Category: GBHackers

Mobile Phishers Target Brokerage Customers in 'Ramp and Dump' Cashout Scheme
19
Aug
2025

Mobile Phishers Target Brokerage Customers in ‘Ramp and Dump’ Cashout Scheme

Cybercriminal groups specializing in advanced mobile phishing kits have evolved their operations beyond stealing payment card data for mobile wallet…

New ClickFix Attack Deploys Fake BBC News Page and Fake Cloudflare Verification to Deceive Users
19
Aug
2025

New ClickFix Attack Deploys Fake BBC News Page and Fake Cloudflare Verification to Deceive Users

Cybersecurity researchers have uncovered a novel ClickFix attack variant that impersonates trusted BBC news content while leveraging counterfeit Cloudflare Turnstile…

Weaponized Copyright Documents Used by Threat Actors to Target Key Employees with Noodlophile Stealer
19
Aug
2025

Weaponized Copyright Documents Used by Threat Actors to Target Key Employees with Noodlophile Stealer

The Noodlophile Stealer malware, initially uncovered in campaigns leveraging fake AI video generation platforms, has evolved into a targeted spear-phishing…

New Android Attack Targets Indian Users with Free Electricity Subsidy to Install Malware
19
Aug
2025

New Android Attack Targets Indian Users with Free Electricity Subsidy to Install Malware

A newly identified Android phishing campaign is aggressively targeting Indian users by masquerading as the legitimate PM Surya Ghar: Muft…

Surge in Scans From Hacked Cisco, Linksys, and Araknis Routers
19
Aug
2025

Surge in Scans From Hacked Cisco, Linksys, and Araknis Routers

Cybersecurity researchers have identified a significant increase in malicious scanning activities originating from compromised consumer and enterprise networking equipment, with…

SAP 0-Day Exploit Reportedly Leaked by ShinyHunters Hackers
19
Aug
2025

SAP 0-Day Exploit Reportedly Leaked by ShinyHunters Hackers

A sophisticated exploit targeting critical SAP vulnerabilities has been publicly released by the notorious hacking group ShinyHunters, significantly escalating the…

North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware
19
Aug
2025

North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware

The Trellix Advanced Research Center exposed a DPRK-linked espionage operation attributed to the Kimsuky group (APT43), targeting diplomatic missions in…

Microsoft Defender AI Can Detect Plaintext Credentials in Active Directory
19
Aug
2025

Microsoft Defender AI Can Detect Plaintext Credentials in Active Directory

Microsoft has unveiled a new AI-powered security capability that addresses one of cybersecurity’s most persistent vulnerabilities: plaintext credentials stored in…

PyPI Blocks Expired Domain Access to Prevent Resurrection Attacks
19
Aug
2025

PyPI Blocks Expired Domain Access to Prevent Resurrection Attacks

The Python Package Index (PyPI) has implemented new security measures to protect against domain resurrection attacks, a sophisticated supply-chain threat…

New Sni5Gect Attack Targets 5G to Steal Messages and Inject Payloads
19
Aug
2025

New Sni5Gect Attack Targets 5G to Steal Messages and Inject Payloads

Cybersecurity researchers at Singapore University of Technology and Design have unveiled a sophisticated new attack framework called SNI5GECT that can intercept 5G…

Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process
19
Aug
2025

Lockbit Linux ESXi Ransomware Variant Reveals Evasion Techniques and File Encryption Process

A recent reverse engineering analysis of a Lockbit ransomware variant targeting Linux-based ESXi servers has uncovered several sophisticated evasion techniques…

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware
19
Aug
2025

PipeMagic Malware Imitates ChatGPT App to Exploit Windows Vulnerability and Deploy Ransomware

The PipeMagic malware, which is credited to the financially motivated threat actor Storm-2460, is a remarkable illustration of how cyber…