Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Latest News

Fake IT Support on Microsoft Teams Used to Deliver New A0Backdoor Threat

  A contemporary cyber campaign has been identified where attackers are using Microsoft Teams to target employees in financial and healthcar...

All the recent news you need to know

North Korean Hackers Orchestrate Impeccable Multi Million Dollar Crypto Theft

 


Several highly calculated cloud intrusion campaigns have been linked to a North Korean threat actor identified as UNC4899, demonstrating the growing convergence between cyber espionage and financial crime. Using a sophisticated methodology, the operation appears to have been meticulously designed with the singular objective of siphoning millions of dollars in digital assets off a cryptocurrency organization in 2025. 

Researchers who have assessed the breach note a degree of precision and operational discipline that are consistent with state-sponsored activity, thereby reinforcing its moderate attribution to Pyongyang's cyber apparatus. Jade Sleet, PUKCHONG, Slow Pisces, and TraderTraitor are other aliases used by the group. 

The group is part of a larger trend in which adaptive threat actors are quietly infiltrating and persisting in complex cloud environments for the purpose of monetizing access. Despite the scale and persistence of these operations, they are not without precedent. 

ased on the findings of a United Nations Panel of Experts, at least 58 targeted intrusions against cryptocurrency platforms were perpetrated by the Democratic People's Republic of Korea between 2017 and 2023 that targeted the extraction of a total of $3 billion in virtual assets. 

A number of senior U.S. officials have expressed parallel views, including Anne Neuberger, Deputy National Security Advisor for Emerging Technology, that proceeds derived from these cyber campaigns are not simply opportunistic gains, but are strategically directed, with some of the proceeds believed to be used for nuclear weapons development. 

Collectively, these developments demonstrate how the use of cyber operations has become deeply ingrained in Pyongyang's overall statecraft, serving both as a means of revenue generation and as a means of enabling strategic capabilities. 

Further strengthening this dual-use approach is the sustained investment in technological infrastructure, operator training, and tooling sophistication of North Korea’s cyber units, which has enabled them to refine their tradecraft and maintain a persistent edge in both financial and intelligence-driven operations. 

Recently, threat intelligence has indicated a significant change in both target patterns and operational methodologies regarding cryptocurrency threats. Despite the fact that exchanges will continue to account for a significant share of financial losses in 2025, a greater proportion will involve high net-worth individuals whose digital asset portfolios are becoming increasingly attractive targets as a result. 

Threat actors are often able to exploit exploitable security gaps created by these individuals compared to institutional platforms because these individuals typically operate with relatively limited security controls. In several cases, it appears that the targeting extends beyond personal holdings, with individuals being targeted for their proximity to organizations managing substantial cryptocurrency reserves. 

As victimology has evolved, attack vectors have also evolved. Social engineering techniques are presently the dominant intrusion methods. In addition to exploiting vulnerabilities within blockchain infrastructure, adversaries are increasingly obtaining credentials and bypassing authentication safeguards by deception, impersonation, and psychological manipulation, underscoring human weakness as an important point of failure. 

In parallel, the post-exploitation phase has evolved into an increasingly adaptive contest between illicit actors and blockchain intelligence providers. Due to the increasing sophistication of analytical tools used by law enforcement and compliance teams in tracing transactional flows, North Korean-linked operators have enhanced their laundering strategies by increasing the level of technical complexity and layering of operations. 

In recent years, these methods have become increasingly complex, involving iterative mixing cycles, interchain transfers, as well as the deliberate use of non-monitored blockchain networks with limited visibility. 

A number of tactics can also be employed to maximize cost through the acquisition of protocol-specific utility tokens, manipulate refund mechanisms to redirect funds to newly created wallets, and create bespoke tokens within controlled ecosystems for the purpose of obscuring data. 

A sustained and evolving cat-and-mouse dynamic is evident in these practices, in which advances in forensic capabilities are accompanied by escalation of adversarial tradecraft. Further contextualization of this incident is provided by Google Cloud’s Cloud Threat Horizons Report, which reveals an intrusion chain involving social engineering as well as the exploiting of trust boundaries between corporate and personal environments. 

