Category: GBHackers

Cybercriminals Use Zoho WorkDrive Folders to Spread Obfuscated PureRAT Malware
22
Jul
2025

Cybercriminals Use Zoho WorkDrive Folders to Spread Obfuscated PureRAT Malware

A targeted attack against a U.S.-based certified public accounting firm was discovered in May 2025 by cybersecurity experts, according to…

DeerStealer Malware Spread Through Weaponized .LNK and LOLBin Tools
22
Jul
2025

DeerStealer Malware Spread Through Weaponized .LNK and LOLBin Tools

A new wave of cyber-attacks has emerged, exploiting Windows shortcut files (.LNK) combined with legitimate system utilities collectively known as…

UNG0002 Deploys Weaponized LNK Files with Cobalt Strike and Metasploit to Target Organizations
22
Jul
2025

UNG0002 Deploys Weaponized LNK Files with Cobalt Strike and Metasploit to Target Organizations

Seqrite Labs APT-Team has uncovered a persistent threat entity, UNG0002 (Unknown Group 0002), orchestrating espionage-driven operations across Asian jurisdictions, including…

Threat Actors Compromise Popular npm Packages to Steal Maintainers’ Tokens
21
Jul
2025

Threat Actors Compromise Popular npm Packages to Steal Maintainers’ Tokens

Threat actors have leveraged a phishing campaign targeting npm package maintainers, resulting in the compromise of widely used JavaScript tooling…

Beware of npm Phishing Emails Targeting Developer Credentials
21
Jul
2025

Beware of npm Phishing Emails Targeting Developer Credentials

An developer recently came across a highly advanced phishing email that spoofs the [email protected] address in order to impersonate npm,…

APT41 Hackers Exploiting Atexec and WmiExec Windows Modules for Malware Deployment
21
Jul
2025

APT41 Hackers Exploiting Atexec and WmiExec Windows Modules for Malware Deployment

Kaspersky MDR analysts recently uncovered a sophisticated targeted attack by the Chinese-speaking cyberespionage group APT41 against government IT services in…

Attackers Can Exploit Lighthouse Studio RCE Bug to Gain Server Access
21
Jul
2025

Attackers Can Exploit Lighthouse Studio RCE Bug to Gain Server Access

Researchers at Assetnote have uncovered a critical remote code execution (RCE) vulnerability in Lighthouse Studio, a widely used survey software…

KAWA4096 Ransomware Employs WMI Techniques to Delete Backup Snapshots
21
Jul
2025

KAWA4096 Ransomware Employs WMI Techniques to Delete Backup Snapshots

Trustwave SpiderLabs has played a crucial role in monitoring new ransomware variants in the incredibly unstable ransomware threat landscape of…

AI-Powered Cloaking Tools Help Threat Actors Hide Malicious Domains from Security Scans
21
Jul
2025

AI-Powered Cloaking Tools Help Threat Actors Hide Malicious Domains from Security Scans

Threat actors are increasingly adopting AI-powered cloaking services to obfuscate phishing domains, counterfeit e-commerce sites, and malware distribution endpoints from…

Researchers Release PoC Exploit for High-Severity NVIDIA AI Toolkit Bug
21
Jul
2025

Researchers Release PoC Exploit for High-Severity NVIDIA AI Toolkit Bug

Wiz Research has disclosed a severe vulnerability in the NVIDIA Container Toolkit (NCT), dubbed #NVIDIAScape and tracked as CVE-2025-23266 with…

Snake Keylogger Uses Persistence via Scheduled Tasks to Steal Login Data Undetected
21
Jul
2025

Snake Keylogger Uses Persistence via Scheduled Tasks to Steal Login Data Undetected

Researchers have uncovered a sophisticated phishing campaign zeroing in on Turkish enterprises, with a particular focus on the defense and…

PHP PDO Flaw Allows Attackers to Inject Malicious SQL Commands
21
Jul
2025

PHP PDO Flaw Allows Attackers to Inject Malicious SQL Commands

A critical vulnerability in PHP’s widely-used PDO (PHP Data Objects) library has been discovered that enables attackers to inject malicious…