Category: GBHackers

Chinese State-Sponsored Hackers Targeting Telecommunications Infrastructure to Steal Sensitive Data
25
Sep
2025

Chinese State-Sponsored Hackers Targeting Telecommunications Infrastructure to Steal Sensitive Data

Chinese state-sponsored cyber threat group Salt Typhoon has intensified long-term espionage operations against global telecommunications infrastructure, according to recent legal…

BQTLOCK Ransomware Attacking Windows Users Via Telegram to Encrypt Files and Delete Backup
25
Sep
2025

BQTLOCK Ransomware Attacking Windows Users Via Telegram to Encrypt Files and Delete Backup

Security researchers have uncovered a new Ransomware-as-a-Service (RaaS) strain named BQTLOCK that is actively targeting Windows users through Telegram channels…

Volvo Group Reports Data Breach Following Ransomware Attack on HR Vendor
25
Sep
2025

Volvo Group Reports Data Breach Following Ransomware Attack on HR Vendor

Volvo Group has disclosed that a recent ransomware attack on its human resources software provider, Miljödata, may have resulted in unauthorized access…

New Malicious Rust Crates Impersonate fast_log to Steal Solana and Ethereum Wallet Keys
25
Sep
2025

New Malicious Rust Crates Impersonate fast_log to Steal Solana and Ethereum Wallet Keys

A pair of malicious Rust crates masquerading as the popular fast_log library have been uncovered, harvesting private Solana and Ethereum…

RedNovember Hackers Targeting Government and Tech Organizations to Install Backdoor
25
Sep
2025

RedNovember Hackers Targeting Government and Tech Organizations to Install Backdoor

In July 2024, Recorded Future’s Insikt Group publicly exposed TAG-100, a cyber-espionage campaign leveraging the Go-based backdoor Pantegana against high-profile…

Hackers Use AI-Generated Code to Obfuscate Payloads and Bypass Traditional Defenses
25
Sep
2025

Hackers Use AI-Generated Code to Obfuscate Payloads and Bypass Traditional Defenses

A recent credential phishing campaign detected by Microsoft Threat Intelligence used AI-generated code within an SVG file to disguise malicious…

New Phishing Scam Aims at PyPI Maintainers to Steal Login Information
25
Sep
2025

New Phishing Scam Aims at PyPI Maintainers to Steal Login Information

A fresh wave of domain-confusion phishing emails is sweeping through the Python community, once again setting its sights on PyPI…

SetupHijack Tool Abuses Race Conditions in Windows Installer to Hijack Setups
25
Sep
2025

SetupHijack Tool Abuses Race Conditions in Windows Installer to Hijack Setups

Security researchers at Hacker House have released SetupHijack, a proof-of-concept tool that exploits race conditions and insecure file handling in…

Malware Deployment via Copyright Takedown Claims by Threat Actors
25
Sep
2025

Malware Deployment via Copyright Takedown Claims by Threat Actors

Threat actors from the Lone None group are exploiting copyright takedown notices to distribute sophisticated malware, including Pure Logs Stealer…

Hackers Deploy Stealthy Malware on WordPress Sites to Gain Admin Access
25
Sep
2025

Hackers Deploy Stealthy Malware on WordPress Sites to Gain Admin Access

Attackers have stepped up their tactics by deploying stealthy backdoors disguised as legitimate WordPress components, ensuring persistent administrative access even…

Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data
25
Sep
2025

Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data

Security researchers have observed renewed exploit campaigns targeting an eight-year-old backdoor in Hikvision cameras to harvest configuration files, user lists,…

BRICKSTORM Backdoor Hits Tech and Legal Firms with Stealthy New Campaign
25
Sep
2025

BRICKSTORM Backdoor Hits Tech and Legal Firms with Stealthy New Campaign

Persistent, stealthy, and cross-platform, the BRICKSTORM backdoor has emerged as a significant threat to U.S. technology and legal organizations. Tracked…