Initial access was reportedly gained by tricking a developer into downloading a trojanized file masquerading as a legitimate open-source collaboration. A seemingly benign interaction resulted in compromising a personal workstation, which ultimately became the gateway to the organization's corporate environment and, ultimately, its cloud infrastructure as a whole. 

A nuanced understanding of cloud-native architecture was demonstrated by the attackers once access had been established. By exploiting legitimate DevOps processes, they harvested credentials and manipulated managed database services, including Cloud SQL instances, to enable the covert extraction of cryptocurrency assets. This post-compromise activity has been intentionally designed to blend malicious operations with normal system behavior.

Through the modification of Kubernetes configurations and the execution of carefully crafted commands, threat actors were able to maintain persistence while minimizing detection. This tactic is increasingly referred to as “living off-the-cloud” in which native platform features are repurposed to maintain unauthorized access. 

Moreover, it reveals systemic weaknesses in the management of sensitive data and credentials in hybrid environments, especially where personal and corporate workflows are not adequately separated. Security practitioners emphasize the need for layered defensive measures in order to mitigate such threats, including stringent identity verification controls, tighter governance over data transmission channels, and isolation within cloud execution contexts in order to contain potential vulnerabilities. 

A growing consensus is urging the reduction of the attack surface by limiting the use of external devices and unsecured communication methods, including ad hoc file-sharing protocols, to reduce attack vulnerabilities, as adversaries continue to develop methods for exploiting human trust alongside technical complexity.

There has been a shocking increase in losses approaching the $2 billion mark, which serves as a stark indication of both the maturation of adversarial capabilities and the expansion of the attack surface within the digital asset ecosystem. At the same time, advanced blockchain intelligence reinforces the importance of protecting against such threats at the same time. 

In spite of North Korean-linked operators' continued refinement of tactics, distributed ledger technology offers a structural advantage to investigators equipped with sophisticated forensic tools due to its inherent transparency. Using deep transaction tracing, behavioral analytics, and cross-chain visibility, firms such as Elliptic have demonstrated how illicit financial flows can be illuminated that would otherwise remain undetected. 

There is a clear indication that the balance between attackers and defenders is evolving as threat actors innovate in obfuscation and laundering. Analytics-driven oversight is paralleling this innovation, enabling industry stakeholders and law enforcement agencies to identify anomalies, attribute malicious activities, and disrupt financial pipelines in an increasingly precise manner. 

Consequently, blockchain transparency, once regarded primarily as a feature of decentralization, is now emerging as a critical enforcement mechanism, supporting efforts to maintain trust, security, and innovation while maintaining the integrity of the crypto ecosystem.

China Warns Government Staff Against Using OpenClaw AI Over Data Security Concerns

 

Recently, Chinese government offices along with public sector firms began advising staff not to add OpenClaw onto official gadgets - sources close to internal discussions say. Security issues are a key reason behind these alerts. As powerful artificial intelligence spreads faster across workplaces, unease about information safety has been rising too. 

Though built on open code, OpenClaw operates with surprising independence, handling intricate jobs while needing little guidance. Because it acts straight within machines, interest surged quickly - not just among coders but also big companies and city planners. Across Chinese industrial zones and digital centers, its presence now spreads quietly yet steadily. Still, top oversight bodies along with official news outlets keep pointing to possible dangers tied to the app. 

If given deep access to operating systems, these artificial intelligence programs might expose confidential details, wipe essential documents, or handle personal records improperly - officials say. In agencies and big companies managing vast amounts of vital information, those threats carry heavier weight. A report notes workers in public sector firms received clear directions to avoid using OpenClaw, sometimes extending to private gadgets. Despite lacking an official prohibition, insiders from a federal body say personnel faced firm warnings about downloading the software over data risks. 

How widely such limits apply - across locations or agencies - is still uncertain. A careful approach reveals how Beijing juggles competing priorities. Even as officials push forward with plans to embed artificial intelligence into various sectors - spurring development through widespread tech adoption - they also work to contain threats linked to digital security and information control. Growing global tensions add pressure, sharpening concerns about who manages data, and under what conditions. Uncertainty shapes decisions more than any single policy goal. 

