Category data-breaches

UNC6384 Uses Captive Portal Hijacks and Valid Certificates for PlugX Deployment Targeting Diplomats

August 25, 2025
Malware / Cyber Espionage

A threat actor associated with China, known as UNC6384, has been linked to a series of attacks aimed at diplomats in Southeast Asia and various global entities to further Beijing’s strategic goals. “This complex attack chain employs sophisticated social engineering tactics, including the use of legitimate code signing certificates, adversary-in-the-middle (AitM) techniques, and indirect execution methods to bypass detection,” noted Patrick Whitsell from Google’s Threat Intelligence Group (GTIG). UNC6384 is believed to share resources and tactics with the well-known Chinese hacking group Mustang Panda, also identified by multiple aliases such as BASIN, Bronze President, and more. The campaign, identified by GTIG in March 2025, features a captive portal redirect to hijack web traffic and distribute a digitally signed downloader known as STATICPLUGIN. This downloader subsequently facilitates…

UNC6384 Employs PlugX via Captive Portal Hijacks and Credential Misuse Targeting Diplomats On August 25, 2025, Google Threat Intelligence Group (GTIG) uncovered a sophisticated cyber-espionage campaign attributed to a threat actor known as UNC6384. This group is believed to be aligned with Chinese interests and has been observed targeting diplomats…

Read More

UNC6384 Uses Captive Portal Hijacks and Valid Certificates for PlugX Deployment Targeting Diplomats

August 25, 2025
Malware / Cyber Espionage

A threat actor associated with China, known as UNC6384, has been linked to a series of attacks aimed at diplomats in Southeast Asia and various global entities to further Beijing’s strategic goals. “This complex attack chain employs sophisticated social engineering tactics, including the use of legitimate code signing certificates, adversary-in-the-middle (AitM) techniques, and indirect execution methods to bypass detection,” noted Patrick Whitsell from Google’s Threat Intelligence Group (GTIG). UNC6384 is believed to share resources and tactics with the well-known Chinese hacking group Mustang Panda, also identified by multiple aliases such as BASIN, Bronze President, and more. The campaign, identified by GTIG in March 2025, features a captive portal redirect to hijack web traffic and distribute a digitally signed downloader known as STATICPLUGIN. This downloader subsequently facilitates…

ShadowCaptcha Targets WordPress Sites to Distribute Ransomware, Info Stealers, and Crypto Miners

August 26, 2025
Ransomware / Cryptojacking

A significant new campaign has been uncovered, impacting over 100 compromised WordPress sites. This initiative redirects visitors to fake CAPTCHA verification pages employing the ClickFix social engineering technique to disseminate information stealers, ransomware, and cryptocurrency miners. Dubbed ShadowCaptcha by the Israel National Digital Agency, this widespread cybercrime operation, first detected in August 2025, utilizes a combination of social engineering, living-off-the-land binaries (LOLBins), and multi-stage payload delivery to establish and sustain access to targeted systems. Researchers Shimi Cohen, Adi Pick, Idan Beit Yosef, Hila David, and Yaniv Goldman explain, “The ultimate aims of ShadowCaptcha include harvesting sensitive information through credential theft and browser data exfiltration, deploying cryptocurrency miners for illicit gains, and even initiating ransomware outbreaks.” The attacks commence when unsuspecting users visit a compromised site…

ShadowCaptcha Campaign Targets WordPress Sites to Distribute Ransomware and Theft Tools In a significant cybersecurity breach identified in late August 2025, over 100 compromised WordPress websites have been leveraged to funnel unsuspecting visitors to deceptive CAPTCHA verification pages. This campaign, dubbed ShadowCaptcha by the Israel National Digital Agency, employs the…

Read More

ShadowCaptcha Targets WordPress Sites to Distribute Ransomware, Info Stealers, and Crypto Miners

August 26, 2025
Ransomware / Cryptojacking

A significant new campaign has been uncovered, impacting over 100 compromised WordPress sites. This initiative redirects visitors to fake CAPTCHA verification pages employing the ClickFix social engineering technique to disseminate information stealers, ransomware, and cryptocurrency miners. Dubbed ShadowCaptcha by the Israel National Digital Agency, this widespread cybercrime operation, first detected in August 2025, utilizes a combination of social engineering, living-off-the-land binaries (LOLBins), and multi-stage payload delivery to establish and sustain access to targeted systems. Researchers Shimi Cohen, Adi Pick, Idan Beit Yosef, Hila David, and Yaniv Goldman explain, “The ultimate aims of ShadowCaptcha include harvesting sensitive information through credential theft and browser data exfiltration, deploying cryptocurrency miners for illicit gains, and even initiating ransomware outbreaks.” The attacks commence when unsuspecting users visit a compromised site…

MixShell Malware Exploits Contact Forms to Target U.S. Supply Chain Manufacturers

Date: Aug 26, 2025
Categories: Enterprise Security / Artificial Intelligence

Cybersecurity experts are highlighting a complex social engineering initiative aimed at crucial supply chain manufacturing firms, deploying in-memory malware known as MixShell. This campaign, dubbed “ZipLine” by Check Point Research, circumvents traditional phishing tactics by initiating contact through companies’ public “Contact Us” forms. Attackers deceive employees into engaging in what appears to be a legitimate communication. According to Check Point’s statement to The Hacker News, these interactions can span several weeks, often involving fabricated non-disclosure agreements before the attackers deliver a weaponized ZIP file containing the stealthy MixShell malware. The attacks have impacted various organizations across multiple sectors, with a particular focus on U.S. manufacturers in industrial fields such as machinery, metalworking, component production, and engine manufacturing.

MixShell Malware Campaign Targets U.S. Supply Chain Manufacturers via Contact Forms August 26, 2025 Enterprise Security / Artificial Intelligence Cybersecurity experts have drawn attention to a sophisticated social engineering operation known as ZipLine, which is specifically aimed at U.S. supply chain manufacturers. This campaign employs a stealthy in-memory malware called…

Read More

MixShell Malware Exploits Contact Forms to Target U.S. Supply Chain Manufacturers

Date: Aug 26, 2025
Categories: Enterprise Security / Artificial Intelligence

Cybersecurity experts are highlighting a complex social engineering initiative aimed at crucial supply chain manufacturing firms, deploying in-memory malware known as MixShell. This campaign, dubbed “ZipLine” by Check Point Research, circumvents traditional phishing tactics by initiating contact through companies’ public “Contact Us” forms. Attackers deceive employees into engaging in what appears to be a legitimate communication. According to Check Point’s statement to The Hacker News, these interactions can span several weeks, often involving fabricated non-disclosure agreements before the attackers deliver a weaponized ZIP file containing the stealthy MixShell malware. The attacks have impacted various organizations across multiple sectors, with a particular focus on U.S. manufacturers in industrial fields such as machinery, metalworking, component production, and engine manufacturing.

Citrix Addresses Three NetScaler Vulnerabilities, Alerts on Active Exploitation of CVE-2025-7775

Date: August 26, 2025
Focus: Vulnerability / Remote Code Execution

Citrix has issued patches for three security vulnerabilities in NetScaler ADC and NetScaler Gateway, including one that is currently being actively exploited. The vulnerabilities are as follows:

  • CVE-2025-7775 (CVSS score: 9.2): Memory overflow vulnerability resulting in Remote Code Execution and/or Denial-of-Service.
  • CVE-2025-7776 (CVSS score: 8.8): Memory overflow issue causing unpredictable behavior and potential Denial-of-Service.
  • CVE-2025-8424 (CVSS score: 8.7): Improper access control on the NetScaler Management Interface.

Citrix noted that there have been observed exploits of CVE-2025-7775 on unmitigated devices but did not provide further specifics. However, certain conditions must be met for the vulnerabilities to be exploited.

For CVE-2025-7775, the NetScaler must be set up as a Gateway (including VPN virtual server, ICA Proxy, CVPN, or RDP Proxy) or as an AAA virtual server. Affected versions include NetScaler ADC and NetScaler Gateway 13.1, 14.1…

Citrix Addresses Critical NetScaler Vulnerabilities Amid Active Exploitation On August 26, 2025, Citrix announced the availability of patches designed to mitigate three significant security vulnerabilities affecting its NetScaler ADC and NetScaler Gateway products. Notably, one of these vulnerabilities, identified as CVE-2025-7775, has been confirmed as being actively exploited in the…

Read More

Citrix Addresses Three NetScaler Vulnerabilities, Alerts on Active Exploitation of CVE-2025-7775

Date: August 26, 2025
Focus: Vulnerability / Remote Code Execution

Citrix has issued patches for three security vulnerabilities in NetScaler ADC and NetScaler Gateway, including one that is currently being actively exploited. The vulnerabilities are as follows:

  • CVE-2025-7775 (CVSS score: 9.2): Memory overflow vulnerability resulting in Remote Code Execution and/or Denial-of-Service.
  • CVE-2025-7776 (CVSS score: 8.8): Memory overflow issue causing unpredictable behavior and potential Denial-of-Service.
  • CVE-2025-8424 (CVSS score: 8.7): Improper access control on the NetScaler Management Interface.

Citrix noted that there have been observed exploits of CVE-2025-7775 on unmitigated devices but did not provide further specifics. However, certain conditions must be met for the vulnerabilities to be exploited.

For CVE-2025-7775, the NetScaler must be set up as a Gateway (including VPN virtual server, ICA Proxy, CVPN, or RDP Proxy) or as an AAA virtual server. Affected versions include NetScaler ADC and NetScaler Gateway 13.1, 14.1…

Salesloft OAuth Breach Through Drift AI Chat Agent Compromises Salesforce Customer Data

August 27, 2025
Cloud Security / Threat Intelligence

A significant data breach has targeted the sales automation platform Salesloft, allowing hackers to steal OAuth and refresh tokens linked to the Drift AI chat agent. This opportunistic attack has been connected to a threat group identified by Google Threat Intelligence Group (GTIG) and Mandiant, known as UNC6395. GTIG has reported over 700 potentially affected organizations. According to researchers Austin Larsen, Matt Lin, Tyler McLellan, and Omar ElAhdan, the attacks began as early as August 8, 2025, and continued until at least August 18, 2025, focusing on Salesforce customer accounts through the compromised Salesloft Drift application. The hackers have been seen exporting large volumes of data from various corporate Salesforce instances, likely in an effort to harvest credentials for further exploitation.

Salesloft OAuth Breach through Drift AI Chat Agent Affects Salesforce Customer Data August 27, 2025 In a significant cybersecurity incident, a data breach involving the sales automation service Salesloft has led to the compromise of OAuth and refresh tokens linked to the Drift artificial intelligence chat agent. This incident appears…

Read More

Salesloft OAuth Breach Through Drift AI Chat Agent Compromises Salesforce Customer Data

August 27, 2025
Cloud Security / Threat Intelligence

A significant data breach has targeted the sales automation platform Salesloft, allowing hackers to steal OAuth and refresh tokens linked to the Drift AI chat agent. This opportunistic attack has been connected to a threat group identified by Google Threat Intelligence Group (GTIG) and Mandiant, known as UNC6395. GTIG has reported over 700 potentially affected organizations. According to researchers Austin Larsen, Matt Lin, Tyler McLellan, and Omar ElAhdan, the attacks began as early as August 8, 2025, and continued until at least August 18, 2025, focusing on Salesforce customer accounts through the compromised Salesloft Drift application. The hackers have been seen exporting large volumes of data from various corporate Salesforce instances, likely in an effort to harvest credentials for further exploitation.

ShadowSilk Targets 35 Organizations Across Central Asia and APAC via Telegram Bots

August 27, 2025
Malware / Spyware

A threat cluster known as ShadowSilk is responsible for a new wave of attacks aimed at government entities in Central Asia and the Asia-Pacific region. Group-IB has identified nearly 35 victims, primarily focused on data exfiltration. This hacking group shares tools and infrastructure with other threat actors, including YoroTrooper, SturgeonPhisher, and Silent Lynx. The affected organizations are predominantly government bodies, with some incidents involving the energy, manufacturing, retail, and transportation sectors across Uzbekistan, Kyrgyzstan, Myanmar, Tajikistan, Pakistan, and Turkmenistan. “The operation is executed by a bilingual team—Russian-speaking developers linked to older YoroTrooper code and Chinese-speaking operatives leading the intrusions—creating a versatile, multi-regional threat,” state researchers Nikita Rostovcev and Sergei Turner.

