Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. General Discussion
  3. Infosec News

Infosec News

Scheduled Pinned Locked Moved General Discussion
107 Posts 3 Posters 27.4k Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • freerouteF Offline
    freerouteF Offline
    freeroute
    Moderator Trusted
    wrote on last edited by
    #101

    Critical flaw in WordPress add-on for Elementor exploited in attacks
    WordPress.webp
    Attackers are exploiting a critical-severity privilege escalation vulnerability (CVE-2025–8489) in the King Addons for Elementor plugin for WordPress, which lets them obtain administrative permissions during the registration process.

    The threat activity started on October 31, just a day after the issue was publicly disclosed. So far, the Wordfence security scanner from Defiant, a company that provides security services for WordPress websites, has blocked more than 48,400 exploit attempts.

    King Addons is a third-party add-on for Elementor, a popular visual page builder plugin for WordPress sites. It is used on roughly 10,000 websites, providing additional widgets, templates, and features.

    CVE-2025–8489, discovered by researcher Peter Thaleikis, is a flaw in the plugin’s registration handler that allows anyone signing up to specify their user role on the website, including the administrator role, without enforcing any restrictions.

    According to observations from Wordfence, attackers send a crafted ‘admin-ajax.php’ request specifying ‘user_role=administrator,’ to create rogue admin accounts on targeted sites.
    The researchers noticed a peak in the exploitation activity between November 9 and 10, with two IP addresses being the most active: 45.61.157.120 (28,900 attempts) and 2602:fa59:3:424::1 (16,900 attempts).

    Wordfence provides a more extensive list of offensive IP addresses and recommends that website administrators look for them in the log files. The presence of new administrator accounts is also a clear sign of compromise.

    Website owners are advised to upgrade to version 51.1.35 of King Addons, which addresses CVE-2025–8489, released on September 25.

    Wordfence researchers are also warning of another critical vulnerability in the Advanced Custom Fields: Extended plugin, active on more than 100,000 WordPress websites, which can be exploited by an unauthenticated attacker to execute code remotely.

    The flaw affects versions 0.9.0.5 through 0.9.1.1 of the plugin and is currently tracked as CVE-2025-13486. It was discovered and reported responsibly by Marcin Dudek, the head of the national computer emergency response team (CERT) in Poland.

    The vulnerability is "due to the function accepting user input and then passing that through call_user_func_array(),” Wordfence explains.

    “This makes it possible for unauthenticated attackers to execute arbitrary code on the server, which can be leveraged to inject backdoors or create new administrative user accounts.”

    The security issue was reported on November 18, and the plugin vendor addressed it in version 0.9.2 of Advanced Custom Fields: Extended, released a day after receiving the vulnerability report.

    Given that the flaw can be leveraged without authentication only through a crafted request, the public disclosure of technical details is likely to generate malicious activity.

    Website owners are advised to move to the latest version as soon as possible or disable the plugin on their sites.


    Source: https://www.bleepingcomputer.com/news/security/critical-flaw-in-wordpress-add-on-for-elementor-exploited-in-attacks/

    1 Reply Last reply
    👍
    0
    • cycloneC Online
      cycloneC Online
      cyclone
      Admin Trusted
      wrote on last edited by
      #102

      Massive 16 Terabyte Database With 4.3 Billion-Records Leaked

      bfa3e7c8-f329-44f2-9057-5a520fe86c03-image.png

      A massive unprotected MongoDB instance containing over 4.3 billion records and totaling roughly 16 TB of data was discovered exposed online. The dataset included highly structured professional and corporate intelligence data, much of it clearly scraped from LinkedIn and enriched through lead-generation pipelines. The exposed collections contained PII such as full names, emails, phone numbers, LinkedIn profile URLs, employment history, skills, education, location data, and even photographs.

      The leak, uncovered by cybersecurity researcher Bob Diachenko on November 23rd, 2025, consisted of nine major collections. Three of those - profiles, unique_profiles, and people - alone contained nearly 2 billion individual PII-rich entries. The dataset also referenced an “Apollo ID”, suggesting potential linkage to Apollo-style sales intelligence ecosystems or enrichment tools.

      The structured nature of the data, combined with its massive scale, makes it extremely attractive to threat actors. Attackers could weaponize the PII for targeted phishing, CEO fraud, corporate reconnaissance, credential stuffing, and AI-assisted social engineering at unprecedented volume. With up-to-date professional metadata, malicious operators can automatically craft convincing spear-phishing messages or build large internal mapping structures of corporate roles and contacts.