Even with such cautions in place, some regional projects still move forward using OpenClaw. Take, for example, health-related programs under Shenzhen’s city government - these are said to have run extensive training drills featuring the artificial intelligence model, tied into wider upgrades across digital infrastructure. Elsewhere within the same city, one administrative area turned to OpenClaw when building a specialized helper designed specifically for public sector workflows. 

Although national leaders call for restraint, some regional bodies might test limited applications tied to progress targets. Whether broader limits emerge - or monitoring simply increases - stays unclear. What happens next depends on shifting priorities at different levels. Recently joining OpenAI, Peter Steinberger originally created OpenClaw as an open-source initiative hosted on GitHub. Attention around the tool has grown since his new role became known. 

When AI systems gain greater independence and embed themselves into daily operations, questions about safety will grow sharper - especially where confidential or controlled information is involved.

Zombie ZIP Evasion Exposes Antivirus Blind Spot

 

A recently revealed technique known as Zombie ZIP demonstrates how attackers can embed malware inside fragmented and corrupted archives that can’t be fully scanned by most security solutions. By exploiting the way ZIP headers are processed, it enables malicious payloads to evade antivirus and EDR solutions even if the file appears corrupted to end users.

Zombie ZIP works by manipulating the ZIP header so that the archive claims its contents are stored with the “Method 0” (STORED) mode, which means uncompressed data. In reality, the payload is still compressed with the standard Deflate algorithm, so scanners that trust the header see only high-entropy “noise” instead of recognizable malware signatures. Standard utilities like WinRAR, 7‑Zip, or unzip will usually throw errors or report corruption when users attempt to extract these malformed files. 

Security researcher Chris Aziz of Bombadil Systems tested this approach against VirusTotal and found that 50 out of 51 antivirus engines failed to detect the hidden payload when using Zombie ZIP archives. He also published proof-of-concept code and sample archives on GitHub, making it easier for security teams and, unfortunately, attackers to reproduce the method. A key trick is setting the CRC integrity value to match the uncompressed payload, which further confuses extraction and scanning tools. 

While common archivers fail, a custom loader can simply ignore the misleading header and decompress the data as Deflate, recovering the embedded malware without issues. This means an attacker only needs to get the loader executed once on a target system to start unpacking any number of Zombie ZIP containers. Once the loader runs, traditional defenses lose the benefit of pre-execution scanning at the file level. 

The CERT Coordination Center (CERT/CC) issued an advisory assigning CVE‑2026‑0866 to the issue and warning that malformed archives can undermine current detection models. CERT/CC notes that some tools do manage to decompress these archives correctly, but many popular solutions still fail, echoing an old flaw tracked as CVE‑2004‑0935 in early ESET antivirus versions. The agency urges vendors to validate compression method fields against actual data, detect structural inconsistencies, and enable more aggressive archive inspection. 

Not all experts agree that Zombie ZIP deserves a CVE, however, with several researchers arguing it is a clever evasion trick rather than a true vulnerability. They point out that these archives are not openable with standard tools and that using a custom loader already implies the system is compromised in some way. As one researcher put it, corrupting or encrypting any file and then requiring a special loader achieves a similar outcome without necessarily exposing a new flaw. 

For everyday users and organizations, the practical takeaway is to treat suspicious ZIP files with extra caution, especially from unknown senders. CERT/CC advises deleting archives that fail to extract and show “unsupported method” or similar errors, rather than repeatedly trying to open them. Meanwhile, defenders should pressure vendors to harden archive parsing and incorporate deeper content validation so that tricks like Zombie ZIP do not become a reliable blind spot in the malware detection chain.

Russian Cyber Campaign Targets Signal and WhatsApp Users Through Social Engineering Tactics

 

Hackers believed to be linked to Russia are attempting to gain access to Signal and WhatsApp accounts of government officials, journalists, and military personnel worldwide—not by breaking encryption, but by manipulating users into giving up their access credentials.

This warning was issued on Monday by the Netherlands’ intelligence and military agencies, AIVD and MIVD, which reported a "large-scale" cyber operation focused on compromising accounts on these messaging platforms. Instead of attacking the apps’ end-to-end encryption, the campaign aims to take control of user accounts and discreetly monitor their communications.

