.
Details
2025-09-24 10:50:23 theregister CYBERCRIME Cyberattack Forces Jaguar Land Rover to Halt Production for a Month
Jaguar Land Rover (JLR) has suspended production for at least a month following a cyberattack, significantly impacting its operations and supply chain. The attack has led to job losses among JLR's supply chain workers, prompting calls for government intervention and financial support. Business and Trade Committee Chair Liam Byrne emphasized the urgency of government action to prevent further economic fallout. The UK government is assessing the situation, with visits by officials to understand the attack's broader impact on JLR and its suppliers. The potential financial aid package is debated, given JLR's profitability and its parent company Tata Group's financial strength. Local communities, particularly in Solihull and Merseyside, are experiencing economic strain due to the shutdown, affecting small businesses and families. Further discussions between the Department for Business and Trade and JLR's supply chain are expected to clarify the government's response strategy.
Details
2025-09-24 07:20:53 thehackernews VULNERABILITIES Pandoc SSRF Vulnerability Threatens AWS EC2 IAM Credentials Security
Security firm Wiz identified active exploitation of a vulnerability, CVE-2025-51591, in the Linux utility Pandoc, targeting AWS Instance Metadata Service (IMDS) for credential theft. The flaw involves Server-Side Request Forgery (SSRF), enabling attackers to inject HTML iframe elements to access sensitive metadata, including IAM credentials, from AWS EC2 instances. IMDS is crucial for AWS environments, offering temporary credentials for applications without storing them on machines, reducing exposure risk. Despite attempts to exploit the vulnerability, enforcement of IMDSv2, which requires session tokens, mitigated the attack, demonstrating the importance of updated security protocols. Historical context shows similar SSRF vulnerabilities have been exploited in the past, such as CVE-2021-21311, highlighting ongoing risks to cloud infrastructure. Organizations are advised to enforce IMDSv2, apply least privilege principles, and utilize Pandoc's sandbox options to mitigate risks associated with iframe rendering. The findings stress the need for vigilance in patching and securing cloud environments against SSRF vulnerabilities to prevent unauthorized access and data breaches.
Details
2025-09-24 06:25:58 thehackernews NATION STATE ACTIVITY State Actors Exploit Libraesva Email Gateway Vulnerability for Attacks
Libraesva released a security update for its Email Security Gateway to address CVE-2025-59689, a medium-severity vulnerability exploited by state-sponsored hackers. The vulnerability involves a command injection flaw triggered by malicious emails with specially crafted attachments, allowing arbitrary command execution. Affected versions include Libraesva ESG 4.5 through 5.5.x before 5.5.7, with fixes now available in multiple updated releases. The flaw stems from improper sanitization during active code removal in certain compressed archive formats. Libraesva confirmed one incident of exploitation by a foreign hostile state entity, emphasizing the need for rapid patch deployment. Users are urged to update their ESG software immediately to mitigate ongoing threats and ensure system security. The company acted swiftly, deploying a fix within 17 hours of identifying the abuse, showcasing effective incident response.
Details
2025-09-23 22:27:43 bleepingcomputer DATA BREACH Boyd Gaming Reports Data Breach Impacting Employee Information
Boyd Gaming Corporation, a major US casino operator, disclosed a data breach affecting employee and limited individual data after a cyberattack on its systems. The company operates 28 gaming properties across ten states, employing over 16,000 people, and reported $3.9 billion in revenue in 2024. Boyd Gaming confirmed the breach in a SEC FORM 8-K filing, indicating unauthorized access and data theft from its IT systems. External cybersecurity experts were engaged, and law enforcement was notified as part of the response to the incident. The breach did not disrupt company operations, and no significant financial impact is expected due to existing cybersecurity insurance coverage. Notifications are being sent to affected individuals, and regulatory bodies are being informed as required by law. No group has claimed responsibility for the attack, and Boyd Gaming has yet to provide further details on the incident.
Details
2025-09-23 20:11:41 theregister CYBERCRIME Surge in AI-Driven Deepfake Attacks Targets Business Operations
A recent survey reveals 62% of cybersecurity leaders reported AI-based attacks on their staff, with deepfake audio calls being the most prevalent method. Approximately 44% of businesses experienced deepfake audio incidents, with 6% suffering business disruption, financial, or intellectual property loss. Utilization of audio screening services reduces loss rates from deepfake audio attacks from 6% to 2%, indicating a potential mitigation strategy. Video deepfakes affected 36% of companies, with 5% encountering serious issues, despite their higher cost and complexity compared to audio. Sophos reports that scammers use real-time audio deepfakes effectively, while video deepfakes are often used briefly before switching to text-based social engineering. North Korean entities reportedly exploit AI deepfakes to masquerade staff as Western professionals, generating significant revenue through deceptive practices. Prompt-injection attacks are also rising, with 32% of organizations experiencing incidents, affecting AI systems like chatbots and potentially leading to unauthorized code execution. The increasing sophistication of AI-generated attacks necessitates enhanced detection and mitigation strategies to safeguard against evolving threats.
Details