Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. General Discussion
  3. Infosec News

Infosec News

Scheduled Pinned Locked Moved General Discussion
91 Posts 2 Posters 15.4k Views 2 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Offline
    cycloneC Offline
    cyclone
    Admin Trusted
    wrote on last edited by
    #82

    WhatsApp Zero-Click Hack - CVE-2025-55177

    31216b18-5965-4b8c-b4cf-8995160a5278-image.png

    A recently patched zero-click exploit in WhatsApp (CVE-2025-55177), combined with an Apple OS flaw (CVE-2025-43300), allowed attackers to silently install spyware on iOS and Mac devices. The campaign ran for 90 days and targeted fewer than 200 people worldwide, mainly activists and journalists. Victims’ messages, photos, locations, and device data could be exposed without any user action. While mass users were not affected, the flaw remained dangerous until fixed.

    Sources:

    • https://apnews.com/article/whatsapp-security-vulnerability-update-0e5081c3eeb44e47e39ddd38c29a6771
    • https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    0
    • cycloneC Offline
      cycloneC Offline
      cyclone
      Admin Trusted
      wrote on last edited by
      #83

      Plot to Cripple NYC Cell Networks Foiled by U.S. Secret Service

      06632ead-74a8-41a6-95c7-fff7c47f6ce2-image.png

      The U.S. Secret Service uncovered a massive underground telecom operation just days before the UN General Assembly in Manhattan. Agents seized more than 300 SIM servers and over 100,000 SIM cards hidden across multiple sites within 35 miles of the UN headquarters.

      According to officials, the devices had the ability to launch devastating telecom attacks, from spamming up to 30 million texts per minute to jamming 911 lines and disabling cell towers. Investigators say such an attack could have paralyzed New York’s communications network, echoing the cellular outages that followed 9/11.

      Authorities are probing possible foreign government links. The timing and sophistication raised concerns about espionage, with experts suggesting state-level actors like Russia or China could be behind it. The Secret Service launched the investigation earlier this year after telecom threats were made against senior U.S. officials.

      Rows of servers and shelves stacked with SIM cards were discovered, many already activated. Officials warn the system could have been used for encrypted communication between organized crime, cartels, or even terrorist groups. Forensics teams now face the daunting task of analyzing 100,000 devices to trace connections.

      Sources:

      • https://nypost.com/2025/09/23/us-news/secret-service-foils-plot-to-disrupt-nyc-cell-network-threaten-un-general-assembly/
      • https://www.techradar.com/pro/security/us-secret-service-takes-down-massive-million-dollar-network-of-sim-cards-it-says-was-capable-of-taking-down-comms-across-new-york

      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
      3x RTX 4090

      1 Reply Last reply
      👍
      0
      • cycloneC Offline
        cycloneC Offline
        cyclone
        Admin Trusted
        wrote on last edited by
        #84

        Akira Ransomware Bypassing MFA on SonicWall VPNs

        d47d5418-ab8e-474e-a509-e56329c36e81-image.png

        Akira ransomware operators are still hitting SonicWall SSL VPNs, even when OTP-based MFA is enabled.

        Key points:

        • Root cause linked to CVE-2024-40766, an access control flaw exploited in 2024.
        • Attackers appear to have stolen both credentials and OTP seeds during earlier breaches.
        • MFA bypass observed: multiple OTP prompts issued, then successful logins.
        • Once inside, actors quickly scan networks, enumerate AD, and target Veeam servers for stored creds.
        • BYOVD attacks used to kill endpoint protection via vulnerable drivers like rwdrv.sys.
        • Even patched SonicOS 7.3.0 devices are being impacted.

        Mitigation:

        • Reset all VPN credentials, rotate MFA seeds, and monitor login patterns for anomalies. Backup servers should be treated as high-risk targets.
        • MFA cannot protect against stolen seeds. If your SonicWall appliance ever ran vulnerable firmware, reset everything.

