Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. General Discussion
  3. Infosec News

Infosec News

Scheduled Pinned Locked Moved General Discussion
81 Posts 2 Posters 6.8k Views 2 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Offline
    cycloneC Offline
    cyclone
    Admin Trusted
    wrote on last edited by
    #4

    FBI Warns: Fake File Converter Sites Spreading Malware & Ransomware

    The FBI Denver Field Office has issued a warning about malicious "free online file converter" sites being used to distribute malware, steal sensitive data, and deploy ransomware. These sites appear legitimate, offering to convert or merge documents, but instead deliver malicious executables or JavaScript files hidden in ZIP archives.

    Some of these tools, like docu-flex[.]com and pdfixers[.]com, have been tied to Gootloader, a known malware loader used for dropping banking trojans, Cobalt Strike, and ransomware. These campaigns exploit search engine ads and typosquatted domains to lure victims. Infected systems risk data theft, remote access, and full corporate breaches.

    Users are advised to avoid sketchy converter sites, scan downloaded files, and avoid executing unknown JS/EXE payloads from these platforms.

    4254bbd1-daf7-4d1b-8a5d-653143b1b84f-image.png

    Source:
    https://www.bleepingcomputer.com/news/security/fbi-warnings-are-true-fake-file-converters-do-push-malware/

    FBI Denver Field Office Public Warning:

    https://www.fbi.gov/contact-us/field-offices/denver/news/fbi-denver-warns-of-online-file-converter-scam
    

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    1
    • cycloneC Offline
      cycloneC Offline
      cyclone
      Admin Trusted
      wrote on last edited by
      #5

      Dozens of solar inverter flaws could be exploited to attack power grids

      Vedere Labs has disclosed a total of 46 vulnerabilities across PV inverters made by Sungrow, Growatt, and SMA — three of the world’s largest solar inverter manufacturers. These flaws enable attackers to perform remote code execution, device hijacking, credential theft, and even manipulate power output, posing a real threat to grid stability.

      The report outlines how attackers can exploit cloud backend APIs, hardcoded credentials, IDORs, and buffer overflows to control inverter fleets. Coordinated manipulation of inverter output could destabilize energy grids or act as a physical layer botnet.

      Vendors have begun patching, but the risks highlight severe supply chain and infrastructure security gaps in IoT energy tech. Threats range from grid disruption and physical damage to smart home hijacking and ransomware.

      image.png

      Source:
      https://www.bleepingcomputer.com/news/security/dozens-of-solar-inverter-flaws-could-be-exploited-to-attack-power-grids/

      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
      3x RTX 4090

      1 Reply Last reply
      👀
      1
      • cycloneC Offline
        cycloneC Offline
        cyclone
        Admin Trusted
        wrote on last edited by cyclone
        #6

        IngressNightmare: 9.8 Critical RCE in Ingress NGINX Affects 40%+ of Cloud Environments

        Wiz Research has disclosed a set of unauthenticated Remote Code Execution (RCE) vulnerabilities in Ingress NGINX Controller for Kubernetes, dubbed #IngressNightmare. These flaws (CVE-2025-1097, 1098, 24514, 1974) allow attackers to inject arbitrary NGINX configs via malicious admission requests, leading to code execution, cluster takeover, and full access to Kubernetes secrets across namespaces.

        The vulnerable admission controller runs with high privileges and is often exposed without authentication. Exploits combine config injection, shared library tricks, and NGINX client-body buffer abuse to gain persistent RCE on pods, affecting over 6,500 clusters, including those from Fortune 500s.

        Patch immediately:

        • Upgrade to Ingress NGINX v1.12.1 or v1.11.5
        • Lock down admission webhooks
        • Apply Wiz or Nuclei-based scans for exposure
        • Disable admissionWebhooks if patching isn't yet possible

        This is a cluster-critical issue for Kubernetes users relying on Ingress-NGINX, especially those exposing controllers to the public internet.

        a340f007-af34-41da-8ca4-7a59478f9241-image.png

        Source:
        https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • cycloneC Offline
          cycloneC Offline
          cyclone
          Admin Trusted
          wrote on last edited by cyclone
          #7

          Rhysida Ransomware Hits PA Education Union – 500K+ Impacted

          The Pennsylvania State Education Association (PSEA), representing over 178,000 public-sector education professionals, confirmed a major data breach affecting 517,487 individuals. Attackers exfiltrated sensitive data including SSNs, financial info, driver’s licenses, passports, health data, and login credentials during a July 2024 intrusion, later attributed to the Rhysida ransomware gang.

