Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. General Discussion
  3. Infosec News

Infosec News

Scheduled Pinned Locked Moved General Discussion
81 Posts 2 Posters 6.8k Views 2 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cycloneC Offline
    cycloneC Offline
    cyclone
    Admin Trusted
    wrote on last edited by
    #10

    Google confirms cyber "espionage" attacks on Chrome users from "highly sophisticated malware"

    Google has confirmed a zero-click vulnerability in Chrome (CVE-2025-2783) actively exploited in the wild. Discovered by Kaspersky, the flaw was leveraged in a targeted cyber espionage campaign called Operation ForumTroll, infecting victims via phishing emails with malicious links — no user interaction required beyond viewing the message.

    The exploit bypassed Chrome's sandbox protections entirely and infected systems upon launch. Targets included media, education, and government sectors. A security patch has been released, and all users are urged to update Chrome immediately and remain vigilant with email hygiene.

    6377eb5f-baa8-44bf-b293-e9aa0fda730a-image.png

    Source:
    https://nypost.com/2025/03/26/tech/google-chrome-confirms-cyber-espionage-attacks-from-highly-sophisticated-malware/

    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
    3x RTX 4090

    1 Reply Last reply
    0
    • cycloneC Offline
      cycloneC Offline
      cyclone
      Admin Trusted
      wrote on last edited by
      #11

      Active Exploit CVE-2024-4577 still in the wild: PHP RCE Vulnerability Targets Windows Servers

      Security researchers at Bitdefender have observed widespread exploitation of a critical PHP vulnerability (CVE-2024-4577), which affects Windows systems running PHP in CGI mode. The flaw allows remote code execution via argument injection, and attackers are using it to deploy cryptocurrency miners (like XMRig) and remote access tools such as Quasar RAT. Attack patterns include system reconnaissance, use of native Windows tools, and even cryptojacking rivalries, with attackers blocking each other’s IPs to maintain control. While Taiwan and Hong Kong are hit hardest, systems worldwide are at risk. The PHP team has released patches in versions 8.3.8, 8.2.20, and 8.1.29. Organizations using older or unsupported PHP versions are urged to upgrade immediately and move away from CGI configurations to safer alternatives like PHP-FPM or FastCGI.

      1e33a454-683d-4e3c-bcc4-54427b32d183-image.png

      Source:
      https://cybersecuritynews.com/php-rce-vulnerability-actively-exploited-in-wild/

      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
      3x RTX 4090

      1 Reply Last reply
      👍
      0
      • cycloneC Offline
        cycloneC Offline
        cyclone
        Admin Trusted
        wrote on last edited by
        #12

        Windows 11 Trick Bypasses Microsoft Account Requirement

        c799fce3-ec00-44b3-892b-196b55f1ae23-image.png

        Microsoft continues pushing users toward Microsoft Accounts in Windows 11 by removing workarounds like the BypassNRO.cmd script. However, a newly discovered method makes bypassing this restriction easier than ever — and it still works as of April 2025.

        Discovered by user Wither OrNot and confirmed by BleepingComputer, this method lets you create a local account during installation without modifying the registry or using external scripts.

        Here’s how it works:

        During setup, when Windows 11 prompts “Let’s connect you to a network,” press Shift+F10 to open Command Prompt.

        Run the following command:

        start ms-cxh:localonly
        

        This opens a hidden local user setup screen, allowing you to bypass Microsoft Account requirements entirely.

        Complete setup as normal — the system will continue using your new local account.

        After setup, you can verify this under the Start menu → account icon — it’ll show a local user, not a connected MS account.

        Source:
        https://www.bleepingcomputer.com/news/microsoft/new-windows-11-trick-lets-you-bypass-microsoft-account-requirement/

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        0
        • cycloneC Offline
          cycloneC Offline
          cyclone
          Admin Trusted
          wrote on last edited by cyclone
          #13

          ChatGPT Outage: Service Down Worldwide with “Something Went Wrong” Error

          e36077fb-53cc-442e-93ec-ca9d585ac623-image.png

          Bleeping Computer is reporting that ChatGPT is currently experiencing a global outage, affecting users across the U.S., Europe, Asia, and beyond. Users are reporting repeated "Something went wrong" errors when trying to interact with the AI. The issue persists despite retries and refresh attempts. OpenAI has not yet issued an official statement. This is a developing story — check the source link below for updates.

