Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Latest News

Why Banks Must Proactively Detect Money Mule Activity

Financial institutions are under increasing pressure to strengthen their response to money mule activity, a growing form of financial crime ...

All the recent news you need to know

AuraStealer Malware Uses Scam Yourself Tactics to Steal Sensitive Data

 

A recent investigation by Gen Digital’s Gen Threat Labs has brought attention to AuraStealer, a newly emerging malware-as-a-service offering that has begun circulating widely across underground cybercrime communities. First observed in mid-2025, the malware is being promoted as a powerful data-stealing tool capable of compromising a broad range of Windows operating systems. Despite its growing visibility, researchers caution that AuraStealer’s technical sophistication does not always match the claims made by its developers. 

Unlike conventional malware campaigns that rely on covert infection techniques such as malicious email attachments or exploit kits, AuraStealer employs a strategy that places users at the center of their own compromise. This approach, described as “scam-yourself,” relies heavily on social engineering rather than stealth delivery. Threat actors distribute convincing video content on popular social platforms, particularly TikTok, presenting the malware execution process as a legitimate software activation tutorial. 

These videos typically promise free access to paid software products. Viewers are guided through step-by-step instructions that require them to open an administrative PowerShell window and manually enter commands shown on screen. Instead of activating software, the commands quietly retrieve and execute AuraStealer, granting attackers access to the victim’s system without triggering traditional download-based defenses. 

From an analysis perspective, AuraStealer incorporates multiple layers of obfuscation designed to complicate both manual and automated inspection. The malware disrupts straightforward code execution paths by dynamically calculating control flow at runtime, preventing analysts from easily tracing its behavior. It also leverages exception-based execution techniques, intentionally generating system errors that are intercepted by custom handlers to perform malicious actions. These tactics are intended to confuse security sandboxes and delay detection. 

Functionally, AuraStealer targets a wide range of sensitive information. Researchers report that it is designed to harvest data from more than a hundred web browsers and dozens of desktop applications. Its focus includes credentials stored in both Chromium- and Gecko-based browsers, as well as data associated with cryptocurrency wallets maintained through browser extensions and standalone software. 

One of the more concerning aspects of the malware is its attempt to circumvent modern browser protections such as Application-Bound Encryption. The malware tries to launch browser processes in a suspended state and inject code capable of extracting encryption keys. However, researchers observed that this technique is inconsistently implemented and fails across multiple environments, suggesting that the malware remains technically immature. 

Despite being sold through subscription-based pricing that can reach several hundred dollars per month, AuraStealer contains notable weaknesses. Analysts found that its aggressive obfuscation introduces detectable patterns and that coding errors undermine its ability to remain stealthy. These shortcomings provide defenders with opportunities to identify and block infections before significant damage occurs. 

While AuraStealer is actively evolving and backed by ongoing development, its emergence highlights a broader trend toward manipulation-driven cybercrime. Security professionals continue to emphasize that any online tutorial instructing users to paste commands into a system terminal in exchange for free software should be treated as a significant warning sign.

Dangerous December: Urgent Update Warning for All Android and iPhone Users

 

An emergent surge of urgent security advisories has permeated the tech sector in December, with both Google and Apple warning Android and iPhone users of critical vulnerabilities being actively exploited in the wild. Termed "Dangerous December," this time period marks a significant ramping up of the threat landscape for mobile users, as both companies have issued emergency patches to remediate vulnerabilities capable of enabling attacker control of devices through specially crafted web content or malicious image files. 

Google kicked off the month by confirming that Android devices are currently at risk due to two critical vulnerabilities being actively exploited. The company issued a rapid emergency patch for all Chrome users, so fast it was delivered before it even received an official CVE designation. The vulnerability is currently known as CVE-2025-14174 and is considered actively exploited; Google urges users to update now to avoid being compromised. 

Apple subsequently released emergency updates for iPhones, iPads, and other Apple devices to address two vulnerabilities, including CVE-2025-14174 and another identified as CVE-5-29. Both vulnerabilities are associated with the WebKit browser engine, which supports Safari and other browsers on iOS devices. Security specialists further note that browser engines have become one of the main targets for attackers, which correspondingly raises user exposure if updates are not applied in a timely manner. 