          Rhysida demanded 20 BTC in ransom and briefly listed the stolen data on its dark web leak site. Though the listing has since been removed, it's unclear if PSEA paid. Victims are being offered free IDX credit monitoring and are urged to monitor for identity fraud.

          Rhysida continues its aggressive ransomware campaigns, having also hit major healthcare, government, and corporate targets globally, including Lurie Children’s Hospital, Insomniac Games, and the City of Columbus.

          9fd601c5-472f-431b-95a3-85037e5f4c16-image.png

          Source:
          https://www.bleepingcomputer.com/news/security/pennsylvania-education-union-data-breach-hit-500-000-people/

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          1
          • cycloneC Offline
            cycloneC Offline
            cyclone
            Admin Trusted
            wrote on last edited by cyclone
            #8

            New StilachiRAT Malware Surfaces with Crypto Theft & RDP Monitoring Capabilities

            Microsoft researchers have identified a new Remote Access Trojan (RAT) in the wild dubbed StilachiRAT — a stealthy malware tool capable of system reconnaissance, credential and crypto wallet theft, RDP session monitoring, clipboard scraping, and more. Though not yet tied to a specific threat group, the RAT shows signs of being built for persistent, multi-stage intrusions.

            StilachiRAT includes watchdog persistence, anti-forensics features, and the ability to reinstall itself as a Windows service via SCM and registry manipulation. While currently not widespread, its advanced capabilities suggest it may become more common in targeted recon and exfiltration campaigns.

            Microsoft has released IoCs and mitigation guidance, urging defenders to update signatures and monitor for anomalous DLL/service behavior.

            6532e5e8-aca8-496b-84a2-ce423aa81d1e-image.png

            Source:
            https://www.bitdefender.com/en-us/blog/hotforsecurity/researchers-discover-new-stilachirat-malware

            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
            3x RTX 4090

            1 Reply Last reply
            0
            • cycloneC Offline
              cycloneC Offline
              cyclone
              Admin Trusted
              wrote on last edited by cyclone
              #9

              CVE-2025-24813 – Apache Tomcat PUT Flaw Enables RCE, Data Corruption

              A critical Apache Tomcat vulnerability (CVE-2025-24813) allows Remote Code Execution (RCE), data corruption, and information disclosure via improper handling of partial HTTP PUT requests. Affected versions include:

              • Tomcat 11.0.0-M1 to 11.0.2
              • Tomcat 10.1.0-M1 to 10.1.34
              • Tomcat 9.0.0-M1 to 9.0.98

              Exploitation requires non-default write-enabled servlets, partial PUT support (enabled by default), and deserialization-vulnerable libraries. Attackers can upload malicious JSPs, overwrite session files, or read server configs.

              Mitigations:

              • Upgrade to Tomcat 11.0.3, 10.1.35, or 9.0.98
              • Disable allowPartialPut or ensure readonly="true" in DefaultServlet
              • Remove unsafe deserialization libraries
              • For Java 17, set -Dsun.io.useCanonCaches=false

              Delay in patching = high risk of full server compromise.

              c6abeccb-941d-4489-b85f-1a1f62dbaeee-image.png

              Source:
              https://cybersecuritynews.com/apache-tomcat-vulnerability-rce-attacks/

              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
              3x RTX 4090

              1 Reply Last reply
              👍
              0
              • cycloneC Offline
                cycloneC Offline
                cyclone
                Admin Trusted
                wrote on last edited by
                #10

                Google confirms cyber "espionage" attacks on Chrome users from "highly sophisticated malware"

                Google has confirmed a zero-click vulnerability in Chrome (CVE-2025-2783) actively exploited in the wild. Discovered by Kaspersky, the flaw was leveraged in a targeted cyber espionage campaign called Operation ForumTroll, infecting victims via phishing emails with malicious links — no user interaction required beyond viewing the message.