          Source:
          https://www.bleepingcomputer.com/news/artificial-intelligence/chatgpt-is-down-worldwide-with-something-went-wrong-error/

          Downdetector:
          https://downdetector.com/status/openai/
          9ef77b2a-a778-40ea-bc05-c1a3df8459dc-image.png

          OpenAI Status Page:
          https://status.openai.com/
          011b5af9-88a9-44d6-97e1-5b8920b7b5d8-image.png

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          0
          • cycloneC Offline
            cycloneC Offline
            cyclone
            Admin Trusted
            wrote on last edited by
            #14

            State Bar of Texas Confirms Data Breach Following INC Ransomware Claim

            The State Bar of Texas has confirmed a data breach after the INC ransomware gang claimed responsibility and began leaking stolen data. The breach, which occurred between January 28 and February 9, 2025, involved unauthorized access to internal systems and the theft of unspecified personal and professional information.

            The Bar, which serves over 100,000 licensed attorneys, issued notification letters to affected members and is offering free credit monitoring and identity protection through Experian. The INC gang listed the organization on its dark web leak site on March 9, publishing legal case documents as alleged proof.

            While it remains unverified if the leaked data came directly from the Bar's systems, recipients are being urged to remain vigilant, consider a credit freeze or fraud alert, and enroll in protection services before July 31, 2025. The State Bar has yet to comment publicly on the extent of the damage or respond to inquiries about the legitimacy of the leaked documents.

            2b793805-da09-43c4-8cd5-e05d48cc365b-image.png

            Source:
            https://www.bleepingcomputer.com/news/security/texas-state-bar-warns-of-data-breach-after-inc-ransomware-claims-attack/

            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
            3x RTX 4090

            1 Reply Last reply
            0
            • cycloneC Offline
              cycloneC Offline
              cyclone
              Admin Trusted
              wrote on last edited by
              #15

              Critical RCE Vulnerability Found in Apache Parquet – CVE-2025-30065

              fb63ebea-f5fe-4742-b8f3-8a46d303d165-image.png

              A maximum severity remote code execution (RCE) vulnerability has been discovered in Apache Parquet, impacting all versions up to 1.15.0. Tracked as CVE-2025-30065, the flaw has received a CVSS v4 score of 10.0, the highest possible.

              The issue stems from unsafe deserialization in the Parquet-Avro module, allowing attackers to execute arbitrary code when a crafted Parquet file is imported into a vulnerable system. While exploitation requires a user to process a malicious file, the widespread use of Parquet across big data platforms like Hadoop, AWS, Azure, and GCP increases the attack surface significantly.

              Apache has patched the issue in version 1.15.1, and all users are urged to upgrade immediately. Organizations unable to upgrade should avoid untrusted files, validate inputs rigorously, and increase monitoring around systems processing Parquet data.

              This vulnerability was responsibly disclosed by Amazon researcher Keyi Li and highlights the ongoing risks posed by untrusted data ingestion in analytics and data engineering environments.

              No active exploitation has been observed yet, but the potential impact is severe. Admins and developers using Parquet in any form should treat this as a high-priority fix.

              Source:
              https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/

              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
              3x RTX 4090

              1 Reply Last reply
              0
              • freerouteF Offline
                freerouteF Offline
                freeroute
                Moderator Trusted
                wrote on last edited by freeroute
                #16

                Gmail Is Not a Secure Way to Send Sensitive Comms: A Friendly Reminder
                New end-to-end Gmail encryption alone isn't secure enough for an enterprise's most sensitive and prized data, experts say.
                On April 1, The Washington Post reported that US National Security advisers were using Gmail for official communications, including "highly technical conversations with colleagues at other government agencies involving sensitive military positions and powerful weapons systems relating to an ongoing conflict."

                The National Security Council pushed back, stressing Gmail was never used to send any classified materials. However, the news drew scrutiny in light of the recent revelations of the team's Signal leak of classified military information.

                The same day, Google announced its email service would implement a new Google Workspace feature and provide end-to-end encryption in Gmail.

                Source: Gmail Is Not a Secure Way to Send Sensitive Comms

                1 Reply Last reply
                👍
                0
                • cycloneC Offline
                  cycloneC Offline
                  cyclone
                  Admin Trusted
                  wrote on last edited by
                  #17

                  Coinbase to Fix Confusing 2FA Error Message Causing Security Panic

                  eed5c780-56aa-4291-8893-903ff598a870-image.png

                  Coinbase is addressing a misleading error in its account activity logs that has alarmed users into thinking their accounts were under attack. The message — “2-step verification failed” — appears even when someone simply enters an incorrect password, leading many to believe their credentials were compromised.

