Android RAT Camouflaged by Hugging Face

Cybercrime,
Fraud Management & Cybercrime,
Incident & Breach Response

SmarterMail Vulnerability, Nike Data Breach Investigation, Empire Market Co-Creator Pleads Guilty

Breach Roundup: Android RAT Hides Behind Hugging Face
Image: Shutterstock/ISMG

This week’s cybersecurity roundup covers research identifying an Android remote access Trojan (RAT) that utilizes Hugging Face’s infrastructure, alongside revelations regarding a critical SmarterMail vulnerability being exploited. Additionally, the U.S. Cybersecurity and Infrastructure Security Agency has alerted organizations about active exploitation of a VMware vCenter flaw, and Microsoft has patched a security issue in Office. Also making headlines, a co-creator of the Empire Market dark web platform has pleaded guilty to drug charges, while Nike investigates a substantial data breach allegedly involving 1.4 terabytes of sensitive information.

See Also: AI Arms Cybercriminals, and Defenders Must Match Pace

Android RAT Exploits Hugging Face for Stealthy Operations

Cybercriminals are leveraging Hugging Face’s machine learning hosting to deploy Android RATs, a tactic that circumvents typical mobile security measures, according to research by Bitdefender. This two-stage compromise begins with a malicious app disguised as a mobile security tool named TrustBastion, which tricks victims into installing it after presenting false alerts about device security.

Once the app is installed, it mimics legitimate Android notifications to deliver subsequent payloads from Hugging Face repositories. By using an encrypted endpoint linked to trustbastion.com, attackers blend malicious activities into trusted cloud operations, capitalizing on the opacity this creates.

Over a brief timespan, researchers noted over 6,000 unique Android files uploaded, indicating a high turnover of payloads designed to evade detection. After installation, the RAT exploits Android’s accessibility features to gain control, issuing fake login prompts that impersonate financial services to harvest credentials.

SmarterMail Authentication Bypass Flaw Exploited

A serious authentication bypass issue has emerged in SmarterMail, allowing attackers to reset administrator passwords without authorization, shortly after patches are released. This vulnerability, designated as CVE-2026-23760, can be exploited with a crafted request that modifies administrative access parameters.

Researchers from WatchTowr Labs reported that attackers swiftly acted on the vulnerability following its announcement, exploiting newly patched systems within days. This flaw not only empowers attackers but also exposes a broader trend where managed services may be inadequately protected against targeted threats.

Automakers Ramp Up Cybersecurity Budgets Amid Rising Threats

The automotive sector is responding to increasing cyber threats with heightened investments in cybersecurity measures. According to a recent Moody’s report, more than one-third of automakers allocate over 10% of their technology spend to security initiatives, reflecting growing recognition of their vulnerability.

Noteworthy incidents, including a ransomware attack disrupting dealership operations and data breaches at major auto manufacturers, underscore this urgency. Yet discrepancies in defensive capabilities remain, with only 64% of firms employing identity management services while attackers increasingly bypass stronger corporate defenses by targeting less secure suppliers.

Active Exploitation of VMware vCenter Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency has reported active exploitation of a critical vulnerability in VMware vCenter, allowing remote execution without authentication. Tracked as CVE-2024-37079, this flaw allows attackers to commandeer virtualized environments, posing a significant risk to organizations with exposed infrastructure.

Broadcom issued a patch for this flaw in June 2024, but a timely response remains crucial given its severity and potential for ongoing exploitation.

Microsoft Issues Urgent Patch for Security Flaw

In a critical response to an actively exploited security bypass in Microsoft Office and 365, Microsoft recently released an emergency patch for CVE-2026-21509, which allows untrusted inputs to bypass critical security controls. This vulnerability poses risks due to the common practice of social engineering for exploit delivery.

Separately, in notable legal developments, Raheim Hamilton, a co-founder of the Empire Market, recently pleaded guilty to federal drug conspiracy charges in Chicago. Authorities revealed that the platform facilitated over 4 million transactions and generated significant revenue through illicit sales.

In light of these incidents, companies must remain vigilant, continuously evaluating their cybersecurity frameworks as threats evolve.

Additional Stories from This Week

Reported by Information Security Media Group’s Gregory Sirico in New Jersey.

Source link