<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News Archives - Online Pitstop</title>
	<atom:link href="https://onlinepitstop.com/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://onlinepitstop.com/category/news/</link>
	<description>The best source for news on cybersecurity, cybercrime, privacy and more.</description>
	<lastBuildDate>Sat, 01 Mar 2025 01:03:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone</title>
		<link>https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/</link>
					<comments>https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 01 Mar 2025 01:03:51 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/</guid>

					<description><![CDATA[<p>&#xE802;Feb 28, 2025&#xE804;Ravie LakshmananMobile Security / Zero-Day A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. &#8220;The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android</p>
<p>The post <a href="https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/">Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 28, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Mobile Security / Zero-Day</span></p>
</div>
<div id="articlebody" readability="107.51699663803">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf4g-SMzauU7AoANXasCQJWZ3ggBAs1-_HL5aXP6Vw8kf_ESVKTjOnWN0am_qLHCNYTOlQajxJmSUwLTiDzi_Cg5w2xu4PUdCd66EJItIYQyNjZQfmx1tfjuz56QUBA3tlGByU-2ab2H6pmZiGq0_eD1FapY58j1YFljL0uTaK8Sh_nfum8n1W7ycMVBaS/s728-rw-e365/phone-hacking.png"></a></div>
<p>A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International.</p>
<p>&#8220;The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite,&#8221; the international non-governmental organization <a href="https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/" rel="noopener" target="_blank">said</a>, adding the traces of the exploit were discovered in a separate case in mid-2024.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img fetchpriority="high" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>The vulnerability in question is <a href="https://thehackernews.com/2025/02/google-patches-47-android-security.html" rel="noopener" target="_blank">CVE-2024-53104</a> (CVSS score: 7.8), a case of privilege escalation in a kernel component known as the USB Video Class (UVC) driver. A patch for the flaw was addressed in the Linux kernel in December 2024. It was subsequently addressed in Android earlier this month.</p>
<p>It&#8217;s believed that CVE-2024-53104 was combined with two other flaws &#x2013; CVE-2024-53197 and CVE-2024-50302 &#x2013; both of which have been resolved in the Linux kernel. They are yet to be included in an Android Security Bulletin.</p>
<ul>
<li><strong><a href="https://lore.kernel.org/linux-cve-announce/2024122725-CVE-2024-53197-6aef@gregkh/" rel="noopener" target="_blank">CVE-2024-53197</a></strong> (CVSS score: N/A) &#8211; An out-of-bounds access vulnerability for Extigy and Mbox devices</li>
<li><strong><a href="https://lore.kernel.org/linux-cve-announce/2024111908-CVE-2024-50302-f677@gregkh/" rel="noopener" target="_blank">CVE-2024-50302</a></strong> (CVSS score: 5.5) &#8211; A use of an uninitialized resource vulnerability that could be used to leak kernel memory</li>
</ul>
<p>&#8220;The exploit, which targeted Linux kernel USB drivers, enabled Cellebrite customers with physical access to a locked Android device to bypass an Android phone&#8217;s lock screen and gain privileged access on the device,&#8221; Amnesty said.</p>
<p>&#8220;This case highlights how real-world attackers are exploiting Android&#8217;s USB attack surface, taking advantage of the broad range of legacy USB kernel drivers supported in the Linux kernel.&#8221;</p>
<p>The activist, who has been given the name &#8220;Vedran&#8221; to protect their privacy, was taken to a police station and his phone confiscated on December 25, 2024, after he attended a student protest in Belgrade.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>Amnesty&#8217;s analysis found that the exploit was used to unlock his Samsung Galaxy A32 and that the authorities attempted to install an unknown Android application. While the exact nature of the Android app remains unclear, the modus operandi is consistent with that of prior <a href="https://thehackernews.com/2024/12/novispy-spyware-installed-on.html" rel="noopener" target="_blank">NoviSpy spyware</a> infections reported in mid-December 2024. </p>
<p>Earlier this week, Cellebrite <a href="https://cellebrite.com/en/cellebrite-statement-about-amnesty-international-report/" rel="noopener" target="_blank">said</a> its tools are not designed to facilitate any type of offensive cyber activity and that it works actively to curtail the misuse of its technology.</p>
<p>The Israeli company also said it will no longer allow Serbia to use its software, stating &#8220;we found it appropriate to stop the use of our products by the relevant customers at this time.&#8221;</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/">Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/03/01/amnesty-finds-cellebrites-zero-day-used-to-unlock-serbian-activists-android-phone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations</title>
		<link>https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/</link>
					<comments>https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 28 Feb 2025 01:02:42 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/</guid>

					<description><![CDATA[<p>&#xE802;Feb 27, 2025&#xE804;Ravie LakshmananMalware / Threat Intelligence A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 as part of phishing emails masquerading as the country&#8217;s National Taxation Bureau. The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged malicious game-related applications.</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/">Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 27, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Malware / Threat Intelligence</span></p>
</div>
<div id="articlebody" readability="143.79468845761">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg47PL0ZbHS5btqMcc81H_gNFpwCPZc8VuxdgAShybUmXcbRc6nsQdag75fgmGIuAxd2vFn8YnJQMJ8enagDtby_mqJk9FJAaNrgP6i664TFTzsvFrwz4QJ7j17djIYUKCRCZ-e7JzGwsv-lSEHF9pfhv306I26pQ-Y7vgMwJ7Sc2jsnwb1jQ3Fn3CzW89_/s728-rw-e365/hackers.png"></a></div>
<p>A new campaign is targeting companies in Taiwan with malware known as <strong>Winos 4.0</strong> as part of phishing emails masquerading as the country&#8217;s National Taxation Bureau.</p>
<p>The campaign, detected last month by Fortinet FortiGuard Labs, marks a departure from previous attack chains that have leveraged <a href="https://thehackernews.com/2024/11/new-winos-40-malware-infects-gamers.html" rel="noopener" target="_blank">malicious game-related applications</a>.</p>
<p>&#8220;The sender claimed that the malicious file attached was a list of enterprises scheduled for tax inspection and asked the receiver to forward the information to their company&#8217;s treasurer,&#8221; security researcher Pei Han Liao <a href="https://www.fortinet.com/blog/threat-research/winos-spreads-via-impersonation-of-official-email-to-target-users-in-taiwan" rel="noopener" target="_blank">said</a> in a report shared with The Hacker News.</p>
<p>The attachment mimics an official document from the Ministry of Finance, urging the recipient to download the list of enterprises scheduled for tax inspection.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>But in reality, the list is a ZIP file containing a malicious DLL (&#8220;lastbld2Base.dll&#8221;) that lays the groundwork for the next attack stage, leading to the execution of shellcode that&#8217;s responsible for downloading a Winos 4.0 module from a remote server (&#8220;206.238.221[.]60&#8221;) for gathering sensitive data.</p>
<p>The component, described as a login module, is capable of taking screenshots, logging keystrokes, altering clipboard content, monitoring connected USB devices, running shellcode, and permitting the execution of sensitive actions (e.g., cmd.exe) when security prompts from Kingsoft Security and Huorong are displayed.</p>
<p>Fortinet said it also observed a second attack chain that downloads an <a href="https://www.esentire.com/blog/winos4-0-online-module-staging-component-used-in-cleversoar-campaign" rel="noopener" target="_blank">online module</a> that can capture screenshots of WeChat and online banks.</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbnRoNBDygoMABKioZAKGWpr-tg8K6YxcDzKVfdV5d_fq6YTq-pSYyydokyhNVcvU5uJMG5ABNt6-QftbMxCoOIS1b25coSKn6sy9plCwU-vcsITf9fhoYziDhFmPxskrLIY_qay4td2HbEv_IkiY2GZXOtdTQDfnzu8WauoxGPCtQZIyTEWeeKHy92HgN/s728-rw-e365/cyber.jpeg"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbnRoNBDygoMABKioZAKGWpr-tg8K6YxcDzKVfdV5d_fq6YTq-pSYyydokyhNVcvU5uJMG5ABNt6-QftbMxCoOIS1b25coSKn6sy9plCwU-vcsITf9fhoYziDhFmPxskrLIY_qay4td2HbEv_IkiY2GZXOtdTQDfnzu8WauoxGPCtQZIyTEWeeKHy92HgN/s728-rw-e365/cyber.jpeg" alt="" border="0" data-original-height="316" data-original-width="1091"></a></div>