        Sources:

        • https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/
        • https://arcticwolf.com/resources/blog/september-2025-update-ongoing-akira-ransomware-campaign/

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • cycloneC Offline
          cycloneC Offline
          cyclone
          Admin Trusted
          wrote on last edited by
          #85

          Gen Z Failing at Identifying Phishing Attacks

          dc1120f1-c2b2-443c-a382-9828a293be66-image.png

          A new global survey from Yubico reveals that Gen Z, those born between 1997–2012, is the most vulnerable group to phishing attacks, with 62% admitting to engaging with a phishing message in the past year, and are most likely to click on phishing links, attachments, or scams, with AI-powered social engineering attacks driving a new wave of deepfakes and voice-clone phishing.

          The 2025 Global State of Authentication Survey, covering 18,000 participants across nine countries, found that:

          • 44% of all respondents interacted with a phishing attempt in the past year.
          • 70% believe AI has made phishing more effective, and 78% say attacks have grown more sophisticated.
          • 54% of people shown a phishing email believed it was genuine or were unsure, highlighting the rising danger of AI-crafted scams.
          • Only 48% of companies enforce MFA, and 40% of workers report no cybersecurity training at all.

          Sources:

          • https://www.yubico.com/press-releases/cybersecurity-wakeup-gen-z-tops-the-list-for-falling-for-phishing-attacks
          • https://www.techradar.com/pro/security/most-people-still-cant-identify-a-phishing-attack-written-by-ai-and-thats-a-huge-problem-survey-warns

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          👍
          0
          • cycloneC Offline
            cycloneC Offline
            cyclone
            Admin Trusted
            wrote last edited by
            #86

            Scattered Lapsus$ Hunters Demand Neary $1 Billion in Ransom

            ccdb36fe-9636-4a31-ba80-91db5ab91cac-image.png

            A newly revived threat group calling itself Scattered Lapsus$ Hunters, a collaboration between members of Scattered Spider, Lapsus$, and ShinyHunters, has claimed responsibility for stealing over 1 billion Salesforce-related records and is demanding nearly $1 billion in ransom to prevent public release.

            According to news reports, the attackers exploited Salesloft’s Drift integration, using stolen OAuth and refresh tokens to access Salesforce APIs and extract customer data, including contact information and case objects. Salesforce itself was not directly breached.

            The group has launched a public extortion site listing roughly 40 affected organizations, including major names like Cloudflare, Palo Alto Networks, Zscaler, and Tenable. Victims are urged to “negotiate” to prevent leaks.

            Salesforce maintains that its core platform remains secure, stating:

            “There is no indication that the Salesforce platform has been compromised, nor is this activity related to any known vulnerability in our technology.”

            Security researchers note that the campaign resembles previous Lapsus$ and Scattered Spider operations, focusing on third-party integrations to bypass enterprise protections. Google TAG and Mandiant are investigating the breach’s scope and potential secondary access vectors.

            Sources:

            • https://www.techradar.com/pro/security/hackers-claim-to-have-stolen-over-a-billion-salesforce-records-and-are-demanding-nearly-usd1-billion-not-to-leak-them
            • https://www.theregister.com/2025/10/03/scattered_lapsus_hunters_latest_leak/
            • https://socradar.io/dark-web-profile-scattered-lapsus-hunters/

            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
            3x RTX 4090

            1 Reply Last reply
            👍
            0
            • cycloneC Offline
              cycloneC Offline
              cyclone
              Admin Trusted
              wrote last edited by
              #87

              Harvard Probes Data Breach Tied to Oracle Zero-Day Exploit

              deccac14-11eb-46de-b15f-0165d1d5d1e9-image.png

              Harvard University is investigating a potential data breach after the Clop ransomware gang claimed to have stolen data by exploiting a zero-day flaw in Oracle’s E-Business Suite (CVE-2025-61882).

              dcdcfc59-6624-43f5-bc72-2c5ddc11bfe0-image.png

              The university confirmed it was affected by the vulnerability, which has impacted multiple Oracle customers, but said the incident appears limited to a small administrative unit. Harvard stated it applied Oracle’s emergency patch and found no evidence of compromise in other systems.

