The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attackby info@thehackernews.com (The Hacker News) on February 22, 2025 at 6:59 am
Cryptocurrency exchange Bybit on Friday revealed that a “sophisticated” attack led to the theft of over $1.46 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history. “The incident occurred when our ETH multisig cold wallet executed a transfer to our warm wallet. Unfortunately, this transaction was manipulated
- OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaignsby info@thehackernews.com (The Hacker News) on February 22, 2025 at 5:17 am
OpenAI on Friday revealed that it banned a set of accounts that used its ChatGPT tool to develop a suspected artificial intelligence (AI)-powered surveillance tool. The social media listening tool is said to likely originate from China and is powered by one of Meta’s Llama models, with the accounts in question using the AI company’s models to generate detailed descriptions and analyze documents
- Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demandsby info@thehackernews.com (The Hacker News) on February 21, 2025 at 4:15 pm
Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data. The development was first reported by Bloomberg. ADP for iCloud is an optional setting that ensures that users’ trusted devices retain sole access to the encryption keys used to unlock data stored in its
- Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operationsby info@thehackernews.com (The Hacker News) on February 21, 2025 at 4:06 pm
An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers censorship-as-a-service solutions to prospective customers, including a state-owned enterprise in the country. Founded in 1995, TopSec ostensibly offers services such as Endpoint Detection and Response (EDR) and vulnerability scanning. But it’s also providing “boutique” solutions in order
- Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3by info@thehackernews.com (The Hacker News) on February 21, 2025 at 1:03 pm
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand’s legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale. The latest iteration of the phishing suite “represents a significant
- Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025by info@thehackernews.com (The Hacker News) on February 21, 2025 at 11:40 am
In today’s rapidly evolving digital landscape, weak identity security isn’t just a flaw—it’s a major risk that can expose your business to breaches and costly downtime. Many organizations are overwhelmed by an excess of user identities and aging systems, making them vulnerable to attacks. Without a strategic plan, these security gaps can quickly turn into expensive liabilities. Join us for “
- AI-Powered Deception is a Menace to Our Societiesby info@thehackernews.com (The Hacker News) on February 21, 2025 at 11:00 am
Wherever there’s been conflict in the world, propaganda has never been far away. Travel back in time to 515 BC and read the Behistun Inscription, an autobiography by Persian King Darius that discusses his rise to power. More recently, see how different newspapers report on wars, where it’s said, ‘The first casualty is the truth.’ While these forms of communication
- Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networksby info@thehackernews.com (The Hacker News) on February 21, 2025 at 7:38 am
Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. “The threat actor then demonstrated their ability to persist in target environments across equipment from multiple
- CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacksby info@thehackernews.com (The Hacker News) on February 21, 2025 at 7:26 am
A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5. It was addressed by the
- North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malwareby info@thehackernews.com (The Hacker News) on February 20, 2025 at 1:37 pm
Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,
- PCI DSS 4.0 Mandates DMARC By 31st March 2025by info@thehackernews.com (The Hacker News) on February 20, 2025 at 11:21 am
The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result in monetary
- China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomwareby info@thehackernews.com (The Hacker News) on February 20, 2025 at 11:21 am
A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a now-patched security flaw
- Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archivesby info@thehackernews.com (The Hacker News) on February 20, 2025 at 11:12 am
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence Center (ASEC)
- Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Nowby info@thehackernews.com (The Hacker News) on February 20, 2025 at 10:00 am
For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks
- Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerabilityby info@thehackernews.com (The Hacker News) on February 20, 2025 at 4:36 am
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0. It has been described as a case of improper privilege management that could
- Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerabilityby info@thehackernews.com (The Hacker News) on February 20, 2025 at 4:29 am
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below – CVE-2025-21355 (CVSS score: 8.6) – Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) – Microsoft Power Pages Elevation of Privilege Vulnerability “
- Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codesby info@thehackernews.com (The Hacker News) on February 19, 2025 at 4:59 pm
Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. “The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app’s legitimate ‘linked devices’ feature that enables Signal to be used on multiple
- New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detectionby info@thehackernews.com (The Hacker News) on February 19, 2025 at 12:45 pm
A new variant of the Snake Keylogger malware is being used to actively target Windows users located in China, Turkey, Indonesia, Taiwan, and Spain. Fortinet FortiGuard Labs said the new version of the malware has been behind over 280 million blocked infection attempts worldwide since the start of the year. “Typically delivered through phishing emails containing malicious attachments or links,
- The Ultimate MSP Guide to Structuring and Selling vCISO Servicesby info@thehackernews.com (The Hacker News) on February 19, 2025 at 11:00 am
The growing demand for cybersecurity and compliance services presents a great opportunity for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) to offer virtual Chief Information Security Officer (vCISO) services—delivering high-level cybersecurity leadership without the cost of a full-time hire. However, transitioning to vCISO services is not without its challenges
- Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attackby info@thehackernews.com (The Hacker News) on February 19, 2025 at 9:35 am
Users who are on the lookout for popular games were lured into downloading trojanized installers that led to the deployment of a cryptocurrency miner on compromised Windows hosts. The large-scale activity has been codenamed StaryDobry by Russian cybersecurity company Kaspersky, which first detected it on December 31, 2024. It lasted for a month. Targets of the campaign include individuals and
- CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities Listby info@thehackernews.com (The Hacker News) on February 19, 2025 at 4:48 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below – CVE-2025-0108 (CVSS score: 7.8) – An authentication bypass vulnerability in the Palo Alto Networks PAN-OS
- New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Nowby info@thehackernews.com (The Hacker News) on February 18, 2025 at 3:34 pm
Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions. The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below – CVE-2025-26465 (CVSS score: 6.8)Â – The
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacksby info@thehackernews.com (The Hacker News) on February 18, 2025 at 3:09 pm
The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor’s malicious payload into an external process, waitfor.exe,
- New FrigidStealer Malware Targets macOS Users via Fake Browser Updatesby info@thehackernews.com (The Hacker News) on February 18, 2025 at 1:00 pm
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer. The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher). TA2727 is a “threat actor that uses fake
- Debunking the AI Hype: Inside Real Hacker Tacticsby info@thehackernews.com (The Hacker News) on February 18, 2025 at 12:20 pm
Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype drowning out actual, more tangible, real-world dangers? According to Picus Labs’ Red Report 2025 which analyzed over one million malware samples, there’s been no significant surge, so far, in AI-driven attacks. Yes, adversaries are definitely continuing to innovate, and while AI will certainly start playing a