      The exposed database was secured on November 25th, the day after responsible disclosure, but it is unknown how long it had been publicly accessible. Given the size and organization of the dataset, researchers warn that malicious parties may have already accessed it.

      This exposure adds to a growing trend of massive, scraping-driven data leaks, which now routinely exceed billions of records and blur the line between legally scraped data and high-risk breach material.


      Sources:

      • https://cybernews.com/security/database-exposes-billions-records-linkedin-data/
      • https://www.tomsguide.com/computing/online-security/4-3-billion-job-documents-left-unsecured-online-names-emails-phone-numbers-and-linkedin-data-exposed

      Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
      3x RTX 4090

      1 Reply Last reply
      👍
      0
      • cycloneC Online
        cycloneC Online
        cyclone
        Admin Trusted
        wrote on last edited by
        #103

        SoundCloud Confirms Data Breach

        5166b650-49c4-4f71-8918-0cf58ec38651-image.png

        SoundCloud has confirmed a security breach after users reported widespread outages and 403 errors when accessing the platform through VPNs. According to the company, the issues were caused by its incident response after detecting unauthorized access to an ancillary service dashboard.

        SoundCloud stated that a threat actor accessed a limited database containing user email addresses and information already visible on public profiles. The company said no passwords, financial data, or other sensitive information were exposed.

        Sources cited by BleepingComputer estimate the breach impacts roughly 20 percent of SoundCloud’s user base, potentially affecting around 28 million accounts. SoundCloud says all unauthorized access has been blocked and that there is no ongoing risk.

        As part of its response, SoundCloud implemented security configuration changes that disrupted VPN connectivity. The company has not provided a timeline for restoring full VPN access. It also reported experiencing denial-of-service attacks following the incident, briefly affecting site availability.

        While SoundCloud has not named the attackers, BleepingComputer reports that the ShinyHunters extortion group is allegedly behind the breach and is attempting to extort the company after stealing user data.


        Sources:

        • https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/
        • https://cyberinsider.com/soundcloud-users-with-active-vpn-connections-are-getting-403-errors/

        Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
        3x RTX 4090

        1 Reply Last reply
        👍
        0
        • cycloneC Online
          cycloneC Online
          cyclone
          Admin Trusted
          wrote last edited by
          #104

          2025 Cybersecurity Predictions vs Reality

          3c1560c3-d3d5-46e7-a3c1-06e89c44471b-image.png

          This article reviews 90+ predictions from 36 cybersecurity experts and compares them to what actually occurred in 2025. The main finding: most predictions were accurate, especially those focused on AI amplifying existing threats rather than creating new ones.

          Key Outcomes

          1. AI Amplified Existing Attacks
          • AI was widely adopted by attackers to scale and automate known techniques.
          • Observed uses included AI-assisted phishing, automated recon, and malware with runtime code mutation to evade detection.
          • Underground markets began selling configurable AI-powered attack tools.
          • AI reduced the skill barrier and increased attack speed and volume.

          Result: Prediction confirmed. AI increased efficiency, not novelty.


          1. SaaS, Cloud, and Identity Became the Main Attack Surface
          • SaaS misconfigurations, excessive permissions, insecure APIs, and third-party integrations were major breach drivers.
          • Identity and access failures eclipsed traditional perimeter security issues.
          • Large-scale cloud outages were often caused by configuration errors.

          Result: Prediction confirmed. Identity and SaaS security became critical weaknesses.


          1. Ransomware Fragmented Further
          • Law enforcement pressure led to more, smaller ransomware groups rather than fewer.
          • 30 to 40 percent increase in active ransomware operators.
          • Affiliates increasingly moved between groups, complicating attribution.

          Result: Prediction confirmed. Ransomware evolved into a fragmented ecosystem.


          1. Supply Chain Attacks Increased
          • Enterprises were compromised through trusted vendors and enterprise software.
          • SaaS and third-party providers became common initial access vectors.

          Result: Prediction confirmed. Vendor risk became a primary concern.


          1. Data Became the Core Security Asset
          • Data protection and governance overtook infrastructure as the main security focus.
          • Large credential leaks and AI training on sensitive data accelerated this shift.
          • Data visibility and classification became prerequisites for AI use.

          Result: Prediction confirmed. Data security underpins most modern risks.


          1. Regulation Added Complexity Without Reducing Attacks
          • Increased compliance and reporting requirements did not deter attackers.
          • Regulatory burden primarily impacted internal operations, not threat actors.