              The Clop group, known for high-profile zero-day exploits in platforms such as MOVEit Transfer and GoAnywhere MFT, recently began targeting Oracle users in a new extortion campaign. Harvard is the first organization publicly linked to the attacks, though more victims are expected to surface in the coming weeks.

              Sources

              • https://www.bleepingcomputer.com/news/security/harvard-investigating-breach-linked-to-oracle-zero-day-exploit/
              • https://www.oracle.com/security-alerts/alert-cve-2025-61882.html
              • https://www.crowdstrike.com/en-us/blog/crowdstrike-identifies-campaign-targeting-oracle-e-business-suite-zero-day-CVE-2025-61882/

              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
              3x RTX 4090

              1 Reply Last reply
              👍
              0
              • cycloneC Offline
                cycloneC Offline
                cyclone
                Admin Trusted
                wrote last edited by
                #88

                Nation-State Hackers Breach F5 Networks

                F5 Breach Graphic

                Summary
                F5 Networks has confirmed a major security breach in which a nation-state-linked actor gained unauthorized access to internal systems and exfiltrated portions of BIG-IP source code and information on undisclosed vulnerabilities.
                The intrusion is believed to have persisted for roughly 12 months before discovery.

                The company detected the incident on August 9, 2025, and delayed public disclosure at the request of the U.S. Department of Justice.
                There is no indication that CRM, financial, support, or iHealth systems were accessed, although some customer configuration files were included in the stolen data.

                Technical and Attribution Details

                • The attack is attributed to a Chinese cyber-espionage group tracked as UNC5221.
                • The group deployed a custom backdoor named BRICKSTORM, previously used in intrusions against SaaS and BPO providers.
                • The compromise targeted F5’s development environment, giving access to internal vulnerability data and code repositories.
                • F5 brought in Mandiant and CrowdStrike for incident response, rotated all signing keys and credentials, and added additional security controls.

                Government Response
                The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 26-01, requiring all federal agencies to:

                1. Inventory all F5 BIG-IP, F5OS, BIG-IQ, and APM systems.
                2. Verify that management interfaces are not exposed to the internet.
                3. Apply vendor patches no later than October 22, 2025.
                4. Submit compliance reports to CISA by October 29, 2025.

                CISA stated that the stolen source code and vulnerability information provide adversaries with a technical advantage for developing zero-day exploits.

                CVEs and Patch References
                Key vulnerabilities disclosed following the breach include:

                • CVE-2025-53868 – BIG-IP SCP/SFTP privilege escalation (CVSS 8.7)
                • CVE-2025-61955 – F5OS command injection, appliance mode (CVSS 8.8)
                • CVE-2025-57780 – F5OS arbitrary code execution, appliance mode (CVSS 8.8)

                Administrators should immediately apply the latest firmware and software updates for BIG-IP, F5OS, BIG-IQ, APM, and BIG-IP Next (Kubernetes).

                Recommended Actions:

                • Patch all F5 systems immediately.
                • Remove or restrict public access to management interfaces.
                • Audit and retire end-of-life or unsupported devices.
                • Monitor for anomalous configuration changes or new admin accounts.
                • Treat F5 perimeter devices as high-risk until verified patched and hardened.

                Sources:

                • https://thehackernews.com/2025/10/f5-breach-exposes-big-ip-source-code.html
                • https://www.reuters.com/technology/breach-us-based-cybersecurity-provider-f5-blamed-china-bloomberg-news-reports-2025-10-16/
                • https://www.techradar.com/pro/security/significant-threat-to-us-networks-after-hackers-stole-f5-source-code-cisa-warns

                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                3x RTX 4090

                1 Reply Last reply
                👍
                0
                • cycloneC Offline
                  cycloneC Offline
                  cyclone
                  Admin Trusted
                  wrote last edited by cyclone
                  #89

                  Major Amazon Web Services (AWS) Outage

                  09d08423-1f12-4abe-b624-347f5c2c010a-image.png

                  AWS is currently experiencing a major outage in the US-EAST-1 region, impacting dozens of core services and many third-party platforms.