                The exploit bypassed Chrome's sandbox protections entirely and infected systems upon launch. Targets included media, education, and government sectors. A security patch has been released, and all users are urged to update Chrome immediately and remain vigilant with email hygiene.

                6377eb5f-baa8-44bf-b293-e9aa0fda730a-image.png

                Source:
                https://nypost.com/2025/03/26/tech/google-chrome-confirms-cyber-espionage-attacks-from-highly-sophisticated-malware/

                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                3x RTX 4090

                1 Reply Last reply
                0
                • cycloneC Offline
                  cycloneC Offline
                  cyclone
                  Admin Trusted
                  wrote on last edited by
                  #11

                  Active Exploit CVE-2024-4577 still in the wild: PHP RCE Vulnerability Targets Windows Servers

                  Security researchers at Bitdefender have observed widespread exploitation of a critical PHP vulnerability (CVE-2024-4577), which affects Windows systems running PHP in CGI mode. The flaw allows remote code execution via argument injection, and attackers are using it to deploy cryptocurrency miners (like XMRig) and remote access tools such as Quasar RAT. Attack patterns include system reconnaissance, use of native Windows tools, and even cryptojacking rivalries, with attackers blocking each other’s IPs to maintain control. While Taiwan and Hong Kong are hit hardest, systems worldwide are at risk. The PHP team has released patches in versions 8.3.8, 8.2.20, and 8.1.29. Organizations using older or unsupported PHP versions are urged to upgrade immediately and move away from CGI configurations to safer alternatives like PHP-FPM or FastCGI.

                  1e33a454-683d-4e3c-bcc4-54427b32d183-image.png

                  Source:
                  https://cybersecuritynews.com/php-rce-vulnerability-actively-exploited-in-wild/

                  Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                  3x RTX 4090

                  1 Reply Last reply
                  👍
                  0
                  • cycloneC Offline
                    cycloneC Offline
                    cyclone
                    Admin Trusted
                    wrote on last edited by
                    #12

                    Windows 11 Trick Bypasses Microsoft Account Requirement

                    c799fce3-ec00-44b3-892b-196b55f1ae23-image.png

                    Microsoft continues pushing users toward Microsoft Accounts in Windows 11 by removing workarounds like the BypassNRO.cmd script. However, a newly discovered method makes bypassing this restriction easier than ever — and it still works as of April 2025.

                    Discovered by user Wither OrNot and confirmed by BleepingComputer, this method lets you create a local account during installation without modifying the registry or using external scripts.

                    Here’s how it works:

                    During setup, when Windows 11 prompts “Let’s connect you to a network,” press Shift+F10 to open Command Prompt.

                    Run the following command:

                    start ms-cxh:localonly
                    

                    This opens a hidden local user setup screen, allowing you to bypass Microsoft Account requirements entirely.

                    Complete setup as normal — the system will continue using your new local account.

                    After setup, you can verify this under the Start menu → account icon — it’ll show a local user, not a connected MS account.

                    Source:
                    https://www.bleepingcomputer.com/news/microsoft/new-windows-11-trick-lets-you-bypass-microsoft-account-requirement/

                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                    3x RTX 4090

                    1 Reply Last reply
                    0
                    • cycloneC Offline
                      cycloneC Offline
                      cyclone
                      Admin Trusted
                      wrote on last edited by cyclone
                      #13

                      ChatGPT Outage: Service Down Worldwide with “Something Went Wrong” Error

                      e36077fb-53cc-442e-93ec-ca9d585ac623-image.png

                      Bleeping Computer is reporting that ChatGPT is currently experiencing a global outage, affecting users across the U.S., Europe, Asia, and beyond. Users are reporting repeated "Something went wrong" errors when trying to interact with the AI. The issue persists despite retries and refresh attempts. OpenAI has not yet issued an official statement. This is a developing story — check the source link below for updates.