According to the agencies, attackers directly contact targets through chats and convince them to share verification codes or PINs, effectively handing over account access. In certain instances, the hackers impersonate a Signal support bot to make their requests appear authentic. Once the code is provided, they can log in and view private messages or track group conversations without bypassing encryption.

Another technique involves exploiting Signal’s “linked devices” feature, which allows multiple devices to connect to one account. If attackers successfully link their own device, they can observe messages in real time. Dutch authorities confirmed that this campaign has already impacted individuals, including those within the Dutch government. "The Russian hackers have likely gained access to sensitive information," the AIVD and MIVD said, adding that "targets and victims of the campaign include Dutch government employees" as well as journalists.

Ironically, the strong encryption that makes these platforms popular among officials and reporters also increases their value as targets once an account is compromised. While end-to-end encryption secures messages during transmission, it offers no protection if an attacker gains direct access to the account.

A Meta spokesperson told The Register that users should never share their six-digit code with others and that it provides detailed advice on how WhatsApp users can protect themselves from scams.

Signal did not immediately respond to The Register’s inquiries. Meanwhile, Dutch authorities have issued a cybersecurity advisory and are helping affected users secure their accounts. They also highlighted warning signs of a potential breach, such as duplicate contacts appearing or numbers being marked as “deleted account” unexpectedly.

The broader takeaway from intelligence officials is that while encrypted messaging apps are convenient, they are not designed for highly sensitive communication. As MIVD director Vice-Admiral Peter Reesink put it:

"Despite their end-to-end encryption option, messaging apps such as Signal and WhatsApp should not be used as channels for classified, confidential or sensitive information."

In essence, relying solely on the assumption that no one will request a verification code may not be sufficient for maintaining operational security.

Meta’s Smart Glasses Face Privacy Backlash as Experts Flag Legal and Ethical Risks

 



A whirlwind of concerns around Meta’s AI-enabled smart glasses are intensifying after reports suggested that human reviewers may have accessed sensitive user recordings, raising broader questions about privacy, consent, and data protection.

Online discussions have surged, with users expressing alarm over how much data may be visible to the company. Some individuals on forums have claimed that recorded footage could be manually reviewed to train artificial intelligence systems, while others raised concerns about the use of such devices in sensitive environments like healthcare settings, where patient information could be unintentionally exposed.


What triggered the controversy?

The debate gained momentum following an investigation by Swedish media outlets, which reported that contractors working at external facilities were tasked with reviewing video recordings captured through Ray-Ban Meta Smart Glasses. According to these findings, some of the reviewed material included highly sensitive content.

The issue has since drawn regulatory attention in multiple regions. Authorities in the United Kingdom, including the Information Commissioner's Office, have sought clarification on how such user data is processed. In the United States, the controversy has also led to legal action against Meta Platforms, with allegations that consumers were not adequately informed about the device’s privacy safeguards.

The timing is of essence here, as smart glasses are rapidly gaining popularity. Legal filings suggest that more than seven million units were sold in 2025 alone. Unlike smartphones, these glasses resemble regular eyewear but can discreetly capture images, audio, and video from the wearer’s perspective, often without others being aware.


Why are experts concerned?

Legal analysts highlight that such practices could conflict with India’s Digital Personal Data Protection Act, 2023 if data involving Indian individuals is collected.

According to legal experts, consent remains a foundational requirement. Any access to recordings involving identifiable individuals must be based on informed approval. If footage is reviewed without the knowledge or permission of those captured, it could constitute a violation of Indian data protection law.

Beyond legality, specialists argue that wearable AI devices introduce a deeper structural issue. Unlike traditional data collection methods, these tools continuously capture real-world environments, making it difficult to define clear boundaries for data usage.

Experts also point out that although Meta includes visible indicators such as LED lights to signal recording, these measures do not fully address how the data of bystanders is processed. There are concerns about the absence of strict limitations on why such data is collected or how much of it is retained.

Additionally, outsourcing the review of user-generated content introduces further complications. Apart from the risk of misuse or unauthorized sharing, there are also ethical concerns regarding the working conditions and psychological impact on individuals tasked with reviewing potentially distressing material.