The U.S. Cybersecurity and Infrastructure Security Agency has issued a directive of its own, requiring federal employees to update Chrome and all Chromium-based browsers by January 2, or stop using them. For Apple devices, the deadline is January 5. CISA cautions that these vulnerabilities might allow remote attackers to perform out-of-bounds memory access, which may allow the attacker to take control of an affected device. 

While the attacks so far have been targeted, researchers warn that these exploits will soon become ubiquitous, which makes the need for immediate updates across all users paramount. In light of this, users of Android or iPhone devices, or any Chromium-based browser, should update their software right away to protect data and privacy. The threat is real, and any delay may expose people to sophisticated spyware and hacking attacks.

Cyber Threat Actors Escalate Impersonation of Senior US Government Officials


Federal law enforcement officials are raising a lot of concern about an ongoing cybercrime operation involving threat actors impersonating senior figures across the American political landscape, including state government leaders, White House officials, Cabinet members, and congressional members. 

These threat actors continue to impersonate senior figures in the American political landscape. Based on information provided by the FBI, the social engineering campaign has been operating since at least 2023. 

The campaign relies on a calculated mix of both text-based and voice-based social engineering techniques, with attackers using smishing and increasingly sophisticated artificial intelligence-generated voice messages to bolster their legitimacy. 

There have been no shortages of victims in this operation, not only government officials, but also their family members and personal contacts, demonstrating the breadth of the operation and its persistence. 

Often when fraudsters initiate contact, they reference familiar or contextually relevant topics in order to elude detection while moving the fraud forward with the threat of taking down the target on encrypted messaging platforms. This tactic is often used to evade detection and further advance the fraud.

Several federal law enforcement agencies have identified this activity as part of a widespread espionage operation developed by a group of individuals who are impersonating United States government officials to obtain potentially sensitive information, as well as to perpetrate financial and influence-driven scams. 

In May, the bureau updated its report on the campaign, which indicated that it had been active since at least April 2025. However, in a follow-up update from Friday, it revised that assessment, adding that there is evidence that the impersonation campaign goes back to 2023, as well as the previous year. 

An FBI public service announcement revealed that malicious actors have posed as government officials and cabinet members of the White House, members of Congress and high-level officials of state governments in order to engage targets that have apparently included the officials' family members and personal acquaintances as targets. 

During the Trump administration, the government used encryption-enhanced messaging platforms, such as Signal, along with voice cloning technology that is designed to replicate the sounds of senior officials to convincingly mimic senior officials in government—taking advantage of the platform’s legitimate use during the administration as a way to communicate with government officials. 

It appears that the activity may have persisted across multiple administrations, including the Biden presidency, based on the expanded timeline, even though there has been no indication of how many individuals, groups, or distinct threat actors may have been involved during the period of the campaign. 

During the ongoing campaign, the FBI has published detailed guidelines that can assist individuals in recognizing and responding to suspicious communications in order to counter the ongoing campaign. In addition, the bureau advises consumers to do independent research before engaging anyone claiming to be a government official, such as researching the number, organization, or person from which the contact is coming, and verifying the legitimacy of that contact by using an independent contact method obtained separately. 

The importance of paying attention to subtle variations in email addresses, phone numbers, URLs, and spelling must be stressed above all else, since attackers often rely on subtle differences in order to make their attacks appear legitimized. 

As part of the guidance, people also highlight the telltale signs of manipulated or artificially generated content, including visual irregularities, unnatural movements, distorted features, and discrepancies in light and shadow, as well as audio cues such as call lag, mismatched speech patterns, or unnatural sound. 

Since artificial intelligence-driven impersonation tools have become increasingly sophisticated, the FBI cautions that the message may not be easily distinguishable from a genuine communication if it is not carefully examined. Anyone who has any doubts is encouraged to contact their organization's security teams or report the activity to the FBI. 

According to CSIA, the activity is primarily aimed at targets in the United States, the Middle East, and Europe that are high-value targets, including current and former senior government officials, military personnel, and political officials, along with civil society organizations, and other at-risk individuals. 

There are three dominant techniques that are used by the group to conduct this operation: phishing campaigns and malicious QR codes that are used to link a malicious computer to a victim’s account, zero-click exploits, which do not require interaction from the victim, and impersonating widely trusted messaging platforms such as Signal and WhatsApp to persuade targets to install spyware or provide information. 