          Result: Prediction confirmed. Regulation did not materially change the threat landscape.


          Bottom Line
          2025 validated long-standing warnings rather than introducing new threat classes.
          The biggest risks were known problems amplified by AI, automation, and scale, not futuristic scenarios.


          Source:

          • https://cybernews.com/news/did-cybersecurity-expert-predictions-2025-come-true/

          Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
          3x RTX 4090

          1 Reply Last reply
          0
          • cycloneC Online
            cycloneC Online
            cyclone
            Admin Trusted
            wrote last edited by
            #105

            Verizon Nationwide Outage (Jan. 14, 2026)

            b178f83a-d4b1-49a8-9336-8751d76c4453-image.png

            Verizon Communications experienced a major nationwide wireless network outage beginning around midday on January 14, 2026, disrupting voice, text, and mobile data services across the United States for approximately ten hours. Customers reported their phones showing “SOS” or “SOS-only” status in place of normal signal bars, indicating loss of cellular connectivity.

            Outage monitoring sites such as DownDetector logged hundreds of thousands of reports at the peak, with impacts reported coast-to-coast in major metropolitan areas including New York City, Chicago, Boston, Atlanta, Dallas, and others. Some local officials warned that emergency calls (911) for Verizon users could be unreliable during the disruption, recommending alternatives such as landlines or other carriers where possible.

            Verizon acknowledged the outage via social media and later confirmed that service was restored late Wednesday night. The company apologized for the interruption and stated it will issue account credits to affected customers. Verizon did not immediately disclose a specific technical cause, though internal reviews are expected.

            The Federal Communications Commission (FCC) indicated it would review the outage’s impact on network reliability and public safety communications.

            Sources:

            • https://www.techbuzz.ai/articles/verizon-s-nationwide-outage-hits-260k-reports-mid-january
            • https://apnews.com/article/verizon-cellular-outage-85d658a4fb6a6175cae8981d91a809c9
            • https://www.verizon.com/about/news/update-network-outage

            Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
            3x RTX 4090

            1 Reply Last reply
            0
            • cycloneC Online
              cycloneC Online
              cyclone
              Admin Trusted
              wrote last edited by
              #106

              Atomic Wallet - Where Did My XMR Go?

              776e9e66-0183-45fa-a817-d7a9f980d8aa-image.png

              Many Atomic Wallet users recently logged in to find their Monero (XMR) balances missing or incorrect, causing understandable concern.

              According to Atomic Wallet support, this is a display and synchronization issue specific to Monero, not a loss of funds. Atomic states that all XMR remains safe on-chain and that their development team is working on a fix. Once synchronization is corrected, balances and transaction history should update normally.

              c3e89675-7a0c-4b47-8f0f-9998e125eaf2-image.png

              Users can independently confirm their funds by restoring their XMR wallet in another trusted Monero wallet using their existing keys or seed phrase. Multiple users report that their full balances appear correctly when checked outside Atomic, confirming the issue is isolated to Atomic’s wallet interface.

              Given Atomic Wallet’s 2023 security breach, users are understandably cautious. While this situation appears unrelated and no theft has been reported, verifying balances independently is recommended.


              Summary

              • Issue affects XMR balance display in Atomic Wallet
              • Funds are still on-chain and under user control
              • Atomic says a fix is in progress
              • Users can verify funds using another Monero wallet
              • Use caution, verify independently, and never share your private keys or seed phrase with anyone

              20e9c590-cd38-48dd-91b6-5c86e6eaa8a0-image.png


              Sources:

              • @cyclone (independent verification with Atomic)
              • https://x.com/AtomicWallet/status/2011796132112826643

              Sysadmin by day | Hacker by night | Go Developer | hashpwn site owner
              3x RTX 4090

              1 Reply Last reply
              👍
              0
              • oe3p32wedwO Offline
                oe3p32wedwO Offline
                oe3p32wedw
                Contributor
                wrote last edited by
                #107

                123.png
                haahahahahah

                1x1660 Ti | 2x4090 | epileptic/anxiety/despair/drain | hashpwn <3

                1 Reply Last reply
                0
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                Who's Online [Full List]

                6 users active right now (3 members and 3 guests).
                hashpwn-bot, petrovivo1234, cyclone

                Board Statistics

                Our members have made a total of 9.3k posts in 169 topics.
                We currently have 352 members registered.
                Please welcome our newest member, cryphorix.
                The most users online at one time was 49 on Thursday, December 26, 2024.

                • Login

                • Don't have an account? Register

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent