The Breach News

Cybercriminals Leverage X’s Grok AI to Circumvent Ad Safeguards and Distribute Malware to Millions

Sep 04, 2025
Artificial Intelligence / Malware

Cybersecurity experts have identified a new tactic employed by cybercriminals to circumvent the malvertising protections of social media platform X, utilizing its AI assistant Grok to disseminate harmful links. This method, dubbed “Grokking,” was discussed in a series of posts by Nati Tal, head of Guardio Labs.

The technique aims to exploit the limitations set by X on Promoted Ads, which typically permit only text, images, or videos for advertising. By leveraging video card-promoted posts featuring adult content as bait, malvertisers cleverly conceal malicious links in the “From:” metadata field located below the video player—an area that goes unchecked by the platform’s security measures.

Cybercriminals Exploit X’s Grok AI to Circumvent Ad Protections and Distribute Malware Widely Cybersecurity experts have uncovered a disturbing trend in which cybercriminals are leveraging the artificial intelligence assistant Grok, from the social media platform X, to evade advertising safeguards and disseminate malicious links. This sophisticated method, referred to as…

Read More

Cybercriminals Leverage X’s Grok AI to Circumvent Ad Safeguards and Distribute Malware to Millions

Sep 04, 2025
Artificial Intelligence / Malware

Cybersecurity experts have identified a new tactic employed by cybercriminals to circumvent the malvertising protections of social media platform X, utilizing its AI assistant Grok to disseminate harmful links. This method, dubbed “Grokking,” was discussed in a series of posts by Nati Tal, head of Guardio Labs.

The technique aims to exploit the limitations set by X on Promoted Ads, which typically permit only text, images, or videos for advertising. By leveraging video card-promoted posts featuring adult content as bait, malvertisers cleverly conceal malicious links in the “From:” metadata field located below the video player—an area that goes unchecked by the platform’s security measures.

16-Year-Old Arrested for Involvement in History’s Largest Cyber Attack

Sept 27, 2013

A 16-year-old has been detained for allegedly participating in the largest DDoS attack ever recorded, targeting the Dutch anti-spam organization Spamhaus. The arrest, made by British police in April, came to light recently. Authorities stormed his home in south-west London after discovering substantial funds in his bank account. Upon investigation, he was found with various computer systems logged into virtual forums. The March 20 attack on Spamhaus was described as a monumental event in cybercrime, unleashing a torrent of traffic measured at 300 billion bits per second (300Gbps). DDoS attacks occur when hackers mobilize a network of infected computers to overwhelm a server, leading to shutdowns.

16-Year-Old Arrested in Connection with Historic Cyber Attack on Spamhaus Sept 27, 2013 Authorities have arrested a 16-year-old in the United Kingdom for his alleged involvement in what has been described as the largest Distributed Denial of Service (DDoS) attack in Internet history. The assault targeted Spamhaus, a prominent Dutch…

Read More

16-Year-Old Arrested for Involvement in History’s Largest Cyber Attack

Sept 27, 2013

A 16-year-old has been detained for allegedly participating in the largest DDoS attack ever recorded, targeting the Dutch anti-spam organization Spamhaus. The arrest, made by British police in April, came to light recently. Authorities stormed his home in south-west London after discovering substantial funds in his bank account. Upon investigation, he was found with various computer systems logged into virtual forums. The March 20 attack on Spamhaus was described as a monumental event in cybercrime, unleashing a torrent of traffic measured at 300 billion bits per second (300Gbps). DDoS attacks occur when hackers mobilize a network of infected computers to overwhelm a server, leading to shutdowns.

GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module

Sep 04, 2025
Data Breach / Malware

Cybersecurity experts have uncovered a new threat cluster known as GhostRedirector, which has infiltrated at least 65 Windows servers predominantly located in Brazil, Thailand, and Vietnam. According to Slovak cybersecurity firm ESET, the attacks have resulted in the installation of a passive C++ backdoor named Rungan, alongside a native Internet Information Services (IIS) module referred to as Gamshen. The threat actor is thought to have been active since at least August 2024.

“While Rungan can execute commands on an infected server, Gamshen is designed to facilitate SEO fraud as-a-service, manipulating search engine results to enhance the page ranking of a specified target website,” stated ESET researcher Fernando Tavella in a report shared with The Hacker News. “Notably, Gamshen only alters responses when requests come from Googlebot, ensuring that regular visitors are not impacted.”

GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module In a recent cybersecurity investigation, researchers from the Slovak firm ESET have uncovered a sophisticated threat cluster known as GhostRedirector, responsible for breaching at least 65 Windows servers, predominantly situated in Brazil, Thailand, and Vietnam. According to ESET,…

Read More

GhostRedirector Compromises 65 Windows Servers Through Rungan Backdoor and Gamshen IIS Module

Sep 04, 2025
Data Breach / Malware

Cybersecurity experts have uncovered a new threat cluster known as GhostRedirector, which has infiltrated at least 65 Windows servers predominantly located in Brazil, Thailand, and Vietnam. According to Slovak cybersecurity firm ESET, the attacks have resulted in the installation of a passive C++ backdoor named Rungan, alongside a native Internet Information Services (IIS) module referred to as Gamshen. The threat actor is thought to have been active since at least August 2024.

“While Rungan can execute commands on an infected server, Gamshen is designed to facilitate SEO fraud as-a-service, manipulating search engine results to enhance the page ranking of a specified target website,” stated ESET researcher Fernando Tavella in a report shared with The Hacker News. “Notably, Gamshen only alters responses when requests come from Googlebot, ensuring that regular visitors are not impacted.”

Microsoft Alerts Users to Cross-Account Takeover Vulnerability in Azure Container Instances

On September 10, 2021, Microsoft announced that it had fixed a security flaw in its Azure Container Instances (ACI) service that could be exploited by malicious actors to gain unauthorized access to information from other customers. Researchers referred to this vulnerability as the “first cross-account container takeover in the public cloud.” An attacker could use this weakness to execute harmful commands on other users’ containers, potentially stealing customer secrets and deployed images. Microsoft did not provide further details about the flaw but advised affected customers to “revoke any privileged credentials that were deployed to the platform before August 31, 2021.” Azure Container Instances enables users to run Docker containers directly in a serverless cloud environment without the need for virtual machines, clusters, or orchestration tools. Palo Alto Networks’ Unit 42 threat intelligence team identified the vulnerability…

Microsoft Identifies Vulnerability in Azure Container Instances Leading to Potential Cross-Account Breach On September 8, 2021, Microsoft announced the mitigation of a critical vulnerability in its Azure Container Instances (ACI) service that posed a significant threat to the security of multiple customers. This flaw, noted by researchers as the “first…

Read More

Microsoft Alerts Users to Cross-Account Takeover Vulnerability in Azure Container Instances

On September 10, 2021, Microsoft announced that it had fixed a security flaw in its Azure Container Instances (ACI) service that could be exploited by malicious actors to gain unauthorized access to information from other customers. Researchers referred to this vulnerability as the “first cross-account container takeover in the public cloud.” An attacker could use this weakness to execute harmful commands on other users’ containers, potentially stealing customer secrets and deployed images. Microsoft did not provide further details about the flaw but advised affected customers to “revoke any privileged credentials that were deployed to the platform before August 31, 2021.” Azure Container Instances enables users to run Docker containers directly in a serverless cloud environment without the need for virtual machines, clusters, or orchestration tools. Palo Alto Networks’ Unit 42 threat intelligence team identified the vulnerability…

The Significance of Logs and Log Management in IT Security

In today’s digital landscape, IT security is paramount for organizations of all sizes. Effective security measures begin with vigilant monitoring of your network to identify vulnerabilities that could expose sensitive information to threats. This often includes employing firewalls as the first line of defense, alongside vulnerability management, intrusion detection and prevention systems, and careful configuration of network settings.

The importance of these measures cannot be overstated:

  • Routers may be easily compromised without proper configuration and restrictions.
  • An improperly configured firewall can leave open ports, enabling hackers to infiltrate the network.
  • Threats like rogue access points, botnet malware, and social engineering can transform your wireless network into a gateway for unauthorized access.

Why Are Logs Essential?

The primary goal of IT security is to…

The Crucial Role of Log Management in IT Security In today’s digital landscape, safeguarding IT infrastructure is non-negotiable for organizations of all sizes. Proactive measures to protect networks from vulnerabilities are imperative, as these weak points may serve as entryways for cyber attackers seeking access to sensitive data. Effective cybersecurity…

Read More

The Significance of Logs and Log Management in IT Security

In today’s digital landscape, IT security is paramount for organizations of all sizes. Effective security measures begin with vigilant monitoring of your network to identify vulnerabilities that could expose sensitive information to threats. This often includes employing firewalls as the first line of defense, alongside vulnerability management, intrusion detection and prevention systems, and careful configuration of network settings.

The importance of these measures cannot be overstated:

  • Routers may be easily compromised without proper configuration and restrictions.
  • An improperly configured firewall can leave open ports, enabling hackers to infiltrate the network.
  • Threats like rogue access points, botnet malware, and social engineering can transform your wireless network into a gateway for unauthorized access.

Why Are Logs Essential?

The primary goal of IT security is to…

Hacker Exploits Claude Code and GPT-4.1 to Steal Hundreds of Millions of Mexican Records

A recent cybersecurity breach has raised significant concerns across the tech community, involving a single hacker who managed to infiltrate nine different Mexican government agencies. This breach was enabled by the exploitation of two widely used AI platforms: Claude Code, an AI-driven coding assistant, and OpenAI’s GPT-4.1. The attack occurred…

Read MoreHacker Exploits Claude Code and GPT-4.1 to Steal Hundreds of Millions of Mexican Records

SAP S/4HANA Suffers Active Exploitation of Critical Vulnerability CVE-2025-42957

Sep 05, 2025
Vulnerability / Enterprise Security

A serious security flaw in SAP S/4HANA, a popular Enterprise Resource Planning (ERP) system, is currently being exploited in the wild. This command injection vulnerability, designated as CVE-2025-42957 and given a CVSS score of 9.9, was recently addressed by SAP in its monthly updates. According to the NIST National Vulnerability Database (NVD), “SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC.” This flaw allows for the injection of arbitrary ABAP code into the system, bypassing critical authorization checks. A successful attack could compromise the entire SAP environment, threatening the confidentiality, integrity, and availability of the system. Attackers could manipulate the SAP database, create superuser accounts with SAP_ALL privileges, extract password hashes, and disrupt business processes.

Active Exploitation of Critical SAP S/4HANA Vulnerability CVE-2025-42957 On September 5, 2025, a severe security vulnerability affecting SAP S/4HANA, a widely utilized Enterprise Resource Planning (ERP) software, has been confirmed as being exploited in the wild. This critical command injection vulnerability, identified as CVE-2025-42957, carries a CVSS score of 9.9,…

Read More

SAP S/4HANA Suffers Active Exploitation of Critical Vulnerability CVE-2025-42957

Sep 05, 2025
Vulnerability / Enterprise Security

A serious security flaw in SAP S/4HANA, a popular Enterprise Resource Planning (ERP) system, is currently being exploited in the wild. This command injection vulnerability, designated as CVE-2025-42957 and given a CVSS score of 9.9, was recently addressed by SAP in its monthly updates. According to the NIST National Vulnerability Database (NVD), “SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC.” This flaw allows for the injection of arbitrary ABAP code into the system, bypassing critical authorization checks. A successful attack could compromise the entire SAP environment, threatening the confidentiality, integrity, and availability of the system. Attackers could manipulate the SAP database, create superuser accounts with SAP_ALL privileges, extract password hashes, and disrupt business processes.

Microsoft Issues Update for Actively Exploited Windows Zero-Day Vulnerability

On September 15, 2021, Microsoft released crucial software updates as part of its monthly Patch Tuesday cycle to address 66 security vulnerabilities across Windows and other platforms, including Azure, Office, BitLocker, and Visual Studio. Among these was an actively exploited zero-day flaw in the MSHTML Platform that surfaced last week. Of the 66 vulnerabilities, three are categorized as Critical, 62 as Important, and one as Moderate. Additionally, the company has resolved 20 vulnerabilities in the Chromium-based Microsoft Edge browser earlier this month. Notably, the most critical update targets CVE-2021-40444 (CVSS score: 8.8), a remote code execution vulnerability in MSHTML that can be exploited through malicious Microsoft Office documents, with experts noting that the exploit takes advantage of logical flaws for effective exploitation.

Microsoft Issues Critical Patch for Windows Zero-Day Vulnerability On September 15, 2021, Microsoft announced a series of crucial software updates designed to address 66 security vulnerabilities across Windows and various applications, such as Azure, Office, BitLocker, and Visual Studio. This action follows recent urgent security patches released by Apple and…

Read More

Microsoft Issues Update for Actively Exploited Windows Zero-Day Vulnerability

On September 15, 2021, Microsoft released crucial software updates as part of its monthly Patch Tuesday cycle to address 66 security vulnerabilities across Windows and other platforms, including Azure, Office, BitLocker, and Visual Studio. Among these was an actively exploited zero-day flaw in the MSHTML Platform that surfaced last week. Of the 66 vulnerabilities, three are categorized as Critical, 62 as Important, and one as Moderate. Additionally, the company has resolved 20 vulnerabilities in the Chromium-based Microsoft Edge browser earlier this month. Notably, the most critical update targets CVE-2021-40444 (CVSS score: 8.8), a remote code execution vulnerability in MSHTML that can be exploited through malicious Microsoft Office documents, with experts noting that the exploit takes advantage of logical flaws for effective exploitation.

World War C Report: Understanding the Motivations Behind State-Sponsored Cyber Attacks

October 3, 2013

Nation-state driven cyber attacks are increasingly prevalent worldwide, aimed at safeguarding national sovereignty and exerting global influence. In today’s cyber era, conflicts extend into cyberspace, marking it as the fifth domain of warfare. Governments are intensifying their efforts to develop robust cyber capabilities, establishing dedicated cyber units.

In this context, security firm FireEye has published the report “World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks.” This document provides an in-depth analysis of the various strategies employed by countries in executing state-sponsored cyber attacks. Experts are particularly concerned about the rise in these attacks, which are directed at both cyber espionage and sabotage, with notable campaigns like Moonlight Maze and Titan Rain exemplifying this trend.

State-Sponsored Cyber Attacks: An Evolving Battlefield October 3, 2013 In an age governed by rapid technological advancements, nation-state cyber attacks have become a common strategy employed globally to uphold national sovereignty and exert power. The proliferation of digital warfare signifies a shift where human conflict now unfolds across cyberspace, recognized…

Read More

World War C Report: Understanding the Motivations Behind State-Sponsored Cyber Attacks

October 3, 2013

Nation-state driven cyber attacks are increasingly prevalent worldwide, aimed at safeguarding national sovereignty and exerting global influence. In today’s cyber era, conflicts extend into cyberspace, marking it as the fifth domain of warfare. Governments are intensifying their efforts to develop robust cyber capabilities, establishing dedicated cyber units.

In this context, security firm FireEye has published the report “World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks.” This document provides an in-depth analysis of the various strategies employed by countries in executing state-sponsored cyber attacks. Experts are particularly concerned about the rise in these attacks, which are directed at both cyber espionage and sabotage, with notable campaigns like Moonlight Maze and Titan Rain exemplifying this trend.