In a recent study published by Google, CISA cited how multiple Russian-aligned espionage groups have abused Signal's "linked devices" feature by causing victims to scan weaponized QR codes, which has allowed attackers to silently pair their own infrastructure with the victim's account and receive messages simultaneously without completely compromising the victim's device. 

Additionally, the advisory noted that there is a growing trend among threat actors that they use completely counterfeit messaging applications instead of phishing pages to deceive their targets. This tactic has been recently shown in the findings of Android spyware masquerading as Signal that was targeting individuals in the United Arab Emirates and siphoning their backups of chats, documents, media, and contacts. 

A warning has been issued following an intensified international crackdown on commercial spyware, including a landmark ruling from a federal court in October which permanently barred NSO Group from targeting WhatsApp. Meta previously referred to that ruling as being a significant step forward in user privacy. 

In total, these disclosures demonstrate the rapid evolution of impersonation techniques that are changing the threat landscape for both public institutions and individuals. As a result, traditional trust signals are eroded by the convergence of encrypted communications, artificial intelligence-enabled voice synthesis, and social engineering. This has forced both governments and businesses to rethink the way sensitive interactions are initiated and verified in the future. 

Experts in the field of cybersecurity are increasingly emphasizing the importance of stricter authentication protocols, routine cybersecurity training for high-risk individuals, and clearer guidelines on how encrypted platforms should be used in official business. 

The campaign, which has been widely seen in government circles, also serves as a warning to businesses, civil society groups, and individuals that proximity to famous figures can themselves pose a risk to hackers. 

In the process of investigating and refining their response to these threats, federal agencies will have to find ways to strike a balance between the legitimate benefits of modern communication tools and measures that protect them from being exploited by others. For such campaigns to be limited in effect and for trust to be preserved in both digital communications and democratic institutions, sustained vigilance, cross-agency coordination, and public awareness will be critical.

Google Plans to Bring Android to PCs With Aluminium - Key Details Here

 


Google isn’t exactly known for secrecy anymore. Unlike Apple, the company frequently reveals features early, allows products to leak, and even publishes official teasers ahead of major launches. Pixel devices, in particular, are often shown off well before press events, making it clear that Google prefers to guide the narrative rather than fight speculation. For most fans, excitement now comes from following Google’s roadmap rather than waiting for surprises.

There are still exceptions — especially when billions of dollars and the future of computing are involved. One of Google’s most ambitious and closely watched projects is its plan to merge Android and ChromeOS into a single operating system built for PCs. The move has the potential to reshape Chromebooks, redefine Android’s role beyond phones, and place Google in more direct competition with Apple, Microsoft, and the iPad.

ChromeOS, despite its success in education and enterprise environments, has never managed to break into the mainstream laptop market. While Chromebooks are affordable, they have long been criticized for limited offline functionality and a lack of flexibility compared to Windows and macOS. Even after gaining the ability to run Android apps, ChromeOS remained a niche platform, struggling to compete with more powerful and versatile alternatives. Over time, it became increasingly clear that Google’s enthusiasm for ChromeOS as a standalone operating system was fading.

Rumors about a unification of Android and ChromeOS began circulating about a year ago. Google confirmed the plan in July 2025 during a conversation with TechRadar and later made it official at Qualcomm’s Snapdragon Summit in September. At the event, Google announced a partnership with Qualcomm to develop a platform that blends mobile and desktop computing, with artificial intelligence at its core. Google’s Senior VP of Devices and Services, Rick Osterloh, made the company’s intentions unmistakable, stating that the two companies were "building together a common technical foundation for our products on PCs and desktop computing systems."

Further insight emerged when a now-removed Google job listing, discovered by Android Authority, revealed the internal codename “Aluminium.” The company was hiring a “Senior Product Manager, Android, Laptop and Tablets,” pointing to a unified vision across form factors. The British spelling of Aluminium is likely a nod to Chromium, the open-source project that underpins ChromeOS and the Chrome browser. Internally, the platform is sometimes abbreviated as “ALOS.”

The listing referenced a wide range of devices — including laptops, tablets, detachables, and even set-top boxes — across multiple tiers, from entry-level products to premium hardware. This suggests Google wants to move beyond the budget-focused Chromebook image and position its next operating system across a much broader spectrum of devices. While premium Chromebooks already exist, they’ve never gained significant traction, something Google appears determined to change.

Notably, the job description also mentioned transitioning “from ChromeOS to Aluminium with business continuity in the future.” This implies that ChromeOS may eventually be phased out, but not abruptly. Google seems aware that many schools and businesses rely on large Chromebook deployments and will need long-term support rather than a forced migration.

What remains unclear is how this transition will affect current Chromebook owners. The name “Aluminium” is almost certainly temporary, and Google is unlikely to ship the final product under that label. According to Android Authority, engineers have reportedly begun referring to existing software as “ChromeOS Classic” or “non-Aluminium ChromeOS.” This could mean the ChromeOS brand survives, though its underlying technology may change dramatically. Another possibility is branding the platform as “Android Desktop,” though that risks confusion with Android 16’s Desktop Mode.

There is some indication that certain existing Chromebooks may be able to upgrade. Aluminium is reportedly being tested on relatively modest hardware, including MediaTek Kompanio 520 chips and 12th-generation Intel Alder Lake processors. That said, devices would still need to meet specific RAM and storage requirements.

Artificial intelligence could ultimately be the deciding factor. Google has confirmed that Gemini will play a central role in Aluminium, and older processors may struggle to support its full capabilities. While Google has previously brought limited AI features to older hardware like Nest speakers, advanced on-device AI processing — particularly tasks involving local files or graphics rendering — may require newer chips designed specifically for AI acceleration.

Beyond hardware compatibility, a larger question looms: how serious is Google about competing in the PC market? Android is already far more widespread than ChromeOS, but convincing users that it can replace a Windows or macOS computer will be a major challenge. Google has historically struggled to get developers to build high-quality tablet apps for Android, let alone desktop-class software that rivals professional Windows applications. Users expecting to run demanding programs or high-end games may find the platform limiting, at least initially.

Some reports suggest that Google’s true target isn’t Windows or macOS, but Apple’s iPad. The iPad dominates more than half of the global tablet market, according to Statcounter, and Apple has steadily pushed its tablets closer to laptop territory. The iPad Air and Pro now use the same M-series chips found in MacBooks, while iPadOS 26 introduces more advanced multitasking and window management.

Crucially, iPads already have a mature ecosystem of high-quality apps, making them a staple in schools and businesses — the very markets Chromebooks once dominated. If Google can deliver an Android-based platform that matches the iPad’s capabilities while undercutting Apple on price, it could finally achieve the mainstream breakthrough it has long pursued.

As for timing, Google has officially set a 2026 launch window. While an early reveal is possible, the significance of the project suggests it will debut at a major event, such as Google I/O in May or a high-profile Pixel launch later in the year. The software is almost certain to align with Android 17, which is expected to enter beta by May and reach completion by fall. If schedules hold, the first Android-powered PCs could arrive in time for the 2026 holiday season, though delays could push hardware launches into 2027

Google Partners With UK to Open Access to Willow Quantum Chip for Researchers

 

Google has revealed plans to collaborate with the UK government to allow researchers to explore potential applications of its advanced quantum processor, Willow. The initiative aims to invite scientists to propose innovative ways to use the cutting-edge chip, marking another step in the global race to build powerful quantum computers.

Quantum computing is widely regarded as a breakthrough frontier in technology, with the potential to solve complex problems that are far beyond the reach of today’s classical computers. Experts believe it could transform fields such as chemistry, medicine, and materials science.

Professor Paul Stevenson of the University of Surrey, who was not involved in the agreement, described the move as a major boost for the UK’s research community. He told the BBC it was "great news for UK researchers". The partnership between Google and the UK’s National Quantum Computing Centre (NQCC) will expand access to advanced quantum hardware for academics across the country.

"The new ability to access Google's Willow processor, through open competition, puts UK researchers in an enviable position," said Prof Stevenson.
"It is good news for Google, too, who will benefit from the skills of UK academics."

Unlike conventional computers found in smartphones and laptops, quantum machines operate on principles rooted in particle physics, allowing them to process information in entirely different ways. However, despite years of progress, most existing quantum systems remain experimental, with limited real-world use cases.