<p>It&#8217;s worth noting that the <a href="https://hunt.io/blog/unearthing-new-infrastructure-by-revisiting-past-threat-reports" rel="noopener" target="_blank">intrusion set</a> distributing the Winos 4.0 malware has been assigned the monikers Void Arachne and Silver Fox, with the malware also overlapping with <a href="https://thehackernews.com/2024/08/multi-stage-valleyrat-targets-chinese.html" rel="noopener" target="_blank">another remote access trojan</a> tracked as <a href="https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html" rel="noopener" target="_blank">ValleyRAT</a>.</p>
<p>&#8220;They are both derived from the same source: Gh0st RAT, which was developed in China and open-sourced in 2008,&#8221; Daniel dos Santos, Head of Security Research at Forescout&#8217;s Vedere Labs, told The Hacker News.</p>
<p>&#8220;Winos and ValleyRAT are variations of Gh0st RAT attributed to Silver Fox by different researchers at different points in time. Winos was a name commonly used in 2023 and 2024 while now ValleyRAT is more commonly used. The tool is constantly evolving, and it has both local Trojan/RAT capabilities as well as a command-and-control server.&#8221;</p>
<p><a href="https://www.splunk.com/en_us/blog/security/valleyrat-insights-tactics-techniques-and-detection-methods.html" rel="noopener" target="_blank">ValleyRAT</a>, first identified in early 2023, has been recently observed using fake Chrome sites as a conduit to infect Chinese-speaking users. Similar drive-by download schemes have also been employed to deliver Gh0st RAT.</p>
<p>Furthermore, Winos 4.0 attack chains have incorporated what&#8217;s called a CleverSoar installer that&#8217;s executed by means of an MSI installer package distributed as fake software or gaming-related applications. Also dropped alongside Winos 4.0 via CleverSoar is the open-source <a href="https://github.com/Idov31/Nidhogg" rel="noopener" target="_blank">Nidhogg</a> rootkit. </p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>&#8220;The CleverSoar installer [&#8230;] checks the user&#8217;s language settings to verify if they are set to Chinese or Vietnamese,&#8221; Rapid7 <a href="https://www.rapid7.com/blog/post/2024/11/27/new-cleversoar-installer-targets-chinese-and-vietnamese-users/" rel="noopener" target="_blank">noted</a> in late November 2024. &#8220;If the language is not recognized, the installer terminates, effectively preventing infection. This behavior strongly suggests that the threat actor is primarily targeting victims in these regions.&#8221;</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid8BktR182U26Pj1ygUARaboBStyAjgIjGwsS9rVZLym8awmIo4ioWGfjZw7icq6JSJwUpJ_OkAgxjg9jTye-HPPDLFvPu4nu6B0tdtvncON1sUZjlhigJe1hR20xvLFuLW6aXliMenQw-cXQ4cL8viEEFhlKcXV7K_jbeRTxNMKmMBlef0ATfLvaJqOAS/s728-rw-e365/chain.png"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid8BktR182U26Pj1ygUARaboBStyAjgIjGwsS9rVZLym8awmIo4ioWGfjZw7icq6JSJwUpJ_OkAgxjg9jTye-HPPDLFvPu4nu6B0tdtvncON1sUZjlhigJe1hR20xvLFuLW6aXliMenQw-cXQ4cL8viEEFhlKcXV7K_jbeRTxNMKmMBlef0ATfLvaJqOAS/s728-rw-e365/chain.png" alt="" border="0" data-original-height="2062" data-original-width="1920"></a></div>
<p>The disclosure comes as the Silver Fox APT has been linked to a new campaign that leverages trojanized versions of Philips DICOM viewers to deploy ValleyRAT, which is then used to drop a keylogger, and a cryptocurrency miner on victim computers. Notably, the attacks have been found to use a vulnerable version of the <a href="https://thehackernews.com/2025/02/2500-truesightsys-driver-variants.html" rel="noopener" target="_blank">TrueSight driver</a> to disable antivirus software.</p>
<p>&#8220;This campaign leverages trojanized DICOM viewers as lures to infect victim systems with a backdoor (ValleyRAT) for remote access and control, a keylogger to capture user activity and credentials, and a crypto miner to exploit system resources for financial gain,&#8221; Forescout <a href="https://www.forescout.com/blog/healthcare-malware-hunt-part-1-silver-fox-apt-targets-philips-dicom-viewers/" rel="noopener" target="_blank">said</a>.</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/">Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/28/silver-fox-apt-uses-winos-4-0-malware-in-cyber-attacks-against-taiwanese-organizations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites</title>
		<link>https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/</link>
					<comments>https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 00:56:26 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/</guid>

					<description><![CDATA[<p>A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale. Security researcher Oleg Zaytsev, in a report shared with The Hacker News, said the campaign &#x2013;</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/">Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrli4on3bnY-JlZOnd00-z4le2y6JZ1fRGH4kA8PoCbSbLKGHQAbUxrQ1bAZ23_VzSSn8qgc0L-SU1I36IW8IQNnCA84kTWMFoW_tPpeCZV-q2cXaC7b6_BR5oK7WoD-pDbqm4RzdFGvK25gWBjxyZN4ZEQZzLnNJINsF4z164FHwq8BHmUN55zIsDhZmE/s728-rw-e365/xss.png"></a></div>
<p>A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search results and fueling a spam ads campaign at scale.</p>
<p>Security researcher Oleg Zaytsev, in a report shared with The Hacker News, said the campaign &#x2013; dubbed <strong>360XSS</strong> &#x2013; affected over 350 websites, including government portals, U.S. state government sites, American universities, major hotel chains, news outlets, car dealerships, and several Fortune 500 companies.</p>
<p>&#8220;This wasn&#8217;t just a spam operation,&#8221; the researcher <a href="https://olegzay.com/360xss/" rel="noopener" target="_blank">said</a>. &#8220;It was an industrial-scale abuse of trusted domains.&#8221;</p>
<p>All these websites have one thing in common: A popular framework called <a href="https://krpano.com/home/" rel="noopener" target="_blank">Krpano</a> that&#8217;s used to embed 360&#xB0; images and videos to facilitate interactive virtual tours and VR experiences. </p>
<p>Zaytsev said he stumbled upon the campaign after coming across a pornography-related ad listed on Google Search but with a domain associated with Yale University (&#8220;virtualtour.quantuminstitute.yale[.]edu&#8221;).</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>A notable aspect of these URLs is an XML parameter that&#8217;s designed to redirect the site visitor to a second URL that belongs to another legitimate website, which is then used to execute a Base64-encoded payload via an XML document. The decoded payload, for its part, fetches the target URL (i.e., the ad) from yet another legitimate site.</p>
<p>The XML parameter passed in the original URL served in the search results is part of a broader configuration setting named &#8220;<a href="https://krpano.com/docu/embedpano/#passQueryParameters" rel="noopener" target="_blank">passQueryParameters</a>&#8221; that&#8217;s <a href="https://krpano.com/docu/embedpano/#embeddingparameters" rel="noopener" target="_blank">used</a> when <a href="https://krpano.com/docu/embedpano/#embedpano" rel="noopener" target="_blank">embedding a Krpano panorama viewer</a> into an HTML page. It&#8217;s specifically designed to pass HTTP parameters from the URL to the viewer.</p>
<p>The security issue here is that if the option is enabled, it opens the door to a scenario where an attacker could use a specially crafted URL to execute a malicious script in a victim&#8217;s web browser when the vulnerable site is visited.</p>
<p>Indeed, a <a href="https://thehackernews.com/2023/05/new-vulnerability-in-popular-wordpress.html" rel="noopener" target="_blank">reflected XSS flaw</a> arising as a result of this behavior was disclosed in Krpano in late 2020 (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-24901" rel="noopener" target="_blank">CVE-2020-24901</a>, CVSS score: 6.1), indicating that the <a href="https://packetstorm.news/files/id/159477" rel="noopener" target="_blank">potential for abuse</a> has been publicly known for over four years.</p>
<p>While an update introduced in version 1.20.10 restricted &#8220;passQueryParameters&#8221; to an allowlist in an attempt to prevent such XSS attacks from taking place, Zaytsev found that explicitly adding the XML parameter to the allowlist reintroduced the XSS risk.</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTh3TvVmldQXa0Z0Vu-YZidxaicmydZadyJt26BrJZc4KHU2Vp9z32ONJaRSjfOIIYVvePefaretvN1WyFiv1pyc5hnP1dib7R9bGQ_c-8sjJKg_scPKSahbUwa64KbLxPxOk62Ioxr5bvL_bmZTgj7E5wN3rY9-RzR9I6tDo_PtYDCm8k7sZsQADDB5e0/s728-rw-e365/reflected.png"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTh3TvVmldQXa0Z0Vu-YZidxaicmydZadyJt26BrJZc4KHU2Vp9z32ONJaRSjfOIIYVvePefaretvN1WyFiv1pyc5hnP1dib7R9bGQ_c-8sjJKg_scPKSahbUwa64KbLxPxOk62Ioxr5bvL_bmZTgj7E5wN3rY9-RzR9I6tDo_PtYDCm8k7sZsQADDB5e0/s728-rw-e365/reflected.png" alt="" border="0" data-original-height="802" data-original-width="728"></a></div>
<p>&#8220;Since version 1.20.10, Krpano&#8217;s default installation was not vulnerable,&#8221; the researcher told The Hacker News via email. &#8220;However, configuring passQueryParameter in combination with the XML parameter allowed external XML configuration via the URL, leading to an XSS risk.&#8221;</p>
<p>&#8220;The exploited versions I&#8217;ve come across were primarily older ones, predating version 1.20.10.&#8221;</p>
<p>The campaign, per Zaytsev, has leveraged this weakness to hijack over 350 sites to serve sketchy ads related to pornography, diet supplements, online casinos, and fake news sites. What&#8217;s more, some of these pages have been weaponized to boost YouTube video views.</p>
