Category: GBHackers

HardBit 4.0 Ransomware Abuses Unsecured RDP and SMB for Access Persistence
23
Dec
2025

HardBit 4.0 Ransomware Abuses Unsecured RDP and SMB for Access Persistence

HardBit ransomware continues its evolution with the release of version 4.0, introducing sophisticated mechanisms to establish persistence through vulnerable network…

INTERPOL Dismantles Six Ransomware Operations, Detains 500+ Individuals
23
Dec
2025

INTERPOL Dismantles Six Ransomware Operations, Detains 500+ Individuals

Law enforcement agencies across 19 countries have made a significant breakthrough in combating cybercrime, arresting 574 suspects and recovering approximately…

PoC Exploit Released for Critical n8n RCE Vulnerability
23
Dec
2025

PoC Exploit Released for Critical n8n RCE Vulnerability

Security researchers have confirmed the release of proof-of-concept (PoC) exploit code for CVE-2025-68613, a critical remote code execution flaw affecting…

Fake VPN Chrome Extensions Steal Credentials by Intercepting User Traffic
23
Dec
2025

Fake VPN Chrome Extensions Steal Credentials by Intercepting User Traffic

Socket’s Threat Research Team has exposed a sophisticated credential-harvesting campaign that has operated through malicious Chrome extensions since 2017. Two…

Spotify Music Library Targeted as Hacktivists Scrape 86 Million Files
23
Dec
2025

Spotify Music Library Targeted as Hacktivists Scrape 86 Million Files

Anna’s Archive, a prominent digital preservation platform, has announced the largest unauthorized extraction of Spotify music data ever recorded. The…

MacSync Stealer Malware Targets macOS Users Through Digitally Signed Apps
23
Dec
2025

MacSync Stealer Malware Targets macOS Users Through Digitally Signed Apps

Jamf Threat Labs has uncovered a new MacSync Stealer campaign that significantly raises the bar for macOS malware delivery by…

Threat Actors Impersonate Korean TV Writers to Deliver Malware
23
Dec
2025

Threat Actors Impersonate Korean TV Writers to Deliver Malware

North Korean-backed threat actors are impersonating writers from major Korean broadcasting companies to deliver malicious documents and establish initial access…

Critical n8n Vulnerability Exposes 103,000+ Automation Instances to RCE Attacks
23
Dec
2025

Critical n8n Vulnerability Exposes 103,000+ Automation Instances to RCE Attacks

A critical remote code execution vulnerability in n8n, a popular open-source workflow automation platform, threatens over 103,000 potentially vulnerable instances…

Indian Income Tax–Lure Campaign Deploying Multi-Stage Malware Against Businesses
23
Dec
2025

Indian Income Tax–Lure Campaign Deploying Multi-Stage Malware Against Businesses

Tax-themed phishing campaigns have intensified in recent months, capitalizing on the heightened awareness surrounding India’s Income Tax Return (ITR) filing…

Wonderland Android Malware Targets OTPs Through Two-Way SMS Hijacking
22
Dec
2025

Wonderland Android Malware Targets OTPs Through Two-Way SMS Hijacking

Group-IB security researchers have uncovered a sophisticated new Android malware family dubbed “Wonderland” that represents a significant evolution in SMS-stealing…

New Darknet AI Platform Enhancing Capabilities of Cybercriminals
22
Dec
2025

New Darknet AI Platform Enhancing Capabilities of Cybercriminals

Resecurity has identified a dangerous new development in the underground cybercrime market, the rise of DIG AI. This uncensored artificial intelligence…

Arcane Werewolf Hacker Group Expands Arsenal with Loki 2.1 Malware Toolkit
22
Dec
2025

Arcane Werewolf Hacker Group Expands Arsenal with Loki 2.1 Malware Toolkit

The cyber espionage group known as Arcane Werewolf (also tracked as Mythic Likho) has significantly upgraded its offensive capabilities, targeting…