                      Source:
                      https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-is-down-worldwide-with-something-went-wrong-error/

                      Downdetector:
                      https://downdetector.com/status/openai/
                      9ef77b2a-a778-40ea-bc05-c1a3df8459dc-image.png

                      OpenAI Status Page:
                      https://status.openai.com/
                      011b5af9-88a9-44d6-97e1-5b8920b7b5d8-image.png

                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                      3x RTX 4090

                      1 Reply Last reply
                      0
                      • cycloneC Offline
                        cycloneC Offline
                        cyclone
                        Admin Trusted
                        wrote on last edited by
                        #14

                        State Bar of Texas Confirms Data Breach Following INC Ransomware Claim

                        The State Bar of Texas has confirmed a data breach after the INC ransomware gang claimed responsibility and began leaking stolen data. The breach, which occurred between January 28 and February 9, 2025, involved unauthorized access to internal systems and the theft of unspecified personal and professional information.

                        The Bar, which serves over 100,000 licensed attorneys, issued notification letters to affected members and is offering free credit monitoring and identity protection through Experian. The INC gang listed the organization on its dark web leak site on March 9, publishing legal case documents as alleged proof.

                        While it remains unverified if the leaked data came directly from the Bar's systems, recipients are being urged to remain vigilant, consider a credit freeze or fraud alert, and enroll in protection services before July 31, 2025. The State Bar has yet to comment publicly on the extent of the damage or respond to inquiries about the legitimacy of the leaked documents.

                        2b793805-da09-43c4-8cd5-e05d48cc365b-image.png

                        Source:
                        https://www.bleepingcomputer.com/news/security/texas-state-bar-warns-of-data-breach-after-inc-ransomware-claims-attack/

                        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                        3x RTX 4090

                        1 Reply Last reply
                        0
                        • cycloneC Offline
                          cycloneC Offline
                          cyclone
                          Admin Trusted
                          wrote on last edited by
                          #15

                          Critical RCE Vulnerability Found in Apache Parquet – CVE-2025-30065

                          fb63ebea-f5fe-4742-b8f3-8a46d303d165-image.png

                          A maximum severity remote code execution (RCE) vulnerability has been discovered in Apache Parquet, impacting all versions up to 1.15.0. Tracked as CVE-2025-30065, the flaw has received a CVSS v4 score of 10.0, the highest possible.

                          The issue stems from unsafe deserialization in the Parquet-Avro module, allowing attackers to execute arbitrary code when a crafted Parquet file is imported into a vulnerable system. While exploitation requires a user to process a malicious file, the widespread use of Parquet across big data platforms like Hadoop, AWS, Azure, and GCP increases the attack surface significantly.

                          Apache has patched the issue in version 1.15.1, and all users are urged to upgrade immediately. Organizations unable to upgrade should avoid untrusted files, validate inputs rigorously, and increase monitoring around systems processing Parquet data.

                          This vulnerability was responsibly disclosed by Amazon researcher Keyi Li and highlights the ongoing risks posed by untrusted data ingestion in analytics and data engineering environments.

                          No active exploitation has been observed yet, but the potential impact is severe. Admins and developers using Parquet in any form should treat this as a high-priority fix.

                          Source:
                          https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/

                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                          3x RTX 4090

                          1 Reply Last reply
                          0
                          • freerouteF Offline
                            freerouteF Offline
                            freeroute
                            Moderator Trusted
                            wrote on last edited by freeroute
                            #16

                            Gmail Is Not a Secure Way to Send Sensitive Comms: A Friendly Reminder
                            New end-to-end Gmail encryption alone isn't secure enough for an enterprise's most sensitive and prized data, experts say.
                            On April 1, The Washington Post reported that US National Security advisers were using Gmail for official communications, including "highly technical conversations with colleagues at other government agencies involving sensitive military positions and powerful weapons systems relating to an ongoing conflict."

                            The National Security Council pushed back, stressing Gmail was never used to send any classified materials. However, the news drew scrutiny in light of the recent revelations of the team's Signal leak of classified military information.

                            The same day, Google announced its email service would implement a new Google Workspace feature and provide end-to-end encryption in Gmail.