<p>The campaign is noteworthy, not least because it abuses the trust and credibility of legitimate domains to show up prominently in search results, a technique called <a href="https://www.crowdstrike.com/en-us/cybersecurity-101/social-engineering/seo-poisoning/" rel="noopener" target="_blank">search engine optimization (SEO) poisoning</a>, which, in turn, is accomplished by abusing the XSS flaw.</p>
<p>&#8220;A reflected XSS is a fun vulnerability but on its own requires user interaction, and one of the biggest challenges is to make people click your reflected XSS link,&#8221; Zaytsev said. &#8220;So using search engines as a distribution platform for your XSS is a very creative and cool way to do it.&#8221;</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v1-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc0hgq4JZKi-PJjUZ4kdb5ficmXr3IPOg6noFF558_qZ-gXm7vb0OzXU0NzsPAxaqca2tLI5j8NgJW731W0_CuPrUerOmSrZSt4IeANQp6VAQsIAQUzv6aJsxBD6poxHfELq0bcbeevSVy5AyOb9ganALMoA140nZoLOtSb0ck2AZ5rZgb9mWDEyVsbvqK/s728-rw-e100/saas-security-v1-d.png" width="727" height="90"></a></center></div>
<p>Following responsible disclosure, the latest release of Krpano eliminates support for external configuration via the XML parameter, thereby mitigating the risk of XSS attacks even when the setting is used.</p>
<p>&#8220;Improved embedpano() passQueryParameters security: data-urls and external URLs are generally not allowed as parameter values anymore and URLs for the XML parameter are limited to be within the current folder structure,&#8221; according to the <a href="https://krpano.com/docu/releasenotes/?version=122#top" rel="noopener" target="_blank">release notes</a> for version 1.22.4 released this week.</p>
<p>It&#8217;s currently not known who is behind the massive operation, although the abuse of an XSS flaw to serve just redirects, as opposed to carrying out more nefarious attacks like credential or cookie theft, raises the possibility of an ad firm with questionable practices that&#8217;s serving these ads as a monetization strategy.</p>
<p>Users of Krpano are advised to update their installations to the latest version and set the &#8220;passQueryParameters&#8221; setting to false. Affected website owners are recommended to find and remove infected pages via Google Search Console.</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/">Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/27/hackers-exploited-krpano-framework-flaw-to-inject-spam-ads-on-350-websites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile</title>
		<link>https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/</link>
					<comments>https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 00:53:50 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/</guid>

					<description><![CDATA[<p>Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram. LightSpy is the name given to a modular spyware that&#8217;s capable of infecting both Windows and Apple systems with an aim to</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/">LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGm9noFp1eI7IArSFLOgpwpoAA697U1EihVY3xgHyJtDSqAJ0RVrtRE8hyphenhyphenPrU4dxb2ESsv-B1jhfUKxlVa51jx2ck54la5PNpEHB1_if3uMHz5tc_U4AQhX1f4fRV7YHV2OcwdjIzQjeRlpyAvfgDWz9N2KnxhfDEiWXIVUGZ0tQUtplq4BJl2j5Kwm61m/s728-rw-e365/spyware.png"></a></div>
<p>Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram.</p>
<p>LightSpy is the name given to a <a href="https://thehackernews.com/2024/10/new-lightspy-spyware-version-targets.html" rel="noopener" target="_blank">modular spyware</a> that&#8217;s <a href="https://thehackernews.com/2024/06/lightspy-spywares-macos-variant-found.html" rel="noopener" target="_blank">capable</a> of infecting both Windows and Apple systems with an aim to harvest data. It was first documented in 2020, targeting users in Hong Kong.</p>
<p>This includes Wi-Fi network information, screenshots, location, iCloud Keychain, sound recordings, photos, browser history, contacts, call history, and SMS messages, and data from various apps like Files, LINE, Mail Master, Telegram, Tencent QQ, WeChat, and WhatsApp.</p>
<p>Late last year, ThreatFabric detailed an updated version of the malware that incorporates destructive capabilities to prevent the compromised device from booting up, alongside expanding the number of supported plugins from 12 to 28.</p>
<p>Previous findings have also uncovered potential overlaps between LightSpy and an Android malware named <a href="https://thehackernews.com/2023/10/researchers-link-dragonegg-android.html" rel="noopener" target="_blank">DragonEgg</a>, highlighting the cross-platform nature of the threat.</p>
<p>Hunt.io&#8217;s latest analysis of the malicious command-and-control (C2) infrastructure associated with the spyware has uncovered support for over 100 commands spanning Android, iOS, Windows, macOS, routers, and Linux.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>&#8220;The new command list shifts focus from direct data collection to broader operational control, including transmission management (&#8216;&#x4F20;&#x8F93;&#x63A7;&#x5236;&#8217;) and plugin version tracking (&#8216;&#x4E0A;&#x4F20;&#x63D2;&#x4EF6;&#x7248;&#x672C;&#x8BE6;&#x7EC6;&#x4FE1;&#x606F;&#8217;),&#8221; the company <a href="https://hunt.io/blog/lightspy-malware-targets-facebook-instagram" rel="noopener" target="_blank">said</a>.</p>
<p>&#8220;These additions suggest a more flexible and adaptable framework, allowing LightSpy operators to manage deployments more efficiently across multiple platforms.&#8221;</p>
<p>Notable among the new commands is the ability to target Facebook and Instagram application database files for data extraction from Android devices. But in an interesting twist, the threat actors have removed iOS plugins associated with destructive actions on the victim host.</p>
<p>Also discovered are 15 Windows-specific plugins designed for system surveillance and data collection, with most of them geared towards keylogging, audio recording, and USB interaction.</p>
<p>The threat intelligence firm said it also discovered an endpoint (&#8220;/phone/phoneinfo&#8221;) in the admin panel that grants logged-in users the ability to remotely control the infected mobile devices. It&#8217;s currently not known if these represent new developments or previously undocumented older versions.</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2XLNCGEjHvHCMHofeWcNtD1ooYW8LVTQah04YTVmhIMp-1_RH8VNpeZeemYQJ59S0-6QtHBuKRwHKZvAssN9hn2Mk7nUqVsvSQ2MdXRSoaMI4KCc_SenbA1uyCSjnLRj-oTa0l8T3Up-3qp0Jl5O-mmTjy01nx7E-v4mmHg-3dxnHSHHlf37j7-m5uuy3/s728-rw-e365/code.png"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2XLNCGEjHvHCMHofeWcNtD1ooYW8LVTQah04YTVmhIMp-1_RH8VNpeZeemYQJ59S0-6QtHBuKRwHKZvAssN9hn2Mk7nUqVsvSQ2MdXRSoaMI4KCc_SenbA1uyCSjnLRj-oTa0l8T3Up-3qp0Jl5O-mmTjy01nx7E-v4mmHg-3dxnHSHHlf37j7-m5uuy3/s728-rw-e365/code.png" alt="" border="0" data-original-height="1238" data-original-width="1920"></a></div>
<p>&#8220;The shift from targeting messaging applications to Facebook and Instagram expands LightSpy&#8217;s ability to collect private messages, contact lists, and account metadata from widely used social platforms,&#8221; Hunt.io said.</p>
<p>&#8220;Extracting these database files could provide attackers with stored conversations, user connections, and potentially session-related data, increasing surveillance capabilities and opportunities for further exploitation.&#8221;</p>
<p>The disclosure comes as Cyfirma disclosed details of an Android malware dubbed SpyLend that masquerades as a financial app named Finance Simplified (APK name &#8220;com.someca.count&#8221;) on the Google Play Store but engages in <a href="https://thehackernews.com/2024/12/8-million-android-users-hit-by-spyloan.html" rel="noopener" target="_blank">predatory lending, blackmail, and extortion</a> aimed at Indian users.</p>
<p>&#8220;By leveraging location-based targeting, the app displays a list of unauthorized loan apps that operate entirely within WebView, allowing attackers to bypass Play Store scrutiny,&#8221; the company <a href="https://www.cyfirma.com/research/spylend-the-android-app-available-on-google-play-store-enabling-financial-cyber-crime-extortion/" rel="noopener" target="_blank">said</a>.</p>
<p>&#8220;Once installed, these loan apps harvest sensitive user data, enforce exploitative lending practices, and employ blackmail tactics to extort money.&#8221;</p>
<p>Some of the advertised loan apps are KreditPro (formerly KreditApple), MoneyAPE, StashFur, Fairbalance, and PokketMe. Users who install Finance Simplified from outside India are served a harmless WebView that lists various calculators for personal finance, accounting, and taxation, suggesting that the campaign is designed to specifically target Indian users. </p>
<p>The app is no longer available for download from the official Android app marketplace. According to statistics available on Sensor Tower, the application was <a href="https://app.sensortower.com/overview/com.someca.count?country=IN" rel="noopener" target="_blank">published</a> around mid-December 2024 and attracted over 100,000 installations.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>&#8220;Initially presented as a harmless finance management application, it downloads a fraud loan app from an external download URL, which once installed, gains extensive permissions to access sensitive data, including files, contacts, call logs, SMS, clipboard content, and even the camera,&#8221; Cyfirma pointed out.</p>