                  Status: Degraded performance and elevated error rates across multiple services.
                  Root Cause (according to AWS): Internal subsystem failure tied to the monitoring of network load balancers and EC2 internal networking.

                  Origin & propagation: Issues began around 3:11 a.m. ET in US-EAST-1, and have cascaded globally for services dependent on that region.

                  Affected AWS Services (partial list):
                  Core compute/storage/database services including EC2, S3, RDS, Lambda, CloudWatch, CloudFront, DynamoDB, SQS, SNS, ECS, EKS, Glue, Redshift, SageMaker, Cognito, Connect, VPC services, Step Functions, Secrets Manager, and more.
                  AWS lists around 90 services impacted.

                  Third-Party Services / Platforms Impacted:
                  Major consumer/enterprise platforms reported disruptions: games like Fortnite, Roblox; apps like Snapchat, Venmo; smart home devices (Ring, Alexa); banks and financial apps; many SaaS services relying on AWS infrastructure.

                  What this means for you:

                  • If you rely on AWS in US-EAST-1, expect slower API responses, partial failures, or launch errors (especially for new EC2 instances).
                  • If you rely on third-party services (SaaS, gaming, streaming, banking), you may see outages despite those services not being your direct provider.

                  Sources:

                  • AWS Status Page: https://health.aws.amazon.com/health/status
                  • Downdetector Report: https://downdetector.com/status/aws-amazon-web-services/
                  • Tom's Guide: https://www.tomsguide.com/news/live/amazon-outage-october-2025
                  • Reuters: https://www.reuters.com/business/retail-consumer/amazons-cloud-unit-reports-outage-several-websites-down-2025-10-20/

                  Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                  3x RTX 4090

                  1 Reply Last reply
                  👍
                  0
                  • cycloneC Offline
                    cycloneC Offline
                    cyclone
                    Admin Trusted
                    wrote last edited by
                    #90

                    Xubuntu.org Compromised - Torrent Downloads Served Windows Malware

                    a67aac39-1eda-412d-be57-471fd2109a41-image.png

                    Over the weekend (October 18–19, 2025), the official Xubuntu website (xubuntu.org) was compromised. Attackers managed to inject a malicious download link into the torrent section of the downloads page. A similar attack also happened in September 2025 where attackers injected malicious javascript into non-English language pages of the site.

                    What Happened

                    The legitimate .torrent link was replaced with a ZIP archive:

                    xubuntu-safe-download.zip
                    

                    Which contained files:

                    TestCompany.SafeDownloader.exe
                    terms-of-service.txt
                    

                    The EXE impersonated a “Xubuntu - Safe Downloader” GUI installer.
                    On execution, it installed itself to:

                    %AppData%\Roaming
                    

                    and added a Windows registry key for persistence at startup.

                    Malware Behavior

                    The EXE was identified as a Crypto Clipper Trojan, flagged by 26/72 vendors on VirusTotal.
                    d53f24a8-a140-42cf-b98a-a839ab0f3324-image.png

                    Behavior:

                    • Monitors the clipboard for cryptocurrency wallet addresses (BTC, ETH, LTC, etc.).
                    • Replaces copied wallet addresses with attacker-controlled ones.
                    • Windows-only payload. It targets Windows users downloading from Xubuntu.org.
                    • No confirmed reports of cryptocurrency theft at the time of this writing.

                    Technical Context

                    The malicious file was hosted within a WordPress uploads path "/wp-content/uploads/", suggesting the compromise occurred via a vulnerable plugin or outdated component.