                  The confusion escalated after phishing attempts, with users logging in to find failed 2FA entries from unknown locations. This triggered a wave of password resets, malware scans, and concern over a potential breach.

                  Coinbase has confirmed the message is misleading and is working on a fix, though no timeline has been provided. The issue is also being exploited in social engineering scams, reinforcing the need for vigilance. Coinbase reminds users: they will never contact you via call or text about account issues.

                  Source:
                  https://www.bleepingcomputer.com/news/security/coinbase-to-fix-2fa-account-activity-entry-freaking-out-users/

                  Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                  3x RTX 4090

                  1 Reply Last reply
                  0
                  • cycloneC Offline
                    cycloneC Offline
                    cyclone
                    Admin Trusted
                    wrote on last edited by
                    #18

                    Hack The Box “Ghost” Challenge Cracked: Technical Walkthrough by 0xdf

                    b8a2756d-af9e-455b-8f2b-5203166c2ca9-image.png

                    Cybersecurity researcher 0xdf has successfully solved the “Ghost” challenge on Hack The Box and published a highly detailed exploit write-up. The post covers each phase of the attack — from initial reconnaissance using Nmap, to exploiting a directory traversal vulnerability, discovering hardcoded credentials, and escalating to root via a misconfigured cron job.

                    This real-world style scenario highlights serious security missteps like insecure input validation and writable root-level tasks. The challenge and exploit offer practical insights for both pentesters and sysadmins, showcasing how minor oversights can lead to full system compromise. A must-read for anyone interested in offensive security or infrastructure hardening.

                    Source:
                    https://gbhackers.com/hack-the-box-ghost-challenge-cracked-a-detailed-technical-exploit/

                    Walkthrough:
                    https://0xdf.gitlab.io/2025/04/05/htb-ghost.html

                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                    3x RTX 4090

                    1 Reply Last reply
                    1
                    • cycloneC Offline
                      cycloneC Offline
                      cyclone
                      Admin Trusted
                      wrote on last edited by
                      #19

                      Google Launches "Sec-Gemini" AI to Supercharge Threat Intel and Incident Response

                      4b4e63d3-8f3d-4756-9947-68cd34637601-image.png

                      Google has unveiled Sec-Gemini v1, an experimental AI model that blends the power of its Gemini LLM with real-time security intelligence from Mandiant, GTI, and OSV. Designed to elevate threat detection and incident analysis workflows, Sec-Gemini outperforms rivals in benchmarks like CTI-MCQ and CWE mapping by over 10%.

                      The model can identify threat actors, assess vulnerabilities, and analyze root causes with high accuracy — and it’s being made available to vetted researchers and institutions for testing. A promising leap forward in AI-driven cybersecurity operations.

                      Source:
                      https://www.securityweek.com/google-pushing-sec-gemini-ai-model-for-threat-intel-workflows/

                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                      3x RTX 4090

                      1 Reply Last reply
                      👍
                      0
                      • cycloneC Offline
                        cycloneC Offline
                        cyclone
                        Admin Trusted
                        wrote on last edited by
                        #20

                        US OCC Alerts Congress to Major Email Breach Exposing Sensitive Financial Oversight Data

                        88dad111-03d1-4e09-a854-bb6d858c6388-image.png

                        On April 8, 2025, the US Office of the Comptroller of the Currency (OCC) reported a major security incident to Congress involving unauthorized access to internal emails and attachments. Discovered in February, the breach exposed sensitive data used in financial institution oversight. Over 100 OCC employees’ inboxes were compromised, affecting more than 150,000 emails. The OCC is collaborating with the Treasury and third-party cybersecurity experts to assess the impact and remediate security weaknesses. No financial sector impact has been reported so far.

                        Source:
                        https://www.pymnts.com/cybersecurity/2025/occ-notifies-congress-of-major-security-incident-involving-email-access/

                        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                        3x RTX 4090

                        1 Reply Last reply
                        0
                        • cycloneC Offline
                          cycloneC Offline
                          cyclone
                          Admin Trusted
                          wrote on last edited by
                          #21

                          Fake Microsoft Office Add-in Tools Distribute Cryptocurrency-Stealing Malware via SourceForge

                          c25a1266-229c-41f6-a958-be9b85c1c16f-image.png

                          Threat actors are exploiting SourceForge to distribute counterfeit Microsoft Office add-in tools that install malware on victims' computers. This malware is designed to mine and steal cryptocurrency. The malicious project, named "officepackage," mimics legitimate Microsoft development tools, deceiving users into downloading and executing harmful files. The campaign has affected over 4,600 systems, primarily in Russia. Users are advised to download software only from verified sources and to scan all files with up-to-date antivirus tools before execution.