<p>Indian retail banking customers have also become the target of another campaign that distributes a malware codenamed FinStealer that impersonates legitimate bank apps, but is engineered to collect login credentials and facilitate financial fraud by carrying out unauthorized transactions. </p>
<p>&#8220;Distributed via phishing links, and social engineering, these fake apps closely mimic legitimate bank apps, tricking users into revealing credentials, financial data, and personal details,&#8221; the company <a href="https://www.cyfirma.com/research/finstealer/" rel="noopener" target="_blank">said</a>.</p>
<p>&#8220;Using Telegram bots, the malware can receive instructions and send stolen data without raising suspicion, making it more difficult for security systems to detect and block the communication.&#8221;</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/">LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/26/lightspy-expands-to-100-commands-increasing-control-over-windows-macos-linux-and-mobile/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer</title>
		<link>https://onlinepitstop.com/2025/02/25/new-malware-campaign-uses-cracked-software-to-spread-lumma-and-acr-stealer/</link>
					<comments>https://onlinepitstop.com/2025/02/25/new-malware-campaign-uses-cracked-software-to-spread-lumma-and-acr-stealer/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 25 Feb 2025 00:53:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/25/new-malware-campaign-uses-cracked-software-to-spread-lumma-and-acr-stealer/</guid>

					<description><![CDATA[<p>&#xE802;Feb 24, 2025&#xE804;Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer. The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025.</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/25/new-malware-campaign-uses-cracked-software-to-spread-lumma-and-acr-stealer/">New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 24, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Endpoint Security / Vulnerability</span></p>
</div>
<div id="articlebody" readability="147.47855648536">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6EffrLfFTPYahQyckyigmIt0em2HqYnUbK4udLsjx6bc9PZhyywdC7bB80YnH-XC1YTifwpspmscYMe_LddhnjKkySyMNXuXtIJ_-JyoiUm9DRL7J2HGGKT8-qky99xeMkFskahlzC0bgi0xvxYAfeEvNizZHVWJdpvzevjC8jjuPqUkgdSplmAzDWh6p/s728-rw-e365/ads.png"></a></div>
<p>Cybersecurity researchers are warning of a new campaign that leverages cracked versions of software as a lure to distribute information stealers like Lumma and ACR Stealer.</p>
<p>The AhnLab Security Intelligence Center (ASEC) said it has observed a spike in the distribution volume of ACR Stealer since January 2025.</p>
<p>A notable aspect of the stealer malware is the use of a technique called <a href="https://attack.mitre.org/techniques/T1102/001/" rel="noopener" target="_blank">dead drop resolver</a> to extract the actual command-and-control (C2) server. This includes relying on legitimate services like Steam, Telegram&#8217;s Telegraph, Google Forms, and Google Slides.</p>
<p>&#8220;Threat actors enter the actual C2 domain in Base64 encoding on a specific page,&#8221; ASEC <a href="https://asec.ahnlab.com/en/86390/" rel="noopener" target="_blank">said</a>. &#8220;The malware accesses this page, parses the string, and obtains the actual C2 domain address to perform malicious behaviors.&#8221;</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>ACR Stealer, previously <a href="https://thehackernews.com/2024/07/microsoft-defender-flaw-exploited-to.html" rel="noopener" target="_blank">distributed</a> via Hijack Loader malware, is capable of harvesting a wide range of information from compromised systems, including files, web browser data, and cryptocurrency wallet extensions.</p>
<p>The development comes as ASEC revealed another campaign that uses files with the extension &#8220;MSC,&#8221; which can be executed by the Microsoft Management Console (MMC), to deliver the <a href="https://thehackernews.com/2024/10/ai-powered-rhadamanthys-stealer-targets.html" rel="noopener" target="_blank">Rhadamanthys</a> stealer malware.</p>
<p>&#8220;There are two types of MSC malware: one exploits the vulnerability of apds.dll (CVE-2024-43572), and the other executes the &#8216;command&#8217; command using Console Taskpad,&#8221; the South Korean company <a href="https://asec.ahnlab.com/en/86391/" rel="noopener" target="_blank">said</a>.</p>
<p>&#8220;The MSC file is disguised as an MS Word document. &#8220;When the &#8216;Open&#8217; button is clicked, it downloads and executes a PowerShell script from an external source. The downloaded PowerShell script contains an EXE file (Rhadamanthys).&#8221;</p>
<p>CVE-2024-43572, also called <a href="https://thehackernews.com/2024/06/new-attack-technique-exploits-microsoft.html" rel="noopener" target="_blank">GrimResource</a>, was first documented by the Elastic Security Labs in June 2024 as having been exploited by malicious actors as a zero-day. It was <a href="https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html" rel="noopener" target="_blank">patched</a> by Microsoft in October 2024.</p>
<p>Malware campaigns have also been <a href="https://any.run/cybersecurity-blog/zhong-stealer-malware-analysis/" rel="noopener" target="_blank">observed</a> exploiting chat support platforms like Zendesk, masquerading as customers to trick unsuspecting support agents into downloading a stealer called Zhong Stealer.</p>
<p>According to a recent report published by Hudson Rock, over 30,000,000 computers have been infected by information stealers in the &#8220;past few years,&#8221; leading to the theft of corporate credentials and session cookies that could then be sold by cybercriminals on underground forums to other actors for profit.</p>
<p>The buyers could weaponize the access afforded by these credentials to stage post-exploitation actions of their own, leading to severe risks. These developments serve to highlight the role played by stealer malware as an <a href="https://thehackernews.com/2024/06/snowflake-breach-exposes-165-customers.html" rel="noopener" target="_blank">initial access vector</a> that provides a foothold to sensitive corporate environments.</p>
<p>&#8220;For as little as $10 per log (computer), cybercriminals can purchase stolen data from employees working in classified defense and military sectors,&#8221; Hudson Rock <a href="https://www.infostealers.com/article/infostealing-malware-infections-in-the-u-s-military-defense-sector-a-cybersecurity-disaster-in-the-making/" rel="noopener" target="_blank">said</a>. &#8220;Infostealer intelligence isn&#8217;t just about detecting who&#8217;s infected&#x200A;&#x2014;&#x200A;it&#8217;s about understanding the full network of compromised credentials and third-party risks.&#8221;</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v1-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc0hgq4JZKi-PJjUZ4kdb5ficmXr3IPOg6noFF558_qZ-gXm7vb0OzXU0NzsPAxaqca2tLI5j8NgJW731W0_CuPrUerOmSrZSt4IeANQp6VAQsIAQUzv6aJsxBD6poxHfELq0bcbeevSVy5AyOb9ganALMoA140nZoLOtSb0ck2AZ5rZgb9mWDEyVsbvqK/s728-rw-e100/saas-security-v1-d.png" width="727" height="90"></a></center></div>
<p>Over the past year, threat actors have also been ramping up efforts to spread a variety of malware families, including stealers and remote access trojans (RATs), through a technique called <a href="https://thehackernews.com/2025/02/threat-actors-exploit-clickfix-to.html" rel="noopener" target="_blank">ClickFix</a> that often entails redirecting users to fake CAPTCHA verification pages instructing them to copy and execute nefarious PowerShell commands.</p>
<p>One such payload dropped is <a href="https://thehackernews.com/2024/12/hackers-exploit-webview2-to-deploy.html" rel="noopener" target="_blank">I2PRAT</a>, which employs the I2P anonymization network to anonymize its final C2 server. </p>
<p>&#8220;The malware is an advanced threat composed of multiple layers, each incorporating sophisticated mechanisms,&#8221; Sekoia <a href="https://blog.sekoia.io/ratatouille-cooking-up-chaos-in-the-i2p-kitchen/" rel="noopener" target="_blank">said</a>. &#8220;The use of an anonymization network complicates tracking and hinders the identification of the threat&#8217;s magnitude and spread in the wild.&#8221;</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/25/new-malware-campaign-uses-cracked-software-to-spread-lumma-and-acr-stealer/">New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/25/new-malware-campaign-uses-cracked-software-to-spread-lumma-and-acr-stealer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns</title>
		<link>https://onlinepitstop.com/2025/02/24/openai-bans-accounts-misusing-chatgpt-for-surveillance-and-influence-campaigns/</link>
					<comments>https://onlinepitstop.com/2025/02/24/openai-bans-accounts-misusing-chatgpt-for-surveillance-and-influence-campaigns/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 00:52:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/24/openai-bans-accounts-misusing-chatgpt-for-surveillance-and-influence-campaigns/</guid>