                    A similar minor incident in September 2025 served malvertising on the same domain, implying the attackers retained access.

                    The Xubuntu team has disabled the affected download page and announced a migration to a static-site architecture to prevent further injection or file tampering.

                    What Was Not Affected

                    Direct ISO images and checksums hosted on Canonical’s official mirror (cdimage.ubuntu.com) were not compromised.

                    Only the torrent download link from the Xubuntu.org domain was affected.

                    Recommendations

                    If you downloaded Xubuntu via torrent from Xubuntu.org between October 18–19, 2025:

                    • Delete xubuntu-safe-download.zip immediately.
                    • Scan your Windows system for malware or autorun persistence keys.
                    • Rotate cryptocurrency wallets and reset all associated credentials.
                    • Verify all future downloads against SHA256/PGP checksums provided on Canonical mirrors.

                    Sources:

                    • https://www.ghacks.net/2025/10/20/xubuntus-website-was-hacked-to-spread-a-malware-fixed-now/
                    • https://cybernews.com/security/xubuntu-site-compromise-hackers-peddle-malware/
                    • https://www.theregister.com/2025/10/20/xubuntu_website_compromised/

                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                    3x RTX 4090

                    1 Reply Last reply
                    👍
                    0
                    • cycloneC Offline
                      cycloneC Offline
                      cyclone
                      Admin Trusted
                      wrote last edited by
                      #91

                      Recap of Record Setting Hyper-Volumetric DDoS Attacks in 2025 (CloudFlare)

                      c4277848-2b31-4e87-9f51-d319e24bb72d-image.png

                      Overview:
                      Recent months have seen a dramatic escalation in Distributed Denial-of-Service (DDoS) attacks, both in volume and packet rate. Two ultra-high-volume events stand out: a 7.3 Tbps / 4.8 Bpps attack on May 15 2025, and a later and eye watering 11.5 Tbps / 5.1 Bpps assault on September 3 2025, both successfully mitigated by Cloudflare.

                      Key Details:

                      • The 7.3 Tbps attack targeted an unnamed hosting provider in mid-2025 and delivered roughly 37.4 TB of data in ~45 seconds.

                      e180570d-367f-43cd-aa84-edf39dee410f-image.png

                      • The 11.5 Tbps event occurred in September 2025, lasted about 35 seconds, and was primarily a UDP flood. Sources included cloud providers and massive IoT botnets.

                      a13c17a4-e515-470f-85fd-e8a0fe7566da-image.png

                      • These attacks reflect a trend: “hyper-volumetric” DDoS defined as >1 Tbps or >1 Bpps are now occurring at disproportionately high rates.

                      Final Thoughts:

                      • The sheer rate and short duration (under a minute) make detection and response challenging.
                      • Attackers are increasingly deploying multi-vector strategies and exploiting large botnets of compromised IoT/cloud devices.
                      • These record-breaking DDoS events signal that we’ve entered a new era of scale in DDoS attacks. The days of only mitigating sub-100 Gbps events are behind us - now it’s multi-Tbps and packet rates in the billions.

                      Sources:

                      • https://x.com/Cloudflare/status/1962559687368593552
                      • https://www.tomshardware.com/tech-industry/cyber-security/cloudflare-blocks-record-setting-11-5tbps-ddos-attack-two-months-after-the-previous-record-setting-ddos-attack
                      • https://cybersecuritynews.com/record-breaking-ddos-attack-7-3-tbps/

                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                      3x RTX 4090

                      1 Reply Last reply
                      👍
                      1
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      Who's Online [Full List]

                      8 users active right now (2 members and 6 guests).
                      hashpwn-bot, freeroute

                      Board Statistics

                      Our members have made a total of 5.5k posts in 156 topics.
                      We currently have 287 members registered.
                      Please welcome our newest member, JohnMcLean493049.
                      The most users online at one time was 49 on Thursday, December 26, 2024.

                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent