GBHackers On Security

GBHackers On Security

Publication
0 followers

Security news site covering daily hacking news and cyberattack updates.

Fake Gemini Npm Package Steals AI Tool Tokens
NewsApr 7, 2026

Fake Gemini Npm Package Steals AI Tool Tokens

Hackers published a counterfeit npm package named gemini‑ai‑checker, posing as a Google Gemini token verifier, to hijack developers' AI coding environments. The package contacts a Vercel‑hosted endpoint during installation, retrieves an obfuscated JavaScript backdoor, and executes it in memory, stealing...

By GBHackers On Security
Tor-Backed ClickFix Campaign Drops Node.js RAT on Windows
NewsApr 7, 2026

Tor-Backed ClickFix Campaign Drops Node.js RAT on Windows

Hackers have revived the ClickFix social‑engineering scheme to drop a sophisticated Node.js‑based remote access Trojan on Windows machines. The campaign uses a fake CAPTCHA page to execute a Base64‑encoded PowerShell command that silently installs a malicious MSI containing a full...

By GBHackers On Security
CrystalX Malware-as-a-Service Spreads via Telegram With Stealer, RAT Tools
NewsApr 1, 2026

CrystalX Malware-as-a-Service Spreads via Telegram With Stealer, RAT Tools

Hackers are marketing a new Malware‑as‑a‑Service platform called CrystalX RAT through private Telegram channels, offering a subscription‑based toolkit that blends remote‑access, data‑stealing, keylogging, crypto‑clipping, and prankware capabilities. The service provides an automated builder with geofencing, anti‑analysis, and ChaCha20‑encrypted payloads, while...

By GBHackers On Security
Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests
NewsApr 1, 2026

Hackers Exploit Hotel Booking Systems to Send Fake Payment Requests to Guests

Hackers are weaponizing compromised hotel staff credentials to infiltrate booking management systems and send personalized payment requests to guests. By blending real reservation details with urgent language, the "Reservation Hijack Scam" tricks travelers into entering card information on counterfeit pages....

By GBHackers On Security
Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live
NewsMar 28, 2026

Open VSX Scanner Vulnerability Lets Malicious Extensions Go Live

Open VSX, the extension marketplace for VS Code forks, patched a critical “Open Sesame” vulnerability that let malicious extensions bypass its pre‑publish scanning pipeline. The flaw stemmed from a Boolean logic error that treated scanner failures as a “no scanners configured”...

By GBHackers On Security
Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks
NewsMar 27, 2026

Hackers Target South Asian Financial Firm with BRUSHWORM and BRUSHLOGGER Attacks

A South Asian financial institution was compromised by a custom malware suite that pairs the BRUSHWORM backdoor with the BRUSHLOGGER DLL side‑loader. BRUSHWORM provides persistence, modular payload loading, USB‑based worming and bulk file theft, while BRUSHLOGGER captures keystrokes with per‑window...

By GBHackers On Security
New ClickFix Attack Exploits Windows Run Dialog and macOS Terminal to Deploy Malware
NewsMar 26, 2026

New ClickFix Attack Exploits Windows Run Dialog and macOS Terminal to Deploy Malware

Threat actors are standardizing a ClickFix social‑engineering attack that lures victims into running malicious commands via the Windows Run dialog, PowerShell, or macOS Terminal. Insikt Group identified five active clusters since May 2024, impersonating brands like QuickBooks, Booking.com, and Zillow. The...

By GBHackers On Security
Leak Bazaar Converts Stolen Corporate Data Into Organized Criminal Marketplace
NewsMar 26, 2026

Leak Bazaar Converts Stolen Corporate Data Into Organized Criminal Marketplace

Leak Bazaar, a new Russian‑speaking cyber‑crime service, debuted on March 25, 2026, offering a structured marketplace that transforms raw stolen corporate data into refined, buyer‑ready datasets. The platform combines automated filtering, machine‑learning analysis, and human validation to repackage information into...

By GBHackers On Security
Oblivion RAT Masquerades as Play Store Update to Spy on Android Users
NewsMar 23, 2026

Oblivion RAT Masquerades as Play Store Update to Spy on Android Users

Oblivion RAT, a new Android remote access trojan, is sold as a malware‑as‑service platform for as little as $300 per month. It uses a two‑stage infection chain that mimics Google Play Store updates to trick users into sideloading a malicious...

By GBHackers On Security
LeakNet Boosts Ransomware with ClickFix Lures, Stealthy Deno Loader
NewsMar 18, 2026

LeakNet Boosts Ransomware with ClickFix Lures, Stealthy Deno Loader

LeakNet is expanding its ransomware campaign by deploying mass‑market ClickFix lures on compromised legitimate websites and coupling them with a stealthy Deno‑based loader that runs malicious code almost entirely in memory. The ClickFix technique tricks users into executing an msiexec...

By GBHackers On Security
Handala Hackers Exploit RDP and NetBird in Coordinated Wiper Attacks
NewsMar 16, 2026

Handala Hackers Exploit RDP and NetBird in Coordinated Wiper Attacks

Handala Hack, an Iranian state‑linked group known as Void Manticore, has been conducting coordinated wiper attacks using compromised RDP sessions and the legitimate mesh‑networking tool NetBird. The actors gain initial access via stolen VPN credentials, dwell for months, harvest domain admin...

By GBHackers On Security
CamelClone Uses Public File-Sharing Sites in Government Cyberattacks
NewsMar 16, 2026

CamelClone Uses Public File-Sharing Sites in Government Cyberattacks

Operation CamelClone targets government, defense, diplomatic and energy agencies in Algeria, Mongolia, Ukraine and Kuwait, using spear‑phishing ZIP archives that contain LNK shortcuts to launch PowerShell commands. The shortcuts download a JavaScript loader, HOPPINGANT, from the public file‑sharing site filebulldogs.com,...

By GBHackers On Security
Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services
NewsMar 16, 2026

Google Unveils Android 17 Advanced Protection Mode to Stop Malicious Services

Google announced Android 17, featuring Android Advanced Protection Mode (AAPM) to harden mobile security for high‑risk users. AAPM blocks app sideloading, disables USB data signaling, restricts non‑accessibility services, and enforces always‑on Play Protect. The release also adds a privacy‑focused Contact Picker...

By GBHackers On Security
Fake FileZilla Downloads Spread RAT via Stealthy Multi-Stage Loader
NewsMar 16, 2026

Fake FileZilla Downloads Spread RAT via Stealthy Multi-Stage Loader

Cybercriminals are distributing a counterfeit FileZilla installer that bundles a malicious DLL, turning the popular FTP client into a delivery vehicle for a sophisticated Remote Access Trojan. The DLL leverages Windows DLL search order to sideload, then launches a multi‑stage,...

By GBHackers On Security
GBHackers On Security | Pulse