					<description><![CDATA[<p>&#xE802;Feb 22, 2025&#xE804;Ravie LakshmananDisinformation / Artificial Intelligence OpenAI on Friday revealed that it banned a set of accounts that used its ChatGPT tool to develop a suspected artificial intelligence (AI)-powered surveillance tool. The social media listening tool is said to likely originate from China and is powered by one of Meta&#8217;s Llama models, with the</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/24/openai-bans-accounts-misusing-chatgpt-for-surveillance-and-influence-campaigns/">OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 22, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Disinformation / Artificial Intelligence</span></p>
</div>
<div id="articlebody" readability="125.96435902221">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVDsSlE5txs-3woiY2HZVV0DWwAawVu5N8UuhWHk_6idQ1v577JBi3-4WtbsuY1SmwPHkdt_6XGVbDtAkia1tqSHtn52yVxR83B2dzqUmAvj2l3vIW6LuTH4QYzD8tNe0oVlL4Z94sWOJDWf-lfr_nZMw0X_LDnhy5C3cEQL7-RZFVIwn2wJEqI670Nyuj/s728-rw-e365/chatgpt.png"></a></div>
<p>OpenAI on Friday <a href="https://openai.com/global-affairs/disrupting-malicious-uses-of-ai/" rel="noopener" target="_blank">revealed</a> that it banned a set of accounts that used its ChatGPT tool to develop a suspected artificial intelligence (AI)-powered surveillance tool.</p>
<p>The social media listening tool is said to likely originate from China and is powered by one of Meta&#8217;s <a href="https://www.llama.com" rel="noopener" target="_blank">Llama models</a>, with the accounts in question using the AI company&#8217;s models to generate detailed descriptions and analyze documents for an apparatus capable of collecting real-time data and reports about anti-China protests in the West and sharing the insights with Chinese authorities.</p>
<p>The campaign has been codenamed Peer Review owing to the &#8220;network&#8217;s behavior in promoting and reviewing surveillance tooling,&#8221; researchers Ben Nimmo, Albert Zhang, Matthew Richard, and Nathaniel Hartley noted, adding the tool is designed to ingest and analyze posts and comments from platforms such as X, Facebook, YouTube, Instagram, Telegram, and Reddit.</p>
<p>In one instance flagged by the company, the actors used ChatGPT to debug and modify source code that&#8217;s believed to run the monitoring software, referred to as &#8220;Qianyue Overseas Public Opinion AI Assistant.&#8221;</p>
<p>Besides using its model as a research tool to surface publicly available information about think tanks in the United States, and government officials and politicians in countries like Australia, Cambodia and the United States, the cluster has also been found to leverage ChatGPT access to read, translate and analyze screenshots of English-language documents. </p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>Some of the images were announcements of Uyghur rights protests in various Western cities, and were likely copied from social media. It&#8217;s currently not known if these images were authentic.</p>
<p>OpenAI also said it disrupted several other clusters that were found abusing ChatGPT for various malicious activities &#8211;</p>
<ul>
<li><strong>Deceptive Employment Scheme</strong> &#8211; A network from North Korea linked to the <a href="https://thehackernews.com/2025/02/north-korean-hackers-target-freelance.html" rel="noopener" target="_blank">fraudulent IT worker scheme</a> that was involved in the creation of personal documentation for fictitious job applicants, such as resum&#xE9;s, online job profiles and cover letters, as well as come up convincing responses to explain unusual behaviors like avoiding video calls, accessing corporate systems from unauthorized countries or working irregular hours. Some of the bogus job applications were then shared on LinkedIn.</li>
<li><strong>Sponsored Discontent</strong> &#8211; A network likely of Chinese origin that was involved in the creation of social media content in English and long-form articles in Spanish that were critical of the United States, and subsequently published by Latin American news websites in Peru, Mexico, and Ecuador. Some of the activity overlaps with a known activity cluster dubbed <a href="https://thehackernews.com/2024/05/openai-meta-tiktok-disrupt-multiple-ai.html" rel="noopener" target="_blank">Spamouflage</a>.</li>
<li><strong>Romance-baiting Scam</strong> &#8211; A network of accounts that was involved in the translation and generation of comments in Japanese, Chinese, and English for posting on social media platforms including Facebook, X and Instagram in connection with suspected Cambodia-origin <a href="https://thehackernews.com/2024/12/interpol-pushes-for-romance-baiting-to.html" rel="noopener" target="_blank">romance and investment scams</a>.</li>
<li><strong>Iranian Influence Nexus</strong> &#8211; A network of five accounts that was involved in the generation of X posts and articles that were pro-Palestinian, pro-Hamas, and pro-Iran, and anti-Israel and anti-U.S., and shared on websites associated with an Iranian influence operations tracked as the International Union of Virtual Media (<a href="https://thehackernews.com/2024/05/openai-meta-tiktok-disrupt-multiple-ai.html" rel="noopener" target="_blank">IUVM</a>) and <a href="https://thehackernews.com/2024/08/openai-blocks-iranian-influence.html" rel="noopener" target="_blank">Storm-2035</a>. One among the banned accounts was used to create content for both the operations, indicative of a &#8220;previously unreported relationship.&#8221;</li>
<li><strong>Kimsuky and BlueNoroff</strong> &#8211; A network of accounts operated by North Korean threat actors that was <a href="https://thehackernews.com/2024/04/microsoft-warns-north-korean-hackers.html" rel="noopener" target="_blank">involved</a> in gathering information related to cyber intrusion tools and <a href="https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html" rel="noopener" target="_blank">cryptocurrency-related topics</a>, and debugging code for Remote Desktop Protocol (RDP) brute-force attacks</li>
<li><strong>Youth Initiative Covert Influence Operation</strong> &#8211; A network of accounts that was involved in the creation of English-language articles for a website named &#8220;Empowering Ghana&#8221; and social media comments targeting the Ghana presidential election</li>
<li><strong>Task Scam</strong> &#8211; A network of accounts likely originating from Cambodia that was involved in the translation of comments between Urdu and English as part of a <a href="https://consumer.ftc.gov/consumer-alerts/2024/11/task-scams-create-illusion-making-money" rel="noopener" target="_blank">scam</a> that lures unsuspecting people into jobs performing simple tasks (e.g., liking videos or writing reviews) in exchange for earning a non-existent commission, accessing which requires victims to part with their own money.</li>
</ul>
<p>The development comes as AI tools are being increasingly used by bad actors to facilitate <a href="https://research.checkpoint.com/2024/disinformation-campaign-moldova/" rel="noopener" target="_blank">cyber-enabled disinformation campaigns</a> and other malicious operations.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>Last month, Google Threat Intelligence Group (GTIG) <a href="https://thehackernews.com/2025/01/google-over-57-nation-state-threat.html" rel="noopener" target="_blank">revealed</a> that over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia used its Gemini AI chatbot to improve multiple phases of the attack cycle and conduct research into topical events, or perform content creation, translation, and localization.</p>
<p>&#8220;The unique insights that AI companies can glean from threat actors are particularly valuable if they are shared with upstream providers, such as hosting and software developers, downstream distribution platforms, such as social media companies, and open-source researchers,&#8221; OpenAI said.</p>
<p>&#8220;Equally, the insights that upstream and downstream providers and researchers have into threat actors open up new avenues of detection and enforcement for AI companies.&#8221;</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/24/openai-bans-accounts-misusing-chatgpt-for-surveillance-and-influence-campaigns/">OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/24/openai-bans-accounts-misusing-chatgpt-for-surveillance-and-influence-campaigns/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack</title>
		<link>https://onlinepitstop.com/2025/02/23/bybit-confirms-record-breaking-1-46-billion-crypto-heist-in-sophisticated-cold-wallet-attack/</link>
					<comments>https://onlinepitstop.com/2025/02/23/bybit-confirms-record-breaking-1-46-billion-crypto-heist-in-sophisticated-cold-wallet-attack/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 23 Feb 2025 00:45:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/23/bybit-confirms-record-breaking-1-46-billion-crypto-heist-in-sophisticated-cold-wallet-attack/</guid>

