Category: GBHackers

New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script
17
Jun
2025

New Sophisticated Multi-Stage Malware Campaign Uses VBS Files to Execute PowerShell Script

A recently uncovered malware campaign has revealed a highly sophisticated, multi-stage infection process utilizing heavily obfuscated Visual Basic Script (VBS)…

New Sorillus RAT Targets European Organizations Through Tunneling Services
17
Jun
2025

New Sorillus RAT Targets European Organizations Through Tunneling Services

An important development discovered in March 2025 by Orange Cyberdefense’s Managed Threat Detection teams in Belgium was that a European…

New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper
17
Jun
2025

New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper

The two new variants of the KimJongRAT stealer have emerged, showcasing the persistent and evolving nature of this malicious tool…

New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data
17
Jun
2025

New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data

The Acronis Threat Research Unit has identified new variants of Chaos RAT, a remote administration tool (RAT) that has evolved…

Weaponized Research Papers Delivering Malware Through Password-Protected Documents
17
Jun
2025

Weaponized Research Papers Delivering Malware Through Password-Protected Documents

The AhnLab Security Intelligence Center (ASEC) recently made the concerning revelation that the infamous Kimsuky hacking organization was connected to…

Kimsuky and Konni APT Groups Lead Active Attacks Targeting East Asia
17
Jun
2025

Kimsuky and Konni APT Groups Lead Active Attacks Targeting East Asia

An significant 20 Advanced Persistent Threat (APT) occurrences were found in April 2025, according to a new report from Fuying…

Critical sslh Vulnerabilities Allow Remote Denial-of-Service Attacks
17
Jun
2025

Critical sslh Vulnerabilities Allow Remote Denial-of-Service Attacks

Security researchers disclosed two critical vulnerabilities in sslh, a widely used protocol multiplexer that enables multiple services—such as SSH, HTTPS,…

Water Curse Hacker Group Uses 76 GitHub Accounts to Spread Multistage Malware
17
Jun
2025

Water Curse Hacker Group Uses 76 GitHub Accounts to Spread Multistage Malware

A newly identified threat actor known as Water Curse has been linked to a sprawling campaign utilizing at least 76…

Critical Vulnerabilities in Sitecore Could Lead to Widespread Enterprise Attacks
17
Jun
2025

Critical Vulnerabilities in Sitecore Could Lead to Widespread Enterprise Attacks

A series of newly disclosed critical vulnerabilities in the Sitecore Experience Platform (XP) have raised alarm across the enterprise technology…

BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code
17
Jun
2025

BeyondTrust Tools RCE Vulnerability Allows Attackers Execute Arbitrary Code

A newly disclosed vulnerability in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) products has raised alarms across the…

Hackers Manipulate Search Engines to Push Malicious Sites
17
Jun
2025

Hackers Manipulate Search Engines to Push Malicious Sites

A new wave of cybercrime is exploiting the very backbone of internet trust: search engines. Recent research by Netcraft has…

Hackers Use Fake Verification Prompt and Clickfix Technique to Deploy Fileless AsyncRAT
17
Jun
2025

Hackers Use Fake Verification Prompt and Clickfix Technique to Deploy Fileless AsyncRAT

Threat actors are leveraging deceptive tactics to distribute a fileless variant of AsyncRAT, a notorious remote access Trojan. Discovered during…