Cross-border and systemic risks

Another key concern is international data handling. If recordings involving Indian users are accessed by contractors located overseas, companies are still expected to maintain the same standards of security and confidentiality required under Indian regulations.

Experts emphasize that these devices are part of a much larger artificial intelligence ecosystem. Data captured through smart glasses is not simply stored. It may be uploaded to cloud servers, processed by machine learning systems, and in some cases, reviewed by humans to improve system performance. This creates a chain of data handling where highly personal information, including facial features, voices, surroundings, and behavioral patterns, may circulate beyond the user’s direct control.


What is Meta’s response?

Meta has stated that protecting user data remains a priority and that it continues to refine its systems to improve privacy protections. The company has explained that its smart glasses are designed to provide hands-free AI assistance, allowing users to interact with their surroundings more efficiently.

It also acknowledged that, in certain cases, human reviewers may be involved in evaluating shared content to enhance system performance. According to the company, such processes are governed by its privacy policies and include steps intended to safeguard user identity, such as automated filtering techniques like face blurring.

However, reports citing Swedish publications suggest that these safeguards may not always function consistently, with some instances where identifiable details remain visible.

While recording must be actively initiated by the user, either manually or through voice commands, experts note that many users may not fully understand that their captured content could be subject to human review.


The Ripple Effect

This controversy reflects a wider shift in how personal data is generated and processed in the age of AI-driven wearables. Unlike earlier technologies, smart glasses operate in real time and in shared environments, raising complex questions about consent not just for users, but for everyone around them.

As adoption runs rampant, regulators worldwide are likely to tighten scrutiny on such devices. The challenge for companies will be to balance innovation with transparent data practices, especially as public awareness around digital privacy continues to rise.

For users, this is a wake up call to not rely on new age technology blindly and take into account that convenience-driven technologies often come with hidden trade-offs, particularly when it comes to control over personal data.

Termite Ransomware Linked to Velvet Tempest's ClickFix, CastleRAT Attacks

 

Cyber threat actors known as Velvet Tempest have been observed deploying sophisticated attacks involving Termite ransomware, utilizing the ClickFix social engineering technique and the CastleRAT backdoor.These intrusions, tracked by MalBeacon researchers, unfolded over 12 days in a simulated U.S. non-profit environment with over 3,000 endpoints.Velvet Tempest, active for at least five years, has affiliations with major ransomware strains like Ryuk, REvil, Conti, BlackCat, LockBit, and RansomHub. 

The attacks begin with malvertising campaigns directing victims to fake CAPTCHA pages that trick users into pasting obfuscated PowerShell commands into the Windows Run dialog This ClickFix method bypasses browser security features, chaining cmd.exe processes and using legitimate tools like finger.exe to fetch malware loaders, often disguised as PDF archives.Subsequent stages involve PowerShell downloads, .NET compilation via csc.exe, and Python-based persistence in ProgramData directories. 

Once inside, attackers conduct Active Directory reconnaissance, host discovery, and credential harvesting from Chrome browsers using hosted PowerShell scripts linked to Termite staging servers. They deploy DonutLoader to retrieve CastleRAT, a remote access trojan that steals credentials, logs keystrokes, captures screens, and employs UAC bypass via trusted binaries like ComputerDefaults.exe. CastleRAT hides its command-and-control servers using Steam Community profiles as dead-drop resolvers, blending traffic with legitimate web activity. 

Although ransomware deployment was not observed in this intrusion, Termite—a Babuk-based variant emerged in late 2024—employs double-extortion by exfiltrating data before encrypting files. It deletes shadow copies with vssadmin.exe, empties the Recycle Bin, and targets high-profile victims like SaaS provider Blue Yonder and Australian IVF firm Genea. The group exploits vulnerabilities, such as those in Cleo's file transfer software, for initial access via phishing or compromised sites. 

Organizations should prioritize defenses against ClickFix by training users on suspicious prompts, monitoring PowerShell abuse, and blocking anomalous tool executions like finger.exe or csc.exe. Implementing deception environments, as used by MalBeacon, aids early detection of such hands-on-keyboard activities. With Velvet Tempest's history of devastating breaches, vigilance against evolving ransomware tactics remains critical in 2026.

Featured