					<description><![CDATA[<p>&#xE802;Feb 22, 2025&#xE804;Ravie LakshmananFinancial Crime / Cryptocurrency Cryptocurrency exchange Bybit on Friday revealed that a &#8220;sophisticated&#8221; attack led to the theft of over $1.46 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history. &#8220;The incident occurred when our ETH multisig cold wallet</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/23/bybit-confirms-record-breaking-1-46-billion-crypto-heist-in-sophisticated-cold-wallet-attack/">Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 22, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Financial Crime / Cryptocurrency</span></p>
</div>
<div id="articlebody" readability="104.47900599829">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgw7Pn8d8IEe2qZpani3Q1StGjbwtMXSjCtyD3rOug9YgTSbWUHo3zcU8deuiJICG47FMlYCtJwcClWD6ipLY5A99e5HJuGxF4eV7FdTkEsGL8_sDjj89VeDXFpY_bD7gcnONvQYkza5yLB5ZKLbeLVM34xVKjs37BJ9B4Fi4abkLpfLytsFdc3Mt5Utk5E/s728-rw-e365/bybit-hack.png"></a></div>
<p>Cryptocurrency exchange Bybit on Friday revealed that a &#8220;sophisticated&#8221; attack led to the theft of over $1.46 billion worth of cryptocurrency from one of its Ethereum cold (offline) wallets, making it the largest ever single crypto heist in history.</p>
<p>&#8220;The incident occurred when our ETH multisig cold wallet <a href="https://etherscan.io/tx/0xb61413c495fdad6114a7aa863a00b2e3c28945979a10885b12b30316ea9f072c" rel="noopener" target="_blank">executed</a> a transfer to our warm wallet. Unfortunately, this transaction was manipulated through a sophisticated attack that masked the signing interface, displaying the correct address while altering the underlying smart contract logic,&#8221; Bybit <a href="https://x.com/Bybit_Official/status/1892965292931702929" rel="noopener" target="_blank">said</a> in a post on X.</p>
<p>&#8220;As a result, the attacker was able to gain control of the affected ETH cold wallet and transfer its holdings to an unidentified address.&#8221;</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>In a separate statement posted on the social media platform, Bybit&#8217;s CEO Ben Zhou <a href="https://x.com/benbybit/status/1892963530422505586" rel="noopener" target="_blank">emphasized</a> that all other cold wallets are secure. The company further <a href="https://x.com/Bybit_Official/status/1893044807217393910" rel="noopener" target="_blank">said</a> it has reported the case to the appropriate authorities.</p>
<p>While there is no official confirmation from Bybit yet, <a href="https://www.linkedin.com/posts/tomarobinson_almost-15-billion-in-crypto-was-stolen-activity-7298798116160368641-Okp-/" rel="noopener" target="_blank">Elliptic</a> and <a href="https://x.com/arkham/status/1893033424224411885" rel="noopener" target="_blank">Arkham Intelligence</a> confirmed that the digital theft is the work of the infamous Lazarus Group. The incident makes it the biggest-ever cryptocurrency heist reported to date, <a href="https://rekt.news/leaderboard/" rel="noopener" target="_blank">dwarfing</a> that of <a href="https://thehackernews.com/2023/02/norway-seizes-584-million-in.html" rel="noopener" target="_blank">Ronin Network</a> ($624 million), <a href="https://thehackernews.com/2021/08/hacker-steal-over-600-million-worth-of.html" rel="noopener" target="_blank">Poly Network</a> ($611 million), and <a href="https://thehackernews.com/2022/10/hackers-steal-100-million.html" rel="noopener" target="_blank">BNB Bridge</a> ($586 million).</p>
<p>Independent researcher <a href="https://www.wired.com/story/meet-zachxbt-243-million-crypto-theft/" rel="noopener" target="_blank">ZachXBT</a> said they &#8220;connected the Bybit hack on-chain to the <a href="https://rekt.news/phemex-rekt/" rel="noopener" target="_blank">Phemex hack</a>,&#8221; the latter of which took place late last month.</p>
<p>The North Korea-based threat actor is one of the most prolific hacking groups, orchestrating dozens of <a href="https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html" rel="noopener" target="_blank">cryptocurrency heists</a> to generate illicit revenue for the sanctions-hit nation. Last year, Google <a href="https://cloud.google.com/blog/topics/threat-intelligence/examining-web3-heists" rel="noopener" target="_blank">described</a> North Korea as &#8220;arguably the world&#8217;s leading cyber criminal enterprise.&#8221; </p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>In 2024, it&#8217;s <a href="https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html" rel="noopener" target="_blank">estimated</a> to have stolen $1.34 billion across 47 cryptocurrency hacks, accounting for 61% of all ill-gotten crypto during the time period, according to blockchain intelligence firm Chainalysis.</p>
<p>&#8220;Cryptocurrency heists are on the rise due to the lucrative nature of their rewards, the challenges associated with attribution to malicious actors, and the opportunities presented by nascent familiarity with cryptocurrency and Web3 technologies among many organizations,&#8221; Google-owned Mandiant <a href="https://cloud.google.com/blog/topics/threat-intelligence/securing-cryptocurrency-organizations/" rel="noopener" target="_blank">said</a> last month.</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/23/bybit-confirms-record-breaking-1-46-billion-crypto-heist-in-sophisticated-cold-wallet-attack/">Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/23/bybit-confirms-record-breaking-1-46-billion-crypto-heist-in-sophisticated-cold-wallet-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Drops iCloud&#8217;s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands</title>
		<link>https://onlinepitstop.com/2025/02/22/apple-drops-iclouds-advanced-data-protection-in-the-u-k-amid-encryption-backdoor-demands/</link>
					<comments>https://onlinepitstop.com/2025/02/22/apple-drops-iclouds-advanced-data-protection-in-the-u-k-amid-encryption-backdoor-demands/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sat, 22 Feb 2025 00:33:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/22/apple-drops-iclouds-advanced-data-protection-in-the-u-k-amid-encryption-backdoor-demands/</guid>

					<description><![CDATA[<p>&#xE802;Feb 21, 2025&#xE804;Ravie LakshmananData Protection / Encryption Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data. The development was first reported by Bloomberg. ADP for iCloud is an optional setting that ensures that users&#8217; trusted devices</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/22/apple-drops-iclouds-advanced-data-protection-in-the-u-k-amid-encryption-backdoor-demands/">Apple Drops iCloud&#8217;s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 21, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Data Protection / Encryption</span></p>
</div>
<div id="articlebody" readability="116.86437163003">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXojtX2D46McDfPUG_9BE_mXtBEZhL4jACU1itL62wXPK1EXA1tAPO-mSIwS_itWZG5UzwFAX70a4yhGsAaYW3pllO04H4vBS7MAKpLx1kDh4nYtvsr6LmCcYyuMUTL1uY6Q3xXnB3QoZFzCvUAdiEChKbjIQLEoOXDqpWDhEwnovFWrrBeageiMdGqZRU/s728-rw-e365/apple.png"></a></div>
<p>Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data.</p>
<p>The development was <a href="https://www.bloomberg.com/news/articles/2025-02-21/apple-removes-end-to-end-encryption-feature-from-uk-after-backdoor-order" rel="noopener" target="_blank">first reported</a> by Bloomberg.</p>
<p>ADP for iCloud is an <a href="https://support.apple.com/en-us/102651" rel="noopener" target="_blank">optional setting</a> that ensures that users&#8217; trusted devices retain sole access to the encryption keys used to unlock data stored in its cloud. This includes iCloud Backup, Photos, Notes, Reminders, Safari Bookmarks, voice memos, and data associated with its own apps.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>&#8220;We are gravely disappointed that the protections provided by ADP will not be available to our customers in the UK given the continuing rise of data breaches and other threats to customer privacy,&#8221; the company was quoted as saying to Bloomberg.</p>
<p>&#8220;ADP protects iCloud data with end-to-end encryption, which means the data can only be decrypted by the user who owns it, and only on their trusted devices.&#8221;</p>
<p>Customers who are already using ADP will need to manually disable it for an as-yet-unspecified period of time, per the report, as Apple &#8220;does not have the ability to automatically disable it on their behalf.&#8221;</p>
<p>The unprecedented development comes merely weeks after reports <a href="https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html" rel="noopener" target="_blank">emerged</a> that the U.K. government had ordered Apple to build a backdoor to access any Apple user&#8217;s iCloud content.</p>
<p>Per The Washington Post, the demand, issued by the U.K. Home Office under the Investigatory Powers Act (<a href="https://www.legislation.gov.uk/ukpga/2016/25/contents" rel="noopener" target="_blank">IPA</a>) aka the Snoopers&#8217; Charter, &#8220;requires blanket capability to view fully encrypted material, not merely assistance in cracking a specific account.&#8221;</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v2-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhT2OnXk97z-adL5WBKzz6wsA7vAhygg3Px0VPmqpH5hH4AErnYajTCpDN7SLy43ejD_T4Skv8OMOdG9qpzMfihrj8o7qSznLKA8zg7jW8L4hY8-umwTNZSpAj0JvtG3VGMFGw9n7hMyea1NpVSXp6yTaClLUQ3GujxwlEuLmQFSsVH28WQy6vp-cOGG0p_/s728-rw-e100/saas-security-v2-d.png" width="727" height="90"></a></center></div>