By opening Willow to UK researchers, the collaboration aims to help "uncover new real world applications". Scientists will be invited to submit detailed proposals outlining how they plan to use the chip, working closely with experts from both Google and the NQCC to design and run experiments.

Growing competition in quantum computing

When Google introduced the Willow chip in 2024, it was widely viewed as a significant milestone for the sector. The company is not alone in the race, with rivals such as Amazon and IBM also developing their own quantum technologies.

The UK already plays a key role in the global quantum ecosystem. Quantinuum, a company headquartered in Cambridge and Colorado, reached a valuation of $10 billion (£7.45 billion) in September, underlining investor confidence in the sector.

A series of breakthroughs announced throughout 2025 has led many experts to predict that quantum computers capable of delivering meaningful real-world impact could emerge within the next ten years.

Dr Michael Cuthbert, Director at the National Quantum Computing Centre, said the partnership would "accelerate discovery". He added that the advanced research it enables could eventually see quantum computing applied to areas such as "life science, materials, chemistry, and fundamental physics".

The NQCC already hosts seven quantum computers developed by UK-based companies including Quantum Motion, ORCA, and Oxford Ionics.

The UK government has committed £670 million to support quantum technologies, identifying the field as a priority within its Industrial Strategy. Officials estimate that quantum computing could add £11 billion to the UK economy by 2045.

Network Detection and Response Defends Against AI Powered Cyber Attacks

 

Cybersecurity teams are facing growing pressure as attackers increasingly adopt artificial intelligence to accelerate, scale, and conceal malicious activity. Modern threat actors are no longer limited to static malware or simple intrusion techniques. Instead, AI-powered campaigns are using adaptive methods that blend into legitimate system behavior, making detection significantly more difficult and forcing defenders to rethink traditional security strategies. 

Threat intelligence research from major technology firms indicates that offensive uses of AI are expanding rapidly. Security teams have observed AI tools capable of bypassing established safeguards, automatically generating malicious scripts, and evading detection mechanisms with minimal human involvement. In some cases, AI-driven orchestration has been used to coordinate multiple malware components, allowing attackers to conduct reconnaissance, identify vulnerabilities, move laterally through networks, and extract sensitive data at machine speed. These automated operations can unfold faster than manual security workflows can reasonably respond. 

What distinguishes these attacks from earlier generations is not the underlying techniques, but the scale and efficiency at which they can be executed. Credential abuse, for example, is not new, but AI enables attackers to harvest and exploit credentials across large environments with only minimal input. Research published in mid-2025 highlighted dozens of ways autonomous AI agents could be deployed against enterprise systems, effectively expanding the attack surface beyond conventional trust boundaries and security assumptions. 

This evolving threat landscape has reinforced the relevance of zero trust principles, which assume no user, device, or connection should be trusted by default. However, zero trust alone is not sufficient. Security operations teams must also be able to detect abnormal behavior regardless of where it originates, especially as AI-driven attacks increasingly rely on legitimate tools and system processes to hide in plain sight. 

As a result, organizations are placing renewed emphasis on network detection and response technologies. Unlike legacy defenses that depend heavily on known signatures or manual investigation, modern NDR platforms continuously analyze network traffic to identify suspicious patterns and anomalous behavior in real time. This visibility allows security teams to spot rapid reconnaissance activity, unusual data movement, or unexpected protocol usage that may signal AI-assisted attacks. 

NDR systems also help security teams understand broader trends across enterprise and cloud environments. By comparing current activity against historical baselines, these tools can highlight deviations that would otherwise go unnoticed, such as sudden changes in encrypted traffic levels or new outbound connections from systems that rarely communicate externally. Capturing and storing this data enables deeper forensic analysis and supports long-term threat hunting. 

Crucially, NDR platforms use automation and behavioral analysis to classify activity as benign, suspicious, or malicious, reducing alert fatigue for security analysts. Even when traffic is encrypted, network-level context can reveal patterns consistent with abuse. As attackers increasingly rely on AI to mask their movements, the ability to rapidly triage and respond becomes essential.  

By delivering comprehensive network visibility and faster response capabilities, NDR solutions help organizations reduce risk, limit the impact of breaches, and prepare for a future where AI-driven threats continue to evolve.

Featured