ShadowSilk Launches Targeted Cyber Assaults on 35 Organizations Across Central Asia and APAC In a concerning development within the cybersecurity landscape, a threat activity cluster identified as ShadowSilk has executed a series of targeted cyberattacks against government organizations in Central Asia and the Asia-Pacific (APAC) region. The security firm Group-IB…

Read More

ShadowSilk Targets 35 Organizations Across Central Asia and APAC via Telegram Bots

August 27, 2025
Malware / Spyware

A threat cluster known as ShadowSilk is responsible for a new wave of attacks aimed at government entities in Central Asia and the Asia-Pacific region. Group-IB has identified nearly 35 victims, primarily focused on data exfiltration. This hacking group shares tools and infrastructure with other threat actors, including YoroTrooper, SturgeonPhisher, and Silent Lynx. The affected organizations are predominantly government bodies, with some incidents involving the energy, manufacturing, retail, and transportation sectors across Uzbekistan, Kyrgyzstan, Myanmar, Tajikistan, Pakistan, and Turkmenistan. “The operation is executed by a bilingual team—Russian-speaking developers linked to older YoroTrooper code and Chinese-speaking operatives leading the intrusions—creating a versatile, multi-regional threat,” state researchers Nikita Rostovcev and Sergei Turner.

Anthropic Unveils Disruption of AI-Driven Cyberattacks Targeting Key Sectors for Data Theft and Extortion

Date: August 27, 2025
Categories: Cybersecurity / Artificial Intelligence

On Wednesday, Anthropic announced the successful disruption of a sophisticated cyber operation that leveraged its AI-powered chatbot, Claude, for extensive data theft and extortion activities in July 2025. “The perpetrator targeted at least 17 distinct organizations, including those in healthcare, emergency services, government, and religious sectors,” the company reported. Instead of using traditional ransomware to encrypt stolen information, the actor threatened to publicly disclose the data, attempting to coerce victims into paying hefty ransoms—sometimes exceeding $500,000. The attacker reportedly utilized Claude Code on Kali Linux as a comprehensive attack platform, embedding operational instructions in a CLAUDE.md file that maintained ongoing context for each interaction. This unknown threat actor is said to have employed AI with an “unprecedented degree,” utilizing Claude Code, Anthropic’s agentic coding tool, to automate various aspects of the attack.

Anthropic Disrupts AI-Driven Cybercrime Targeting Critical Sectors August 27, 2025 — Cybersecurity On Wednesday, Anthropic disclosed a major disruption of a sophisticated cyber operation that misused its AI-powered chatbot, Claude, to facilitate large-scale data theft and extortion in July 2025. This incident involved an attack on at least 17 distinct…

Read More

Anthropic Unveils Disruption of AI-Driven Cyberattacks Targeting Key Sectors for Data Theft and Extortion

Date: August 27, 2025
Categories: Cybersecurity / Artificial Intelligence

On Wednesday, Anthropic announced the successful disruption of a sophisticated cyber operation that leveraged its AI-powered chatbot, Claude, for extensive data theft and extortion activities in July 2025. “The perpetrator targeted at least 17 distinct organizations, including those in healthcare, emergency services, government, and religious sectors,” the company reported. Instead of using traditional ransomware to encrypt stolen information, the actor threatened to publicly disclose the data, attempting to coerce victims into paying hefty ransoms—sometimes exceeding $500,000. The attacker reportedly utilized Claude Code on Kali Linux as a comprehensive attack platform, embedding operational instructions in a CLAUDE.md file that maintained ongoing context for each interaction. This unknown threat actor is said to have employed AI with an “unprecedented degree,” utilizing Claude Code, Anthropic’s agentic coding tool, to automate various aspects of the attack.