                          Source:
                          https://www.bleepingcomputer.com/news/security/fake-microsoft-office-add-in-tools-push-malware-via-sourceforge/

                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                          3x RTX 4090

                          1 Reply Last reply
                          0
                          • cycloneC Offline
                            cycloneC Offline
                            cyclone
                            Admin Trusted
                            wrote on last edited by
                            #22

                            Gamaredon Hackers Target Western Military Mission in Ukraine Using Malicious USB Drives

                            12e072a8-1420-4636-b810-4340714341de-image.png

                            The Russian state-linked APT group Gamaredon (aka Shuckworm) has been attributed to a February–March 2025 cyber attack targeting a foreign military mission based in Ukraine. According to Symantec researchers, initial access was gained via an infected removable drive containing a malicious shortcut file. Once inserted, the attack chain used mshta.exe to launch multiple payloads, including an info-stealing PowerShell malware known as GammaSteel.

                            The malware established C2 communications through legitimate services (e.g., Teletype, Telegram), propagated to other drives using malicious .lnk files, and executed reconnaissance scripts that collected screenshots, system details, antivirus status, and user documents. The final stage involved a more obfuscated GammaSteel variant that exfiltrated files with specific extensions from the Desktop and Documents folders.

                            Symantec noted an increase in Gamaredon’s sophistication—while still less advanced than other Russian actors, the group shows persistent improvement in evasion techniques, code obfuscation, and operational focus on Ukrainian targets.

                            Source:
                            https://thehackernews.com/2025/04/gamaredon-uses-infected-removable.html

                            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                            3x RTX 4090

                            1 Reply Last reply
                            👍
                            0
                            • cycloneC Offline
                              cycloneC Offline
                              cyclone
                              Admin Trusted
                              wrote on last edited by
                              #23

                              CISA Flags Actively Exploited Linux Kernel Zero-Days Linked to Cellebrite Android Unlock Exploit Chain

                              c0ce4937-927b-4cbf-bc49-7da274ddbdef-image.png

                              The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert on two actively exploited Linux kernel vulnerabilities—CVE-2024-53197 and CVE-2024-53150—used in a zero-day exploit chain reportedly developed by Cellebrite and deployed by Serbian authorities to unlock Android devices. CVE-2024-53197 targets ALSA USB-audio drivers for local privilege escalation, while CVE-2024-53150 enables kernel memory leaks. Both are now in CISA’s Known Exploited Vulnerabilities (KEV) catalog, with mandatory federal patching required by April 30, 2025.

                              Source:
                              https://securityonline.info/cisa-warns-of-actively-exploited-linux-kernel-vulnerabilities-cve-2024-53197-cve-2024-53150/

                              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                              3x RTX 4090

                              1 Reply Last reply
                              0
                              • cycloneC Offline
                                cycloneC Offline
                                cyclone
                                Admin Trusted
                                wrote on last edited by
                                #24

                                Fortinet Reveals Persistent Post-Patch Access via SSL-VPN Symlink Exploit

                                2d287b58-8930-4994-b0c6-0e5b394c310c-image.png

                                Fortinet has disclosed that attackers are maintaining read-only access to FortiGate devices even after patching, by abusing symbolic links (symlinks) in SSL-VPN language file directories. The exploit, tied to previously patched CVEs (CVE-2022-42475, CVE-2023-27997, CVE-2024-21762), enables stealthy persistence across firmware updates. Fortinet has updated FortiOS (versions 6.4.16 to 7.6.2) to detect and remove the symlinks and prevent further abuse. CISA and CERT-FR have issued alerts, with recommendations to patch, review configurations, reset credentials, and consider disabling SSL-VPN temporarily. The compromise dates back to early 2023 and has impacted critical infrastructure targets.

                                Source:
                                https://thehackernews.com/2025/04/fortinet-warns-attackers-retain.html

                                Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                3x RTX 4090

                                1 Reply Last reply
                                0
                                • cycloneC Offline
                                  cycloneC Offline
                                  cyclone
                                  Admin Trusted
                                  wrote on last edited by
                                  #25

                                  Windows CLFS Kernel Driver Zero-Day Exploited by Storm-2460 in Ransomware Attacks

                                  d8e87711-7251-4c1a-82e4-8ca316dfe107-image.png

                                  On April 9, 2025, Microsoft reported that a zero-day vulnerability in the Windows Common Log File System (CLFS), identified as CVE-2025-29824, is being actively exploited by the threat actor Storm-2460. The group utilizes the PipeMagic malware to escalate privileges and deploy ransomware, primarily targeting IT and real estate sectors in the U.S., as well as organizations in Venezuela, Saudi Arabia, and Spain. PipeMagic, initially discovered in 2022, functions as both a backdoor and a gateway, and has been linked to previous attacks involving fake ChatGPT applications. Microsoft has released security updates to address this vulnerability, and the Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-29824 to its Known Exploited Vulnerabilities catalog.​

                                  Source:
                                  https://www.cybersecuritydive.com/news/windows-clfs-zero-day-exploited-ransomware/744878/

                                  Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                  3x RTX 4090

                                  1 Reply Last reply
                                  0
                                  • cycloneC Offline
                                    cycloneC Offline
                                    cyclone
                                    Admin Trusted
                                    wrote on last edited by
                                    #26

                                    China-Linked UNC5174 Targets Linux and macOS Systems Using SNOWLIGHT Malware and VShell RAT

                                    f56bbdf5-0caa-4a82-ba2a-f07cf45ced56-image.png

                                    Threat actor UNC5174 (aka Uteus), linked to the Chinese government, has launched a new cyber campaign targeting Linux and macOS systems. The group uses an updated version of the SNOWLIGHT malware and the open-source VShell RAT to establish persistent, fileless remote access. Initial access is achieved via an unknown vector, followed by a malicious bash script that deploys SNOWLIGHT and Sliver implants. These tools leverage WebSockets-based C2 channels and memory-resident payloads for stealth. The campaign echoes tactics seen in previous exploits against Ivanti and F5 products, and aligns with broader Chinese cyber-espionage operations across nearly 20 countries.

                                    Related CVEs:
                                    CVE-2024-8963
                                    CVE-2024-9380
                                    CVE-2024-8190
                                    CVE-2025-0282
                                    CVE-2025-22457

                                    Source:
                                    https://thehackernews.com/2025/04/chinese-hackers-target-linux-systems.html

                                    Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                    3x RTX 4090

                                    1 Reply Last reply
                                    0
                                    • cycloneC Offline
                                      cycloneC Offline
                                      cyclone
                                      Admin Trusted
                                      wrote on last edited by cyclone
                                      #27

                                      EU's "ProtectEU" Plan Threatens End-to-End Encryption Across VPNs, Messaging Apps, and Secure Email Services

                                      bc3943fd-91bd-4efc-970e-f398292860ee-image.png

                                      The EU Commission has launched ProtectEU, a broad internal security strategy aimed at giving law enforcement lawful access to encrypted communications. While still in its early stages, the proposal is already raising red flags across the cybersecurity industry for potentially undermining end-to-end encryption.

                                      ProtectEU is part of a growing global trend where governments push for backdoors under the guise of national security. While aimed at combating crime, these proposals risk eroding digital privacy, weakening cybersecurity, and potentially driving privacy-focused services out of EU jurisdictions altogether.

                                      Key Affected Services:

                                      • VPN Providers: Proton, Mullvad, Surfshark, NordVPN, and others have expressed concern. Backdoors and data retention laws could force no-log VPNs to exit the EU market.
                                      • Encrypted Messaging Apps: Platforms like Signal, WhatsApp, and Threema are primary targets for surveillance, as they use strong E2EE to protect user privacy.
                                      • Secure Email Providers: Proton Mail and similar services could also be impacted due to their encrypted architecture.
                                      • Secure File Sharing & VoIP Tools: Any service enabling private, encrypted communications or file transfers may be at risk if required to implement surveillance capabilities.

                                      Industry Response:

                                      • Proton: Warns weakening encryption would "make European security worse", not better.
                                      • Mullvad: Criticizes ProtectEU as a rebrand of prior mass surveillance proposals ("Chat Control").
                                      • NordVPN & Surfshark: Express cautious optimism but emphasize that privacy and security are inseparable.
                                      • AdGuard VPN: Warns that enforced data retention would make no-log services "untenable".

