The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RATby info@thehackernews.com (The Hacker News) on April 14, 2025 at 6:55 am
A threat actor with ties to Pakistan has been observed targeting various sectors in India with various remote access trojans like Xeno RAT, Spark RAT, and a previously undocumented malware family called CurlBack RAT. The activity, detected by SEQRITE in December 2024, targeted Indian entities under railway, oil and gas, and external affairs ministries, marking an expansion of the hacking crew’s
- Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploitby info@thehackernews.com (The Hacker News) on April 11, 2025 at 5:55 pm
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. “A threat actor used a known
- Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectorsby info@thehackernews.com (The Hacker News) on April 11, 2025 at 1:09 pm
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a new report published Thursday. Paper Werewolf, also known
- Initial Access Brokers Shift Tactics, Selling More for Lessby info@thehackernews.com (The Hacker News) on April 11, 2025 at 10:30 am
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals. This division of labor allows IABs to concentrate on their core expertise: exploiting vulnerabilities through methods like social engineering and brute-force attacks. By selling access, they significantly mitigate the
- Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gatewaysby info@thehackernews.com (The Hacker News) on April 11, 2025 at 8:53 am
Palo Alto Networks has revealed that it’s observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat hunters warned of a surge in suspicious login scanning activity targeting its appliances. “Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation of a
- SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Appsby info@thehackernews.com (The Hacker News) on April 11, 2025 at 8:13 am
Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains to deliver a known Android malware called SpyNote. These bogus websites masquerade as Google Play Store install pages for apps like the Chrome web browser, indicating an attempt to deceive unsuspecting users into installing the malware instead. “The threat actor utilized a
- OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitationby info@thehackernews.com (The Hacker News) on April 11, 2025 at 4:58 am
A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation within a few hours of public disclosure. The vulnerability, tracked as CVE-2025-3102 (CVSS score: 8.1), is an authorization bypass bug that could permit an attacker to create administrator accounts under certain conditions and take control of susceptible websites. “The
- Incomplete Patch in NVIDIA Toolkit Leaves CVE-2024-0132 Open to Container Escapesby info@thehackernews.com (The Hacker News) on April 10, 2025 at 2:13 pm
Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting the NVIDIA Container Toolkit that, if successfully exploited, could put sensitive data at risk. The original vulnerability CVE-2024-0132 (CVSS score: 9.0) is a Time-of-Check Time-of-Use (TOCTOU) vulnerability that could lead to a container escape attack and allow for
- Malicious npm Package Targets Atomic Wallet, Exodus Users by Swapping Crypto Addressesby info@thehackernews.com (The Hacker News) on April 10, 2025 at 12:58 pm
Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with already-installed local versions of legitimate libraries and execute malicious code in what’s seen as a sneakier attempt to stage a software supply chain attack. The newly discovered package, named pdf-to-office, masquerades as a utility for converting PDF files to Microsoft Word documents. But, in
- PlayPraetor Reloaded: CTM360 Uncovers a Play Masquerading Partyby info@thehackernews.com (The Hacker News) on April 10, 2025 at 11:25 am
Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a much larger extent of the ongoing Play Praetor campaign. What started with 6000+ URLs of a very specific banking attack has now grown to 16,000+ with multiple variants. This research is ongoing, and much more is expected to be discovered in the coming days. As before, all the newly discovered play
- The Identities Behind AI Agents: A Deep Dive Into AI & NHIby info@thehackernews.com (The Hacker News) on April 10, 2025 at 11:00 am
AI agents have rapidly evolved from experimental technology to essential business tools. The OWASP framework explicitly recognizes that Non-Human Identities play a key role in agentic AI security. Their analysis highlights how these autonomous software entities can make decisions, chain complex actions together, and operate continuously without human intervention. They’re no longer just tools,
- Gamaredon Uses Infected Removable Drives to Breach Western Military Mission in Ukraineby info@thehackernews.com (The Hacker News) on April 10, 2025 at 10:53 am
The Russia-linked threat actor known as Gamaredon (aka Shuckworm) has been attributed to a cyber attack targeting a foreign military mission based in Ukraine with an aim to deliver an updated version of a known malware called GammaSteel. The group targeted the military mission of a Western country, per the Symantec Threat Hunter team, with first signs of the malicious activity detected on
- Europol Arrests Five SmokeLoader Clients Linked by Seized Database Evidenceby info@thehackernews.com (The Hacker News) on April 10, 2025 at 9:55 am
Law enforcement authorities have announced that they tracked down the customers of the SmokeLoader malware and detained at least five individuals. “In a coordinated series of actions, customers of the Smokeloader pay-per-install botnet, operated by the actor known as ‘Superstar,’ faced consequences such as arrests, house searches, arrest warrants or ‘knock and talks,'” Europol said in a
- AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protectionsby info@thehackernews.com (The Hacker News) on April 10, 2025 at 7:15 am
Cybersecurity researchers have disclosed details of an artificial intelligence (AI) powered platform called AkiraBot that’s used to spam website chats, comment sections, and contact forms to promote dubious search engine optimization (SEO) services such as Akira and ServicewrapGO. “AkiraBot has targeted more than 400,000 websites and successfully spammed at least 80,000 websites since September
- Lovable AI Found Most Vulnerable to VibeScamming — Enabling Anyone to Build Live Scam Pagesby info@thehackernews.com (The Hacker News) on April 9, 2025 at 2:28 pm
Lovable, a generative artificial intelligence (AI) powered platform that allows for creating full-stack web applications using text-based prompts, has been found to be the most susceptible to jailbreak attacks, allowing novice and aspiring cybercrooks to set up lookalike credential harvesting pages. “As a purpose-built tool for creating and deploying web apps, its capabilities line up perfectly
- New TCESB Malware Found in Active Attacks Exploiting ESET Security Scannerby info@thehackernews.com (The Hacker News) on April 9, 2025 at 11:38 am
A Chinese-affiliated threat actor known for its cyber-attacks in Asia has been observed exploiting a security flaw in security software from ESET to deliver a previously undocumented malware codenamed TCESB. “Previously unseen in ToddyCat attacks, [TCESB] is designed to stealthily execute payloads in circumvention of protection and monitoring tools installed on the device,” Kaspersky said in an
- Explosive Growth of Non-Human Identities Creating Massive Security Blind Spotsby info@thehackernews.com (The Hacker News) on April 9, 2025 at 10:30 am
GitGuardian’s State of Secrets Sprawl report for 2025 reveals the alarming scale of secrets exposure in modern software environments. Driving this is the rapid growth of non-human identities (NHIs), which have been outnumbering human users for years. We need to get ahead of it and prepare security measures and governance for these machine identities as they continue to be deployed, creating an
- PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomwareby info@thehackernews.com (The Hacker News) on April 9, 2025 at 8:04 am
Microsoft has revealed that a now-patched security flaw impacting the Windows Common Log File System (CLFS) was exploited as a zero-day in ransomware attacks aimed at a small number of targets. “The targets include organizations in the information technology (IT) and real estate sectors of the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in
- CISA Warns of CentreStack’s Hard-Coded MachineKey Vulnerability Enabling RCE Attacksby info@thehackernews.com (The Hacker News) on April 9, 2025 at 8:00 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Gladinet CentreStack to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability, tracked as CVE-2025-30406 (CVSS score: 9.0), concerns a case of a hard-coded cryptographic key that could be abused to achieve remote
- Microsoft Patches 125 Flaws Including Actively Exploited Windows CLFS Vulnerabilityby info@thehackernews.com (The Hacker News) on April 9, 2025 at 7:06 am
Microsoft has released security fixes to address a massive set of 125 flaws affecting its software products, including one vulnerability that it said has been actively exploited in the wild. Of the 125 vulnerabilities, 11 are rated Critical, 112 are rated Important, and two are rated Low in severity. Forty-nine of these vulnerabilities are classified as privilege escalation, 34 as remote code
- Adobe Patches 11 Critical ColdFusion Flaws Amid 30 Total Vulnerabilities Discoveredby info@thehackernews.com (The Hacker News) on April 9, 2025 at 3:12 am
Adobe has released security updates to fix a fresh set of security flaws, including multiple critical-severity bugs in ColdFusion versions 2025, 2023 and 2021 that could result in arbitrary file read and code execution. Of the 30 flaws in the product, 11 are rated Critical in severity – CVE-2025-24446 (CVSS score: 9.1) – An improper input validation vulnerability that could result in an
- Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Change Flawby info@thehackernews.com (The Hacker News) on April 8, 2025 at 5:53 pm
Fortinet has released security updates to address a critical security flaw impacting FortiSwitch that could permit an attacker to make unauthorized password changes. The vulnerability, tracked as CVE-2024-48887, carries a CVSS score of 9.3 out of a maximum of 10.0. “An unverified password change vulnerability [CWE-620] in FortiSwitch GUI may allow a remote unauthenticated attacker to modify
- Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversalby info@thehackernews.com (The Hacker News) on April 8, 2025 at 4:56 pm
Cybersecurity researchers have disclosed details of a now-patched security flaw in the Amazon EC2 Simple Systems Manager (SSM) Agent that, if successfully exploited, could permit an attacker to achieve privilege escalation and code execution. The vulnerability could permit an attacker to create directories in unintended locations on the filesystem, execute arbitrary scripts with root privileges,
- Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listingsby info@thehackernews.com (The Hacker News) on April 8, 2025 at 4:07 pm
Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office. “One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office add-ins copied from a
- Agentic AI in the SOC – Dawn of Autonomous Alert Triageby info@thehackernews.com (The Hacker News) on April 8, 2025 at 11:00 am
Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases analyst fatigue, burnout, and attrition. While artificial intelligence has emerged as a go-to solution, the term “AI” often blurs crucial distinctions. Not all AI is built equal, especially in the SOC. Many