Storm-0501 Exploits Entra ID for Azure Data Exfiltration and Deletion in Hybrid Cloud Attacks

August 27, 2025
Ransomware / Cloud Security

The financially motivated threat actor known as Storm-0501 has been observed enhancing its tactics to carry out data exfiltration and extortion attacks in cloud environments. “Unlike traditional on-premises ransomware that relies on deploying malware to encrypt essential files across compromised network endpoints and negotiating for a decryption key, cloud-based ransomware represents a significant change,” noted the Microsoft Threat Intelligence team in a report shared with The Hacker News. “Utilizing cloud-native capabilities, Storm-0501 swiftly exfiltrates substantial data volumes, deletes data and backups within the victim’s environment, and demands ransom—all without conventional malware deployment.” Storm-0501 was initially documented by Microsoft nearly a year ago, focusing on its hybrid cloud ransomware attacks against sectors such as government, manufacturing, transportation, and law enforcement in the U.S.

Storm-0501 Leveraging Entra ID in Sophisticated Hybrid Cloud Attacks August 27, 2025 Ransomware / Cloud Security A financially motivated threat actor known as Storm-0501 has intensified its focus on cloud environments, employing advanced strategies for data exfiltration and extortion. Unlike traditional ransomware that typically employs malware to encrypt files across…

Read More

Storm-0501 Exploits Entra ID for Azure Data Exfiltration and Deletion in Hybrid Cloud Attacks

August 27, 2025
Ransomware / Cloud Security

The financially motivated threat actor known as Storm-0501 has been observed enhancing its tactics to carry out data exfiltration and extortion attacks in cloud environments. “Unlike traditional on-premises ransomware that relies on deploying malware to encrypt essential files across compromised network endpoints and negotiating for a decryption key, cloud-based ransomware represents a significant change,” noted the Microsoft Threat Intelligence team in a report shared with The Hacker News. “Utilizing cloud-native capabilities, Storm-0501 swiftly exfiltrates substantial data volumes, deletes data and backups within the victim’s environment, and demands ransom—all without conventional malware deployment.” Storm-0501 was initially documented by Microsoft nearly a year ago, focusing on its hybrid cloud ransomware attacks against sectors such as government, manufacturing, transportation, and law enforcement in the U.S.

U.S. Treasury Imposes Sanctions on North Korean IT Worker Scheme, Uncovering $600K in Crypto Transfers and Over $1M in Profits

August 28, 2025
Artificial Intelligence / Malware

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has announced new sanctions against two individuals and two entities linked to North Korea’s remote IT worker scheme, which generates illicit revenue for the regime’s weapons of mass destruction and ballistic missile initiatives. “The North Korean regime continues to exploit American businesses through fraudulent schemes involving overseas IT workers who steal data and extort ransom,” stated John K. Hurley, Under Secretary of the Treasury for Terrorism and Financial Intelligence. “Under President Trump’s administration, the Treasury remains dedicated to safeguarding Americans from these schemes and holding those responsible accountable.” Key individuals targeted include Vitaliy Sergeyevich Andreyev, Kim Ung Sun, Shenyang Geumpungri Network Technology Co., Ltd, and Korea Sinjin Trading Corporation. This initiative broadens the sanctions previously imposed on Chinyong Informat…

U.S. Treasury Imposes Sanctions on North Korean IT Worker Scheme, Unveiling $600K in Cryptocurrency Transfers and Over $1M in Profits On August 28, 2025, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced new sanctions targeting a network of individuals and companies involved in a North…

Read More

U.S. Treasury Imposes Sanctions on North Korean IT Worker Scheme, Uncovering $600K in Crypto Transfers and Over $1M in Profits

August 28, 2025
Artificial Intelligence / Malware

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has announced new sanctions against two individuals and two entities linked to North Korea’s remote IT worker scheme, which generates illicit revenue for the regime’s weapons of mass destruction and ballistic missile initiatives. “The North Korean regime continues to exploit American businesses through fraudulent schemes involving overseas IT workers who steal data and extort ransom,” stated John K. Hurley, Under Secretary of the Treasury for Terrorism and Financial Intelligence. “Under President Trump’s administration, the Treasury remains dedicated to safeguarding Americans from these schemes and holding those responsible accountable.” Key individuals targeted include Vitaliy Sergeyevich Andreyev, Kim Ung Sun, Shenyang Geumpungri Network Technology Co., Ltd, and Korea Sinjin Trading Corporation. This initiative broadens the sanctions previously imposed on Chinyong Informat…