<p>With the removal of ADP in the region, Apple now only offers standard data protection for iCloud, which encrypts users&#8217; data but stores the encryption keys in its own data centers, thereby making it accessible to law enforcement subject to a warrant.</p>
<p>Last week, U.S. Senator Ron Wyden and Member of Congress Andy Biggs <a href="https://thehackernews.com/2025/02/thn-weekly-recap-google-secrets-stolen.html" rel="noopener" target="_blank">sent</a> a letter to Tulsi Gabbard, the Director of National Intelligence, urging the U.K. to retract its order, citing it threatens the privacy and security of both the American people and the U.S. government.</p>
<p>&#8220;If the U.K. does not immediately reverse this dangerous effort, we urge you to reevaluate U.S.-U.K. cybersecurity arrangements and programs as well as U.S. intelligence sharing with the U.K.,&#8221; they added.</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/22/apple-drops-iclouds-advanced-data-protection-in-the-u-k-amid-encryption-backdoor-demands/">Apple Drops iCloud&#8217;s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/22/apple-drops-iclouds-advanced-data-protection-in-the-u-k-amid-encryption-backdoor-demands/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware</title>
		<link>https://onlinepitstop.com/2025/02/21/north-korean-hackers-target-freelance-developers-in-job-scam-to-deploy-malware/</link>
					<comments>https://onlinepitstop.com/2025/02/21/north-korean-hackers-target-freelance-developers-in-job-scam-to-deploy-malware/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 21 Feb 2025 00:24:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/21/north-korean-hackers-target-freelance-developers-in-job-scam-to-deploy-malware/</guid>

					<description><![CDATA[<p>Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima, PurpleBravo, and Tenacious Pungsan. The</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/21/north-korean-hackers-target-freelance-developers-in-job-scam-to-deploy-malware/">North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkqmA6BokNKhyphenhyphenoYbRVUiCp0LZJRgJMaLtW9D9gQBD5IUS1Jg4YASciwwvXz8dBAjEaZ3dJMJFSHfRaoM3WVF0250e7nSTHG_e2SpOfvGTXpASiJkuoUbMvfUW0PP5jj2lQPP-uvMlfeWk0XM473JvjkhjFynxh_98k7YR7o0hSHk7r2FKOn5dLnptmEzz8/s728-rw-e365/cyberattack.png"></a></div>
<p>Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret.</p>
<p>The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names <a href="https://thehackernews.com/2025/02/north-korean-hackers-deploy-ferret.html" rel="noopener" target="_blank">Contagious Interview</a> (aka <a href="https://thehackernews.com/2024/10/n-korean-hackers-use-fake-interviews-to.html" rel="noopener" target="_blank">CL-STA-0240</a>), DEV#POPPER, Famous Chollima, PurpleBravo, and Tenacious Pungsan. The campaign has been ongoing since at least late 2023.</p>
<p>&#8220;DeceptiveDevelopment targets freelance software developers through spear-phishing on job-hunting and freelancing sites, aiming to steal cryptocurrency wallets and login information from browsers and password managers,&#8221; cybersecurity company ESET <a href="https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-targets-freelance-developers/" rel="noopener" target="_blank">said</a> in a report shared with The Hacker News.</p>
<p>In November 2024, ESET <a href="https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html" rel="noopener" target="_blank">confirmed</a> to The Hacker News the overlaps between DeceptiveDevelopment and Contagious Interview, classifying it as a new <a href="https://thehackernews.com/2025/02/lazarus-group-deploys-marstech1.html" rel="noopener" target="_blank">Lazarus Group</a> activity that operates with an aim to conduct cryptocurrency theft.</p>
<p>The attack chains are characterized by the use of fake recruiter profiles on social media to reach out to prospective targets and share with them trojanized codebases hosted on GitHub, GitLab, or Bitbucket that deploy backdoors under the pretext of a job interview process.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>Subsequent iterations of the campaign have branched out to other job-hunting platforms like Upwork, Freelancer.com, We Work Remotely, Moonlight, and Crypto Jobs List. As <a href="https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html" rel="noopener" target="_blank">previously highlighted</a>, these hiring challenges typically entail fixing bugs or adding new features to the crypto-related project.</p>
<p>Other than coding tests, the bogus projects masquerade as cryptocurrency initiatives, games with blockchain functionality, and gambling apps with cryptocurrency features. More often than not, the malicious code is embedded within a benign component in the form of a single line.</p>
<p>&#8220;Additionally, they are instructed to build and execute the project in order to test it, which is where the initial compromise happens,&#8221; security researcher Mat&#x11B;j Havr&#xE1;nek said. &#8220;The repositories used are usually private, so the vic-m is first asked to provide their account ID or email address to be granted access to them, most likely to conceal the malicious activity from researchers.&#8221;</p>
<p>A second method used for achieving initial compromise revolves around tricking their victims into installing a malware-laced video conferencing platform like <a href="https://thehackernews.com/2024/07/north-korean-hackers-update-beavertail.html" rel="noopener" target="_blank">MiroTalk</a> or <a href="https://thehackernews.com/2024/09/north-korean-hackers-targets-job.html" rel="noopener" target="_blank">FreeConference</a>.</p>
<p>While both BeaverTail and InvisibleFerret come with information-stealing capabilities, the former serves as a downloader for the latter. BeaverTail also comes in two flavors: A JavaScript variant that can be placed within the trojanized projects and a native version built using the Qt platform that&#8217;s disguised as conferencing software.</p>
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhle0DU7MRec2RhpriVAyCT0TN0wc4iClhUsmFJtegRBZtEQ36icOnUFxdLndLrQESEif5u90asU2Emb29AL22azMAgyDcn2RupFNFewjiNKyp4AILQl58vFd_1Z7JRj1RsDAFJLNT7M5MYe_rpmVbeBdqUpcNd6AXkwEa6uI9Epk3QADegNUHq8bHAnmjU/s728-rw-e365/malware.png"><img decoding="async" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhle0DU7MRec2RhpriVAyCT0TN0wc4iClhUsmFJtegRBZtEQ36icOnUFxdLndLrQESEif5u90asU2Emb29AL22azMAgyDcn2RupFNFewjiNKyp4AILQl58vFd_1Z7JRj1RsDAFJLNT7M5MYe_rpmVbeBdqUpcNd6AXkwEa6uI9Epk3QADegNUHq8bHAnmjU/s728-rw-e365/malware.png" alt="" border="0" data-original-height="1164" data-original-width="1617"></a></div>
<p>InvisibleFerret is a modular Python malware that retrieves and executes three additional components &#8211;</p>
<ul>
<li><strong>pay</strong>, which collects information and acts as a backdoor that&#8217;s capable of accepting remote commands from an attacker-controlled server to log keystrokes, capture clipboard content, run shell commands, exfiltrate files and data from mounted drives, as well as install the AnyDesk and browser module, and gather information from browser extensions and password managers</li>
<li><strong>bow</strong>, which is responsible for stealing login data, autofill data, and payment information stored in Chromium-based browsers like Chrome, Brave, Opera, Yandex, and Edge</li>
<li><strong>adc</strong>, which functions as a persistence mechanism by installing the AnyDesk remote desktop software</li>
</ul>
<p>ESET said the primary targets of the campaign are software developers working in cryptocurrency and decentralized finance projects across the world, with significant concentrations reported in Finland, India, Italy, Pakistan, Spain, South Africa, Russia, Ukraine, and the U.S.</p>
<p>&#8220;The attackers don&#8217;t distinguish based on geographical location and aim to compromise as many victims as possible to increase the likelihood of successfully extracting funds and information.</p>
<p>This is also evidenced in the apparent poor coding practices adopted by the operators, ranging from a failure to remove development notes to local IP addresses used for development and testing, indicating that the intrusion set is not concerned about stealth.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v1-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc0hgq4JZKi-PJjUZ4kdb5ficmXr3IPOg6noFF558_qZ-gXm7vb0OzXU0NzsPAxaqca2tLI5j8NgJW731W0_CuPrUerOmSrZSt4IeANQp6VAQsIAQUzv6aJsxBD6poxHfELq0bcbeevSVy5AyOb9ganALMoA140nZoLOtSb0ck2AZ5rZgb9mWDEyVsbvqK/s728-rw-e100/saas-security-v1-d.png" width="727" height="90"></a></center></div>
<p>It&#8217;s worth noting that the use of job interview decoys is a classic strategy adopted by various North Korean hacking groups, the most prominent of which is a long-running campaign dubbed <a href="https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html" rel="noopener" target="_blank">Operation Dream Job</a>.</p>
<p>Furthermore, there is evidence to suggest that the threat actors are also involved in the fraudulent <a href="https://thehackernews.com/2025/02/north-korean-hackers-exploit-powershell.html" rel="noopener" target="_blank">IT worker scheme</a>, in which North Korean nationals apply for overseas jobs under false identities in order to draw regular salaries as a way to fund the regime&#8217;s priorities.</p>
<p>&#8220;The DeceptiveDevelopment cluster is an addition to an already large collection of money-making schemes employed by North Korea-aligned actors and conforms to an ongoing trend of shifting focus from traditional money to cryptocurrencies,&#8221; ESET said.</p>
<p>&#8220;During our research, we observed it go from primitive tools and techniques to more advanced and capable malware, as well as more polished techniques to lure in victims and deploy the malware.&#8221;</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/21/north-korean-hackers-target-freelance-developers-in-job-scam-to-deploy-malware/">North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/21/north-korean-hackers-target-freelance-developers-in-job-scam-to-deploy-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Exploit Signal&#8217;s Linked Devices Feature to Hijack Accounts via Malicious QR Codes</title>
		<link>https://onlinepitstop.com/2025/02/20/hackers-exploit-signals-linked-devices-feature-to-hijack-accounts-via-malicious-qr-codes/</link>
					<comments>https://onlinepitstop.com/2025/02/20/hackers-exploit-signals-linked-devices-feature-to-hijack-accounts-via-malicious-qr-codes/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 20 Feb 2025 00:23:37 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://onlinepitstop.com/2025/02/20/hackers-exploit-signals-linked-devices-feature-to-hijack-accounts-via-malicious-qr-codes/</guid>

					<description><![CDATA[<p>&#xE802;Feb 19, 2025&#xE804;Ravie LakshmananMobile Security / Cyber Espionage Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. &#8220;The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app&#8217;s legitimate &#8216;linked devices&#8217;</p>
<p>The post <a href="https://onlinepitstop.com/2025/02/20/hackers-exploit-signals-linked-devices-feature-to-hijack-accounts-via-malicious-qr-codes/">Hackers Exploit Signal&#8217;s Linked Devices Feature to Hijack Accounts via Malicious QR Codes</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div readability="33">
<p><span class="p-author"><i class="icon-font icon-calendar">&#xE802;</i><span class="author">Feb 19, 2025</span><i class="icon-font icon-user">&#xE804;</i><span class="author">Ravie Lakshmanan</span></span><span class="p-tags">Mobile Security / Cyber Espionage </span></p>
</div>
<div id="articlebody" readability="147.78611178321">
<div class="separator"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL9H-X2jFlbBMkL3KcZB3cfbZQFrZRgUYsIUtZ8toHIXQPsiAQtTDNbDVear5pjrUwR3Emwxluim6Xj5-RZgMEM185cAinUs6nCm1HT6oHHfv5JfXiopA7KCr646ou5fg1iHSzN8rxKTYDWixky_e1871m-o739Ri7cUJJUBRVPqwmxOHS6HQlbMpYCdbR/s728-rw-e365/signal-qr-code.png"></a></div>
<p>Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts.</p>
<p>&#8220;The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app&#8217;s legitimate &#8216;linked devices&#8217; feature that enables Signal to be used on multiple devices concurrently,&#8221; the Google Threat Intelligence Group (GTIG) <a href="https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/" rel="noopener" target="_blank">said</a> in a report.</p>
<p>In the attacks spotted by the tech giant&#8217;s threat intelligence teams, the threat actors, including one it&#8217;s tracking as UNC5792, have resorted to malicious QR codes that, when scanned, will link a victim&#8217;s account to an actor-controlled Signal instance.</p>
<p>As a result, future messages get delivered synchronously to both the victim and the threat actor in real-time, thereby granting threat actors a persistent way to eavesdrop on the victim&#8217;s conversations. Google said UAC-0195 partially overlaps with a hacking group known as <a href="https://cert.gov.ua/article/6278735" rel="noopener" target="_blank">UAC-0195</a>.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/encrypted-attacks-report-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6e4c8i_pkXRCFnrtqVIygOrARiVnU3_KUgU5mhPl5V4uj8R1KcQOxRLdZ0xm1Rf5AX_cviUAeiiRkTJCe8HXzOeB363590NBXAMv92N9e7zr4m7aKtDq-Q_gpP9QFWecL0oxcVtmqSg9qrGEGqlDbzwNNFKGJe2nlup4tuL7AZzTm0U501YxPGodOc2Fq/s728-rw-e100/zz-d.jpg" width="727" height="90"></a></center></div>
<p>These QR codes are known to masquerade as group invites, security alerts, or legitimate device pairing instructions from the Signal website. Alternatively, the malicious device-linking QR codes have been found to be embedded in phishing pages that purport to be specialized applications used by the Ukrainian military.</p>
<p>&#8220;UNC5792 has hosted modified Signal group invitations on actor-controlled infrastructure designed to appear identical to a legitimate Signal group invite,&#8221; Google said.</p>
<p>Another threat actor linked to the targeting of Signal is UNC4221 (aka <a href="https://cert.gov.ua/article/6281632" rel="noopener" target="_blank">UAC-0185</a>), which has targeted Signal accounts used by Ukrainian military personnel by means of a custom phishing kit that&#8217;s designed to mimic certain aspects of the Kropyva application used by the Armed Forces of Ukraine for artillery guidance.</p>
<p>Also used is a lightweight JavaScript payload dubbed PINPOINT that can collect basic user information and geolocation data through phishing pages.</p>
<p>Outside of UNC5792 and UNC4221, some of the other adversarial collectives that have trained their sights on Signal are Sandworm (aka APT44), which has utilized a Windows Batch script named WAVESIGN; Turla, which has operated a lightweight PowerShell script; and UNC1151, which has put to use the Robocopy utility to exfiltrate Signal messages from an infected desktop.</p>
<p>The disclosure from Google comes a little over a month after the Microsoft Threat Intelligence team <a href="https://thehackernews.com/2025/01/russian-star-blizzard-shifts-tactics-to.html" rel="noopener" target="_blank">attributed</a> the Russian threat actor known as Star Blizzard to a spear-phishing campaign that leverages a similar device-linking feature to hijack WhatsApp accounts.</p>
<p>Last week, Microsoft and Volexity also <a href="https://thehackernews.com/2025/02/microsoft-russian-linked-hackers-using.html" rel="noopener" target="_blank">revealed</a> that multiple Russian threat actors are leveraging a technique called device code phishing to log into victims&#8217; accounts by targeting them via messaging apps like WhatsApp, Signal, and Microsoft Teams.</p>
<p>&#8220;The operational emphasis on Signal from multiple threat actors in recent months serves as an important warning for the growing threat to secure messaging applications that is certain to intensify in the near-term,&#8221; Google said.</p>
<div class="dog_two clear"><center class="cf"><a href="https://thehackernews.uk/saas-security-v1-d" rel="nofollow noopener sponsored" target="_blank" title="Cybersecurity"><img loading="lazy" decoding="async" class="lazyload" alt="Cybersecurity" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc0hgq4JZKi-PJjUZ4kdb5ficmXr3IPOg6noFF558_qZ-gXm7vb0OzXU0NzsPAxaqca2tLI5j8NgJW731W0_CuPrUerOmSrZSt4IeANQp6VAQsIAQUzv6aJsxBD6poxHfELq0bcbeevSVy5AyOb9ganALMoA140nZoLOtSb0ck2AZ5rZgb9mWDEyVsbvqK/s728-rw-e100/saas-security-v1-d.png" width="727" height="90"></a></center></div>
<p>&#8220;As reflected in wide ranging efforts to compromise Signal accounts, this threat to secure messaging applications is not limited to remote cyber operations such as phishing and malware delivery, but also critically includes close-access operations where a threat actor can secure brief access to a target&#8217;s unlocked device.&#8221;</p>
<p>The disclosure also follows the discovery of a new search engine optimization (SEO) poisoning campaign that uses fake download pages impersonating popular applications like Signal, LINE, Gmail, and Google Translate to deliver backdoored executables aimed at Chinese-speaking users.</p>
<p>&#8220;The executables delivered through fake download pages follow a consistent execution pattern involving temporary file extraction, process injection, security modifications, and network communications,&#8221; Hunt.io <a href="https://hunt.io/blog/backdoored-executables-for-signal-line-gmail-target-chinese-users" rel="noopener" target="_blank">said</a>, adding the samples exhibit infostealer-like functionality associated with a malware strain referred to as MicroClip.</p>
<p></p>
<div class="cf note-b" readability="7.4311926605505">Found this article interesting?  Follow us on <a href="https://twitter.com/thehackersnews" rel="noopener" target="_blank">Twitter <i class="icon-font icon-twitter">&#xF099;</i></a> and <a href="https://www.linkedin.com/company/thehackernews/" rel="noopener" target="_blank">LinkedIn</a> to read more exclusive content we post.</div>
</div>
<p>The post <a href="https://onlinepitstop.com/2025/02/20/hackers-exploit-signals-linked-devices-feature-to-hijack-accounts-via-malicious-qr-codes/">Hackers Exploit Signal&#8217;s Linked Devices Feature to Hijack Accounts via Malicious QR Codes</a> appeared first on <a href="https://onlinepitstop.com">Online Pitstop</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://onlinepitstop.com/2025/02/20/hackers-exploit-signals-linked-devices-feature-to-hijack-accounts-via-malicious-qr-codes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