                            Source: Gmail Is Not a Secure Way to Send Sensitive Comms

                            1 Reply Last reply
                            👍
                            0
                            • cycloneC Offline
                              cycloneC Offline
                              cyclone
                              Admin Trusted
                              wrote on last edited by
                              #17

                              Coinbase to Fix Confusing 2FA Error Message Causing Security Panic

                              eed5c780-56aa-4291-8893-903ff598a870-image.png

                              Coinbase is addressing a misleading error in its account activity logs that has alarmed users into thinking their accounts were under attack. The message — “2-step verification failed” — appears even when someone simply enters an incorrect password, leading many to believe their credentials were compromised.

                              The confusion escalated after phishing attempts, with users logging in to find failed 2FA entries from unknown locations. This triggered a wave of password resets, malware scans, and concern over a potential breach.

                              Coinbase has confirmed the message is misleading and is working on a fix, though no timeline has been provided. The issue is also being exploited in social engineering scams, reinforcing the need for vigilance. Coinbase reminds users: they will never contact you via call or text about account issues.

                              Source:
                              https://www.bleepingcomputer.com/news/security/coinbase-to-fix-2fa-account-activity-entry-freaking-out-users/

                              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                              3x RTX 4090

                              1 Reply Last reply
                              0
                              • cycloneC Offline
                                cycloneC Offline
                                cyclone
                                Admin Trusted
                                wrote on last edited by
                                #18

                                Hack The Box “Ghost” Challenge Cracked: Technical Walkthrough by 0xdf

                                b8a2756d-af9e-455b-8f2b-5203166c2ca9-image.png

                                Cybersecurity researcher 0xdf has successfully solved the “Ghost” challenge on Hack The Box and published a highly detailed exploit write-up. The post covers each phase of the attack — from initial reconnaissance using Nmap, to exploiting a directory traversal vulnerability, discovering hardcoded credentials, and escalating to root via a misconfigured cron job.

                                This real-world style scenario highlights serious security missteps like insecure input validation and writable root-level tasks. The challenge and exploit offer practical insights for both pentesters and sysadmins, showcasing how minor oversights can lead to full system compromise. A must-read for anyone interested in offensive security or infrastructure hardening.

                                Source:
                                https://gbhackers.com/hack-the-box-ghost-challenge-cracked-a-detailed-technical-exploit/

                                Walkthrough:
                                https://0xdf.gitlab.io/2025/04/05/htb-ghost.html

                                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                3x RTX 4090

                                1 Reply Last reply
                                1
                                • cycloneC Offline
                                  cycloneC Offline
                                  cyclone
                                  Admin Trusted
                                  wrote on last edited by
                                  #19

                                  Google Launches "Sec-Gemini" AI to Supercharge Threat Intel and Incident Response

                                  4b4e63d3-8f3d-4756-9947-68cd34637601-image.png

                                  Google has unveiled Sec-Gemini v1, an experimental AI model that blends the power of its Gemini LLM with real-time security intelligence from Mandiant, GTI, and OSV. Designed to elevate threat detection and incident analysis workflows, Sec-Gemini outperforms rivals in benchmarks like CTI-MCQ and CWE mapping by over 10%.

                                  The model can identify threat actors, assess vulnerabilities, and analyze root causes with high accuracy — and it’s being made available to vetted researchers and institutions for testing. A promising leap forward in AI-driven cybersecurity operations.

                                  Source:
                                  https://www.securityweek.com/google-pushing-sec-gemini-ai-model-for-threat-intel-workflows/

                                  Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                  3x RTX 4090

                                  1 Reply Last reply
                                  👍
                                  0
                                  • cycloneC Offline
                                    cycloneC Offline
                                    cyclone
                                    Admin Trusted
                                    wrote on last edited by
                                    #20

                                    US OCC Alerts Congress to Major Email Breach Exposing Sensitive Financial Oversight Data

                                    88dad111-03d1-4e09-a854-bb6d858c6388-image.png

                                    On April 8, 2025, the US Office of the Comptroller of the Currency (OCC) reported a major security incident to Congress involving unauthorized access to internal emails and attachments. Discovered in February, the breach exposed sensitive data used in financial institution oversight. Over 100 OCC employees’ inboxes were compromised, affecting more than 150,000 emails. The OCC is collaborating with the Treasury and third-party cybersecurity experts to assess the impact and remediate security weaknesses. No financial sector impact has been reported so far.

                                    Source:
                                    https://www.pymnts.com/cybersecurity/2025/occ-notifies-congress-of-major-security-incident-involving-email-access/

                                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                    3x RTX 4090

                                    1 Reply Last reply
                                    0
                                    • cycloneC Offline
                                      cycloneC Offline
                                      cyclone
                                      Admin Trusted
                                      wrote on last edited by
                                      #21

                                      Fake Microsoft Office Add-in Tools Distribute Cryptocurrency-Stealing Malware via SourceForge

                                      c25a1266-229c-41f6-a958-be9b85c1c16f-image.png

                                      Threat actors are exploiting SourceForge to distribute counterfeit Microsoft Office add-in tools that install malware on victims' computers. This malware is designed to mine and steal cryptocurrency. The malicious project, named "officepackage," mimics legitimate Microsoft development tools, deceiving users into downloading and executing harmful files. The campaign has affected over 4,600 systems, primarily in Russia. Users are advised to download software only from verified sources and to scan all files with up-to-date antivirus tools before execution.

                                      Source:
                                      https://www.bleepingcomputer.com/news/security/fake-microsoft-office-add-in-tools-push-malware-via-sourceforge/

                                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                      3x RTX 4090

                                      1 Reply Last reply
                                      0
                                      • cycloneC Offline
                                        cycloneC Offline
                                        cyclone
                                        Admin Trusted
                                        wrote on last edited by
                                        #22

                                        Gamaredon Hackers Target Western Military Mission in Ukraine Using Malicious USB Drives

                                        12e072a8-1420-4636-b810-4340714341de-image.png

                                        The Russian state-linked APT group Gamaredon (aka Shuckworm) has been attributed to a February–March 2025 cyber attack targeting a foreign military mission based in Ukraine. According to Symantec researchers, initial access was gained via an infected removable drive containing a malicious shortcut file. Once inserted, the attack chain used mshta.exe to launch multiple payloads, including an info-stealing PowerShell malware known as GammaSteel.

                                        The malware established C2 communications through legitimate services (e.g., Teletype, Telegram), propagated to other drives using malicious .lnk files, and executed reconnaissance scripts that collected screenshots, system details, antivirus status, and user documents. The final stage involved a more obfuscated GammaSteel variant that exfiltrated files with specific extensions from the Desktop and Documents folders.

                                        Symantec noted an increase in Gamaredon’s sophistication—while still less advanced than other Russian actors, the group shows persistent improvement in evasion techniques, code obfuscation, and operational focus on Ukrainian targets.

                                        Source:
                                        https://thehackernews.com/2025/04/gamaredon-uses-infected-removable.html

                                        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                        3x RTX 4090

                                        1 Reply Last reply
                                        👍
                                        0
                                        • cycloneC Offline
                                          cycloneC Offline
                                          cyclone
                                          Admin Trusted
                                          wrote on last edited by
                                          #23

                                          CISA Flags Actively Exploited Linux Kernel Zero-Days Linked to Cellebrite Android Unlock Exploit Chain

                                          c0ce4937-927b-4cbf-bc49-7da274ddbdef-image.png

                                          The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert on two actively exploited Linux kernel vulnerabilities—CVE-2024-53197 and CVE-2024-53150—used in a zero-day exploit chain reportedly developed by Cellebrite and deployed by Serbian authorities to unlock Android devices. CVE-2024-53197 targets ALSA USB-audio drivers for local privilege escalation, while CVE-2024-53150 enables kernel memory leaks. Both are now in CISA’s Known Exploited Vulnerabilities (KEV) catalog, with mandatory federal patching required by April 30, 2025.

                                          Source:
                                          https://securityonline.info/cisa-warns-of-actively-exploited-linux-kernel-vulnerabilities-cve-2024-53197-cve-2024-53150/

                                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                          3x RTX 4090

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          Who's Online [Full List]

                                          7 users active right now (5 members and 2 guests).
                                          hashpwn-bot, John, v1cvap0r, casper_

                                          Board Statistics

                                          Our members have made a total of 3.5k posts in 150 topics.
                                          We currently have 257 members registered.
                                          Please welcome our newest member, vioednfekla.
                                          The most users online at one time was 49 on Thursday, December 26, 2024.

                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent