The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attackby info@thehackernews.com (The Hacker News) on January 22, 2025 at 8:49 am
A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply chain attack targeting a South Korean virtual private network (VPN) provider in 2023, according to new findings from ESET. “The attackers replaced the legitimate installer with one that also deployed the group’s signature implant that we have named SlowStepper – a
- Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Productsby info@thehackernews.com (The Hacker News) on January 22, 2025 at 7:25 am
Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU) to address 318 new security vulnerabilities spanning its products and services. The most severe of the flaws is a bug in the Oracle Agile Product Lifecycle Management (PLM) Framework (CVE-2025-21556, CVSS score: 9.9) that could allow an attacker to seize control of susceptible instances. “Easily exploitable
- Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Devicesby info@thehackernews.com (The Hacker News) on January 22, 2025 at 6:19 am
Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked a 5.6 Terabit per second (Tbps) distributed denial-of-service (DDoS) attack, the largest ever attack to be reported to date. The UDP protocol-based attack took place on October 29, 2024, targeting one of its customers, an unnamed internet service provider (ISP) from Eastern Asia. The activity originated
- Mirai Variant Murdoc Botnet Exploits AVTECH IP Cameras and Huawei Routersby info@thehackernews.com (The Hacker News) on January 21, 2025 at 2:00 pm
Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in AVTECH IP cameras and Huawei HG532 routers to rope the devices into a Mirai botnet variant dubbed Murdoc Botnet. The ongoing activity “demonstrates enhanced capabilities, exploiting vulnerabilities to compromise devices and establish expansive botnet networks,” Qualys security researcher Shilpesh
- 13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacksby info@thehackernews.com (The Hacker News) on January 21, 2025 at 12:46 pm
A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate malware via spam campaigns, the latest addition to a list of botnets powered by MikroTik devices. The activity “take[s] advantage of misconfigured DNS records to pass email protection techniques,” Infoblox security researcher David Brunsdon said in a technical report published last week. “This
- Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Partiesby info@thehackernews.com (The Hacker News) on January 21, 2025 at 10:52 am
A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receive it and attempted to cover up the activity. Asif William Rahman, 34, of Vienna, was an employee of the CIA since 2016 and had a Top Secret security clearance with access to
- HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projectsby info@thehackernews.com (The Hacker News) on January 21, 2025 at 10:30 am
Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, “Were all functionalities of the web app tested?” or ” Were there any security issues that could have been identified during testing?” often go unresolved, raising concerns about the thoroughness of the security testing. This frustration is common among many security teams. Pentest
- PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installersby info@thehackernews.com (The Hacker News) on January 21, 2025 at 5:45 am
Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT. The attacks leverage a multi-stage loader dubbed PNGPlug to deliver the ValleyRAT payload, Intezer said in a technical report published last week. The infection chain commences with a phishing
- CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Auditsby info@thehackernews.com (The Hacker News) on January 21, 2025 at 5:27 am
The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests claim to be for conducting an audit to assess the “level of security,” CERT-UA added, cautioning organizations to be on the lookout for such social engineering attempts that seek to
- Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routersby info@thehackernews.com (The Hacker News) on January 20, 2025 at 3:08 pm
New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. “Internet hosts that accept tunneling packets without verifying the sender’s identity can be hijacked to perform anonymous attacks and provide access to their networks,” Top10VPN said in a study, as part of a collaboration with KU Leuven professor
- DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collectionby info@thehackernews.com (The Hacker News) on January 20, 2025 at 2:53 pm
The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem (meaning “organization” in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications to the
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]by info@thehackernews.com (The Hacker News) on January 20, 2025 at 12:02 pm
As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that can’t be fought with
- Product Walkthrough: How Satori Secures Sensitive Data From Production to AIby info@thehackernews.com (The Hacker News) on January 20, 2025 at 11:10 am
Every week seems to bring news of another data breach, and it’s no surprise why: securing sensitive data has become harder than ever. And it’s not just because companies are dealing with orders of magnitude more data. Data flows and user roles are constantly shifting, and data is stored across multiple technologies and cloud environments. Not to mention, compliance requirements are only getting
- Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTPby info@thehackernews.com (The Hacker News) on January 20, 2025 at 5:45 am
Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems. The list of identified packages is below – @async-mutex/mutex, a typosquat of async-mute (npm) dexscreener, which masquerades as a library for accessing liquidity pool
- TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025by info@thehackernews.com (The Hacker News) on January 19, 2025 at 5:24 am
Popular video-sharing social network TikTok has officially gone dark in the United States, as a federal ban on the app comes into effect on January 19, 2025. “We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable,” the company said in a pop-up message. “We’re working to restore our service in the U.S. as soon as possible
- U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Salt Typhoonby info@thehackernews.com (The Hacker News) on January 18, 2025 at 6:06 am
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency. “People’s Republic of China-linked (PRC) malicious cyber actors continue to target U.S. government systems, including the recent
- Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitationby info@thehackernews.com (The Hacker News) on January 17, 2025 at 2:08 pm
Cybersecurity researchers have disclosed three security flaws in Planet Technology’s WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices. “These switches are widely used in building and home automation systems for a variety of networking applications,” Claroty’s Tomer Goldschmidt said in a Thursday report. “An attacker
- Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferationby info@thehackernews.com (The Hacker News) on January 17, 2025 at 1:06 pm
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia. “Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps,” Imperva researcher Daniel Johnston said in an analysis. “These attacks
- How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?by info@thehackernews.com (The Hacker News) on January 17, 2025 at 10:21 am
Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access,
- U.S. Sanctions North Korean IT Worker Network Supporting WMD Programsby info@thehackernews.com (The Hacker News) on January 17, 2025 at 10:07 am
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People’s Republic of Korea (DPRK) by dispatching IT workers around the world to obtain employment and draw a steady source of income for the regime in violation of international sanctions. “These
- New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypassby info@thehackernews.com (The Hacker News) on January 17, 2025 at 10:07 am
Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that’s capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least October 2024. The nascent phishing kit has been dubbed Sneaky 2FA by French cybersecurity company Sekoia, which detected it in the wild in December. Nearly 100 domains hosting
- European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to Chinaby info@thehackernews.com (The Hacker News) on January 17, 2025 at 4:14 am
Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, Temu, WeChat, and Xiaomi of violating data protection regulations in the European Union by unlawfully transferring users’ data to China. The advocacy group is seeking an immediate suspension of such transfers, stating the companies in question cannot shield user data
- Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaignby info@thehackernews.com (The Hacker News) on January 16, 2025 at 6:12 pm
The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims’ WhatsApp accounts, signaling a departure from its longstanding tradecraft in a likely attempt to evade detection. “Star Blizzard’s targets are most commonly related to government or diplomacy (both incumbent and former position holders), defense policy or international relations
- Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Actionby info@thehackernews.com (The Hacker News) on January 16, 2025 at 12:25 pm
The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than you can count, and compliance requirements are tightening by the day. Keeping up with it all can feel like trying to juggle chainsaws while riding a unicycle. Traditional trust management? Forget it. It’s simply not built for today’s fast-paced, hybrid environments. You need a
- The $10 Cyber Threat Responsible for the Biggest Breaches of 2024by info@thehackernews.com (The Hacker News) on January 16, 2025 at 11:30 am
You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Verizon). Cybersecurity budgets grew again in 2024, with organizations now spending almost $1,100 per user (Source: Forrester). Stolen credentials on criminal forums cost as