GBHackers On Security - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
GBHackers On Security

GBHackers On Security

Publication
0 followers

Security news site covering daily hacking news and cyberattack updates.

Recent Posts

ClickFix Exploits Homebrew Workflow to Deploy Cuckoo Stealer for macOS Credential Theft
News•Feb 18, 2026

ClickFix Exploits Homebrew Workflow to Deploy Cuckoo Stealer for macOS Credential Theft

ClickFix is weaponizing a fake Homebrew installation workflow to deliver Cuckoo Stealer, a macOS credential‑stealing RAT. The campaign uses typosquatted domains such as homabrews.org that mimic brew.sh and inject a malicious curl | bash command into the clipboard, prompting developers to run it. Once executed, the loader captures the user’s password, installs a LaunchAgent for persistence, and downloads the Cuckoo Stealer which exfiltrates passwords, Keychain items, wallets, and messaging session data. Researchers observed multiple related typosquat sites sharing the same IP infrastructure, highlighting a broader ClickFix delivery pattern.

By GBHackers On Security
New SysUpdate Variant Malware Discovered, Decryption Tool for Linux C2 Traffic Released
News•Feb 18, 2026

New SysUpdate Variant Malware Discovered, Decryption Tool for Linux C2 Traffic Released

Researchers at LevelBlue identified a new SysUpdate variant targeting Linux systems, packaged as a packed ELF64 binary that mimics a system service. The malware employs a custom, multi‑layered symmetric cipher to encrypt its command‑and‑control traffic across several protocols. By emulating...

By GBHackers On Security
New Phishing Campaign Exploits Booking.com Partners, Targets Customers in Multi-Stage Fraud Scheme
News•Feb 18, 2026

New Phishing Campaign Exploits Booking.com Partners, Targets Customers in Multi-Stage Fraud Scheme

A coordinated phishing campaign is exploiting Booking.com’s partner platform to steal hotel staff credentials and then target guests with payment‑stealing lures. The operation uses a three‑stage chain: email phishing to hotel inboxes, a bespoke partner login kit to harvest credentials,...

By GBHackers On Security
Malicious Fork of Legitimate Triton App Discovered on GitHub, Exposing New Malware Threat
News•Feb 17, 2026

Malicious Fork of Legitimate Triton App Discovered on GitHub, Exposing New Malware Threat

A malicious fork of the legitimate Triton macOS client was posted on GitHub, masquerading as an official release while embedding a Windows‑only malware payload. The attacker, operating under the account “JaoAureliano,” used a deceptive README and raw asset links to...

By GBHackers On Security
LockBit 5.0 Emerges: Cross-Platform Ransomware Now Targeting Windows, Linux, and ESXi Systems
News•Feb 16, 2026

LockBit 5.0 Emerges: Cross-Platform Ransomware Now Targeting Windows, Linux, and ESXi Systems

LockBit has released version 5.0, a cross‑platform ransomware that encrypts Windows, Linux and VMware ESXi systems with a single code base. The new variant uses XChaCha20 and Curve25519 encryption, while the Windows build adds sophisticated anti‑forensic tricks such as ETW...

By GBHackers On Security
Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure
News•Feb 16, 2026

Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure

Between June and December 2025, the state‑sponsored Lotus Blossom group compromised the shared hosting provider that delivered Notepad++ updates, turning the popular text editor into a covert espionage conduit. By exploiting weaknesses in the older WinGUp updater, attackers redirected update...

By GBHackers On Security
Hackers Abuse ClawHub Skills to Evade VirusTotal via Social Engineering
News•Feb 9, 2026

Hackers Abuse ClawHub Skills to Evade VirusTotal via Social Engineering

Hackers have revamped ClawHub skill attacks by removing embedded malware and instead using clean SKILL.md files that lure users to counterfeit OpenClawCLI download sites. The malicious payload is hosted on look‑alike domains and fetched via an obfuscated bash command, allowing...

By GBHackers On Security
APT Hackers Abuse Trusted Edge Services to Stealthily Deploy Malware
News•Feb 9, 2026

APT Hackers Abuse Trusted Edge Services to Stealthily Deploy Malware

APT groups, largely China‑linked, are shifting attacks from protected endpoints to edge infrastructure such as firewalls, routers and IoT devices. Taiwan emerged as the most targeted APAC region, logging 173 incidents and serving as a testing ground for new tools....

By GBHackers On Security
Vortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors
News•Feb 9, 2026

Vortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors

Vortex Werewolf, also known as SkyCloak, is a threat cluster that has been delivering Tor‑enabled remote‑access backdoors to Russian government and defense organizations through sophisticated Telegram‑themed phishing campaigns. Victims are lured to counterfeit Telegram login pages that harvest phone numbers,...

By GBHackers On Security
Cybersquatting Attacks Exploit Trusted Brands to Steal Customer Data and Spread Malware
News•Feb 9, 2026

Cybersquatting Attacks Exploit Trusted Brands to Steal Customer Data and Spread Malware

Cybercriminals are increasingly exploiting cybersquatting to clone trusted brands, harvest customer credentials, and deliver malware. Research from SecPod shows a 19‑fold surge in malicious domain registrations between late 2024 and mid‑2025, with more than 99 % used for phishing or malware...

By GBHackers On Security
New Telegram Phishing Scam Hijacks Login Flow to Steal Fully Authorized User Sessions
News•Feb 9, 2026

New Telegram Phishing Scam Hijacks Login Flow to Steal Fully Authorized User Sessions

Cyber‑intelligence firm CYFIRMA uncovered a new Telegram phishing campaign that hijacks the platform’s QR‑code and manual login flows. Attackers register their own Telegram API credentials and relay victim‑supplied phone numbers, OTPs, or QR scans to create fully authorized sessions on...

By GBHackers On Security
FvncBot Targets Android Users, Exploiting Accessibility Services for Attacks
News•Feb 6, 2026

FvncBot Targets Android Users, Exploiting Accessibility Services for Attacks

A new Android banking trojan named FvncBot was first seen in late 2025, masquerading as a security app from Poland’s mBank. The malware uses a two‑stage loader, both obfuscated with the APK0day cryptor, to install an unencrypted payload that hijacks...

By GBHackers On Security
RenEngine Loader Deploys Stealthy Multi-Stage Execution to Bypass Security Measures
News•Feb 6, 2026

RenEngine Loader Deploys Stealthy Multi-Stage Execution to Bypass Security Measures

RenEngine Loader, a new malware family, embeds malicious code in legitimate Ren’Py game launchers used for cracked games. Since its emergence in April 2025, it has infected over 400,000 users, adding roughly 5,000 new victims each day, primarily in India,...

By GBHackers On Security
New Wave of Odyssey Stealer Targets macOS Users in Active Cyberattack Campaign
News•Feb 6, 2026

New Wave of Odyssey Stealer Targets macOS Users in Active Cyberattack Campaign

A new wave of Odyssey Stealer is actively targeting macOS users across more than twenty countries, expanding far beyond its initial foothold in the United States and Western Europe. The malware is delivered through fake CAPTCHA pages that mimic legitimate...

By GBHackers On Security
CentOS 9 Security Flaw Enables Privilege Escalation – PoC Released
News•Feb 6, 2026

CentOS 9 Security Flaw Enables Privilege Escalation – PoC Released

A critical use‑after‑free vulnerability has been discovered in the `sch_cake` packet scheduler of the CentOS 9 Linux kernel. The flaw lets a local user trigger memory corruption and execute arbitrary code with root privileges, as demonstrated by a publicly released proof‑of‑concept....

By GBHackers On Security
Phishing and OAuth Token Vulnerabilities Lead to Full Microsoft 365 Breach
News•Feb 6, 2026

Phishing and OAuth Token Vulnerabilities Lead to Full Microsoft 365 Breach

Researchers identified two medium‑severity flaws—a publicly accessible email API endpoint and verbose error handling that discloses OAuth tokens—that can be combined to launch authenticated phishing campaigns inside Microsoft 365 tenants. By exploiting the open relay, attackers send messages that appear to...

By GBHackers On Security
Spam Campaign Distributes Fake PDFs, Deploys Remote Monitoring Tools for Ongoing Access
News•Feb 6, 2026

Spam Campaign Distributes Fake PDFs, Deploys Remote Monitoring Tools for Ongoing Access

A spam campaign is distributing PDFs that appear to be Adobe Acrobat updates, but the attachment redirects users to a spoofed download page that installs legitimate Remote Monitoring and Management (RMM) tools such as TrustConnect and Datto RMM. By leveraging signed...

By GBHackers On Security
TP-Link Vulnerabilities Let Hackers Take Full Control of Devices
News•Feb 4, 2026

TP-Link Vulnerabilities Let Hackers Take Full Control of Devices

TP‑Link disclosed nine critical authenticated command‑injection flaws in its Archer BE230 v1.2 router firmware, each assigned a separate CVE and scoring 8.5‑8.6 on the CVSS v4.0 scale. The vulnerabilities affect web, VPN, cloud, and configuration modules, allowing attackers with high‑privilege access to...

By GBHackers On Security
Interlock Ransomware Exploits Zero-Day in Gaming Anti-Cheat Driver to Disable EDR, AV
News•Feb 4, 2026

Interlock Ransomware Exploits Zero-Day in Gaming Anti-Cheat Driver to Disable EDR, AV

Interlock ransomware has added a zero‑day exploit in a gaming anti‑cheat driver (CVE‑2025‑61155) to its arsenal, deploying a signed kernel driver called UpdateCheckerX64.sys. The new BYOVD tool, dubbed Hotta Killer, creates a demand‑start service and uses DeviceIoControl to terminate security...

By GBHackers On Security
Supply Chain Attack Exploits Notepad++ Update Mechanism to Push Targeted Malware
News•Feb 4, 2026

Supply Chain Attack Exploits Notepad++ Update Mechanism to Push Targeted Malware

A sophisticated supply‑chain attack hijacked Notepad++'s update mechanism after a hosting‑provider breach, remaining active from June 2025 to December 2025. Attackers rotated command‑and‑control servers and deployed three distinct infection chains that delivered Cobalt Strike beacons and a custom Chrysalis backdoor. The...

By GBHackers On Security
Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments
News•Feb 4, 2026

Hackers Exfiltrate NTDS.dit File, Gain Full Control of Active Directory Environments

Threat actors are increasingly targeting the NTDS.dit database, the core repository of Active Directory credentials and configuration, to gain unrestricted domain access. By creating Volume Shadow Copies and leveraging native tools such as ntdsutil, SecretsDump, and Mimikatz, attackers can extract...

By GBHackers On Security
Chollima APT Hackers Weaponize LNK Files to Deploy Sophisticated Malware
News•Feb 3, 2026

Chollima APT Hackers Weaponize LNK Files to Deploy Sophisticated Malware

In March 2025, North Korean‑linked APT37 (Ricochet Chollima) launched “Operation: ToyBox Story,” a spear‑phishing campaign targeting activists focused on North Korean affairs. The emails delivered Dropbox links to ZIP archives containing malicious LNK shortcut files that execute hidden PowerShell commands, creating...

By GBHackers On Security
Malicious Google Play App With 50K+ Downloads Spreads Anatsa Banking Trojan
News•Feb 3, 2026

Malicious Google Play App With 50K+ Downloads Spreads Anatsa Banking Trojan

A malicious Android app posing as a document reader amassed over 50,000 downloads on Google Play before being removed. The app functioned as a dropper for the Anatsa banking trojan, which can harvest credentials and execute unauthorized transactions. ThreatLabz identified...

By GBHackers On Security
Notepad++ Attack Breakdown Reveals Sophisticated Malware and Actionable IoCs
News•Feb 3, 2026

Notepad++ Attack Breakdown Reveals Sophisticated Malware and Actionable IoCs

The Chinese APT group Lotus Blossom has been linked to a sophisticated supply‑chain attack on the Notepad++ distribution platform. Attackers delivered a custom backdoor dubbed Chrysalis via a malicious NSIS‑based update.exe that sideloaded a forged Bitdefender Submission Wizard DLL into...

By GBHackers On Security
TAMECAT PowerShell Backdoor Targets Edge and Chrome: Login Credentials At Risk
News•Jan 30, 2026

TAMECAT PowerShell Backdoor Targets Edge and Chrome: Login Credentials At Risk

Iranian state‑sponsored group APT42 deployed a new PowerShell‑based backdoor named TAMECAT, targeting Microsoft Edge and Google Chrome to harvest saved login credentials. The malware is delivered via a VBScript downloader that checks for antivirus products before fetching an AES‑encrypted loader...

By GBHackers On Security
Threat Actors Hide Behind School-Themed Domains In Newly Uncovered Bulletproof Infrastructure
News•Jan 30, 2026

Threat Actors Hide Behind School-Themed Domains In Newly Uncovered Bulletproof Infrastructure

Researchers uncovered a sophisticated traffic‑distribution system (TDS) that leverages education‑themed domains to deliver phishing pages, scams, and malware. The infrastructure is hosted on bullet‑proof providers in AS202015 (HZ Hosting) and shares WHOIS details such as oreshnik@mailum.com and Regway nameservers. A...

By GBHackers On Security
Sophisticated Malware Lurks In Open VSX Extension With 5,066 Downloads
News•Jan 30, 2026

Sophisticated Malware Lurks In Open VSX Extension With 5,066 Downloads

Annex Security uncovered a malicious VS Code extension in the Open VSX registry that pretended to be the Angular Language Service, amassing 5,066 downloads before activating sophisticated malware. The extension decrypts a payload with AES‑256‑CBC, contacts a Solana blockchain address for command‑and‑control,...

By GBHackers On Security
Attackers Weaponize Microsoft 365 Outlook Add-Ins to Quietly Exfiltrate Email Data
News•Jan 30, 2026

Attackers Weaponize Microsoft 365 Outlook Add-Ins to Quietly Exfiltrate Email Data

Researchers have uncovered a stealthy data‑theft method called “Exfil Out&Look” that abuses Microsoft 365 Outlook Web add‑ins to siphon email content. The technique leverages minimal‑permission manifests that execute on the OnMessageSend event, silently fetching email bodies and forwarding them via a fetch()...

By GBHackers On Security
Open Directory Exposure Leaks BYOB Framework Across Windows, Linux, and macOS
News•Jan 29, 2026

Open Directory Exposure Leaks BYOB Framework Across Windows, Linux, and macOS

The Hunt.io team uncovered an openly accessible directory on IP 38.255.43.60 that hosts the complete BYOB (Build Your Own Botnet) framework, a sophisticated post‑exploitation tool targeting Windows, Linux and macOS. The infrastructure includes five C2 nodes across the United States, Singapore...

By GBHackers On Security
BlackIce Introduced as Container-Based Red Teaming Toolkit for AI Security Testing
News•Jan 29, 2026

BlackIce Introduced as Container-Based Red Teaming Toolkit for AI Security Testing

Databricks unveiled BlackIce, an open‑source Docker‑based toolkit that bundles 14 leading AI security utilities into a single, reproducible environment. By containerizing both static command‑line tools and dynamic Python‑driven frameworks, BlackIce removes the setup friction and dependency clashes that have long...

By GBHackers On Security
Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware
News•Jan 29, 2026

Fake “Mac Cleaner” Campaign Uses Google Ads to Redirect Users to Malware

Cybercriminals are leveraging Google Search Ads to distribute macOS malware by directing users searching for “mac cleaner” to counterfeit Apple‑styled landing pages. The ads, hosted on compromised Google Ads accounts, redirect to Google Apps Script pages that decode Base64 payloads...

By GBHackers On Security
Python-Based PyRAT Emerges as Cross-Platform Threat With Advanced Remote Access Capabilities
News•Jan 29, 2026

Python-Based PyRAT Emerges as Cross-Platform Threat With Advanced Remote Access Capabilities

A new Python‑based Remote Access Trojan, dubbed PyRAT, has been identified as a cross‑platform threat capable of compromising both Windows and Linux systems. The malware leverages Python’s portability, compiling into ELF and PE binaries, and employs lightweight persistence mechanisms—XDG autostart...

By GBHackers On Security
Matanbuchus Malware Evolves to Bypass AV Defenses by Swapping Core Components
News•Jan 29, 2026

Matanbuchus Malware Evolves to Bypass AV Defenses by Swapping Core Components

Matanbuchus, a C++‑based downloader sold as Malware‑as‑a‑Service since 2020, has evolved into a modular backdoor platform with its latest 3.0 release featuring heavy obfuscation, ChaCha20‑encrypted strings, and Protobuf‑encoded C2 traffic. The malware leverages DLL sideloading through a malicious HRUpdate.exe MSI...

By GBHackers On Security
Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure
News•Jan 28, 2026

Cal.com Broken Access Controls Lead to Account Takeover and Data Exposure

Cal.com, an open‑source scheduling platform, patched critical broken‑access‑control vulnerabilities that allowed attackers to hijack accounts and expose booking data. The flaws included an authentication bypass in the organization signup flow that let attackers take over any user by using an...

By GBHackers On Security
ESkimming Attacks Surge with Evolving Tactics and Ongoing Recovery Challenges
News•Jan 28, 2026

ESkimming Attacks Surge with Evolving Tactics and Ongoing Recovery Challenges

Source Defense’s year‑long study of 550 e‑commerce sites shows e‑skimming remains a chronic problem, with 18 % of sites still infected after twelve months. Over half of the persistent infections (57 %) have evolved into new script variants, indicating attackers adapt once...

By GBHackers On Security
Critical IDIS IP Camera Vulnerability Allows Full Computer Compromise with One-Click Exploit
News•Jan 28, 2026

Critical IDIS IP Camera Vulnerability Allows Full Computer Compromise with One-Click Exploit

IDIS Cloud Manager’s Windows viewer contains a critical flaw (CVE‑2025‑12556) that lets attackers trigger remote code execution with a single click. The vulnerability stems from CWGService.exe accepting unsanitized command‑line arguments via a local WebSocket, which are passed to the Chromium...

By GBHackers On Security
Cybercriminals Exploit Canadians’ Dependence on Digital Services in Widespread Attacks
News•Jan 28, 2026

Cybercriminals Exploit Canadians’ Dependence on Digital Services in Widespread Attacks

Canadian cybercriminals are running a large‑scale phishing campaign that impersonates government agencies, Air Canada and Canada Post, using the PayTool phishing‑as‑a‑service platform. The operation distributes SMS alerts and malicious ads that direct victims to spoofed portals hosted on shared IP...

By GBHackers On Security
Chinese National Sentenced to 46 Months for Laundering Millions Stolen From U.S. Investors
News•Jan 28, 2026

Chinese National Sentenced to 46 Months for Laundering Millions Stolen From U.S. Investors

A Chinese national, Jingliang Su, received a 46‑month federal prison sentence for laundering roughly $36.9 million stolen from U.S. investors in a cryptocurrency fraud scheme run from Cambodia. The court ordered him to pay nearly $27 million in restitution and highlighted a...

By GBHackers On Security
Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer
News•Jan 27, 2026

Attackers Hijack GitHub Desktop Repo to Spread Malware via Official Installer

Threat actors exploited a design flaw in GitHub’s fork architecture to distribute malware masquerading as the official GitHub Desktop installer. By forking the repository and altering the README download link, they created malicious commits that appear under the official namespace,...

By GBHackers On Security
G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload
News•Jan 27, 2026

G_Wagon NPM Package Exploits Users to Steal Browser Credentials with Obfuscated Payload

Security researchers identified a malicious npm package, ansi-universal-ui, that houses the G_Wagon infostealer. The package pretends to be a UI component library but delivers a Python‑based payload that extracts browser passwords, cryptocurrency wallets, cloud credentials, and messaging tokens. Over ten...

By GBHackers On Security
ShinyHunters Group Targets Over 100 Enterprises, Including Canva, Atlassian, and Epic Games
News•Jan 27, 2026

ShinyHunters Group Targets Over 100 Enterprises, Including Canva, Atlassian, and Epic Games

A newly identified threat supergroup called SLSH, formed by Scattered Spider, LAPSUS$ and ShinyHunters, is targeting more than 100 high‑profile enterprises through sophisticated human‑led vishing attacks on Single Sign‑On platforms, especially Okta. The attackers use a live phishing panel to...

By GBHackers On Security
Hackers Exploit SEO Poisoning to Target Users Seeking Legitimate Tools
News•Jan 27, 2026

Hackers Exploit SEO Poisoning to Target Users Seeking Legitimate Tools

Hackers are leveraging SEO poisoning to push malicious ZIP archives that contain BAT scripts masquerading as legitimate tools. The fraudulent pages rank highly in search results, directing users to fake repositories where the scripts contact command‑and‑control servers and download remote...

By GBHackers On Security
Lazarus Hackers Target European Drone Manufacturers in Active Campaign
News•Jan 26, 2026

Lazarus Hackers Target European Drone Manufacturers in Active Campaign

North Korean state‑sponsored Lazarus group launched a new Operation DreamJob campaign targeting European defense firms that build uncrewed aerial vehicles. The attackers used fake job offers to distribute trojanized PDFs that install the ScoringMathTea RAT and BinMergeLoader loader. Malware leverages...

By GBHackers On Security

Page 2 of 4

← Prev1234Next →