                                      Source:
                                      https://www.techradar.com/vpn/vpn-privacy-security/weakening-encryption-would-make-european-security-worse-the-vpn-industry-reacts-to-the-eus-plan-for-end-to-end-encryption-backdoors

                                      European Commission Press Release:
                                      https://ec.europa.eu/commission/presscorner/detail/en/ip_25_920

                                      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                      3x RTX 4090

                                      1 Reply Last reply
                                      0
                                      • cycloneC Offline
                                        cycloneC Offline
                                        cyclone
                                        Admin Trusted
                                        wrote on last edited by
                                        #28

                                        4chan Hit by Major Breach: Alleged Hacker Leaks Source Code, Moderator Identities, and Disrupts Site

                                        32e83f09-8905-49b4-9ee5-e662285cc117-image.png

                                        In mid-April 2025, the notorious imageboard 4chan suffered a significant cybersecurity incident that has left the site offline and raised serious concerns over its internal security. Multiple sources report that a hacker, allegedly with long-term access to the platform's backend, exfiltrated and leaked sensitive data including source code, moderation tools, and a full list of site moderators and janitors.

                                        The breach was first hinted at when a previously defunct board on 4chan unexpectedly came back online, displaying the message “U GOT HACKED.” Following this, screenshots began circulating on social media and cybercrime forums, purportedly showing access to backend infrastructure, admin panels, and internal templates. Cybersecurity analyst Alon Gal noted that these materials appear legitimate, and at least one 4chan moderator, speaking anonymously, did not dispute their authenticity.

                                        Further reporting claims the attacker had access to 4chan’s systems for over a year before initiating the leak. The incident not only exposed internal systems and personnel data but also disrupted the platform’s availability, with 4chan remaining inaccessible at the time of writing.

                                        TechRadar and TechCrunch both received confirmation from individuals tied to 4chan’s moderation team, expressing concern that this breach may be worse than previous DDoS attacks or takedowns, given that the attacker may have had — or still has — full control over the platform’s infrastructure.

                                        The incident has prompted a wave of reaction across rival forums and social platforms. Some users, particularly from historically antagonistic communities like 8chan and remnants of eBaum’s World, have openly celebrated what they’ve labeled as 4chan’s “downfall.”

                                        4chan, known for minimal moderation and a culture steeped in anonymity and chaos, has long served as a hub for internet subcultures, memes, and coordinated online raids. However, it has also faced widespread criticism for hosting extreme content, including harassment, disinformation campaigns, and more recently, AI-generated explicit material.

                                        Sources:
                                        https://www.reuters.com/technology/cybersecurity/notorious-internet-messageboard-4chan-has-been-hacked-posts-claim-2025-04-15/

                                        https://www.techradar.com/pro/security/4chan-hit-with-alleged-hack-attackers-cause-outages-leak-source-code

                                        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                        3x RTX 4090

                                        1 Reply Last reply
                                        0
                                        • cycloneC Offline
                                          cycloneC Offline
                                          cyclone
                                          Admin Trusted
                                          wrote on last edited by cyclone
                                          #29

                                          CISA Warns: 2021 SonicWall SMA 100 VPN Bug (CVE‑2021‑20035) Now Weaponized for Remote Code Execution

                                          c6a223f3-f739-4fb0-bd52-36fa08f71b92-image.png

                                          A four‑year‑old command‑injection bug in SonicWall’s SMA 100 series VPN gateways (CVE‑2021‑20035) has moved from “theoretical DoS” to confirmed remote‑code‑execution and is now actively exploited in the wild. CISA added the flaw to its Known Exploited Vulnerabilities (KEV) list on 16 April 2025 and gave U.S. federal agencies until 7 May 2025 to patch. SonicWall updated its original 2021 advisory the same day, raising the CVSS score from 6.5 (Medium) to 7.2 (High) and warning customers that exploitation allows code execution as the low‑privilege ​nobody user.​

                                          Affected models – SMA 200, 210, 400, 410 and virtual SMA 500v on ESX, KVM, AWS & Azure.​

                                          Sources:
                                          https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html

                                          https://www.bleepingcomputer.com/news/security/cisa-tags-sonicwall-vpn-flaw-as-actively-exploited-in-attacks/

                                          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
                                          3x RTX 4090

                                          1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          Who's Online [Full List]

                                          7 users active right now (5 members and 2 guests).
                                          hashpwn-bot, John, v1cvap0r, casper_

                                          Board Statistics

                                          Our members have made a total of 3.5k posts in 150 topics.
                                          We currently have 257 members registered.
                                          Please welcome our newest member, vioednfekla.
                                          The most users online at one time was 49 on Thursday, December 26, 2024.

                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent