Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

France’s Break From Microsoft Signals Europe’s Growing Push for Digital Sovereignty


In a move that reflects Europe’s deepening concerns over data sovereignty and foreign technological dependence, France has decided to move its national Health Data Hub away from Microsoft's cloud infrastructure and into the hands of domestic provider Scaleway. The decision marks one of the most significant shifts yet in Europe’s growing effort to reclaim control over sensitive public data. 
 
The Health Data Hub contains medical information relating to millions of French citizens and serves as a major research platform for healthcare analysis and innovation. Since 2019, the system had been hosted on Microsoft Azure, a decision that triggered years of political and legal controversy due to fears surrounding American surveillance laws and extraterritorial access to European data.   
 
French authorities have now selected Scaleway, a subsidiary of Iliad, after an extensive evaluation involving more than 350 technical criteria related to security, resilience, and operational capacity. The migration is expected to be completed between late 2026 and early 2027.   
 

Why Europe Is Growing Wary of American Cloud Giants 

 
The decision is part of a much broader European movement toward what policymakers increasingly describe as “digital sovereignty.” Governments across Europe have become increasingly uneasy about relying on American technology firms for critical infrastructure, especially after repeated debates surrounding the US CLOUD Act, which can compel US companies to provide data to American authorities even if that data is stored overseas.  
 
In France, these concerns intensified after Microsoft reportedly acknowledged before a French Senate inquiry that it could not fully resist certain US government data requests involving French citizens. That revelation significantly strengthened calls for sovereign cloud infrastructure controlled entirely within European legal jurisdiction. The shift also aligns with France’s wider technological repositioning. Earlier this year, the country announced plans to reduce reliance on Microsoft products across government systems, replacing several US-based platforms with domestic or open source alternatives.   
 

A Defining Moment for Europe’s Tech Independence 

 
France’s decision extends beyond healthcare infrastructure as it clearly represents a symbolic turning point in Europe’s evolving relationship with Big Tech. 
 
For years, European nations depended heavily on American cloud providers because of their scale, maturity, and technological dominance. But growing geopolitical tensions, concerns around privacy, and the strategic importance of data have begun reshaping that equation. 
 
By transferring one of its most sensitive national databases to a domestic provider, France is effectively signalling that technological convenience can no longer outweigh sovereignty concerns. The move may now encourage other European governments to reassess where their own critical data resides. 
 
At its core, this is no longer simply a cloud migration story. It is a declaration that, in the age of AI and mass data infrastructure, control over information has become inseparable from national security itself.

Firestarter Malware Persists on Cisco Firewalls Even After Security Updates

 



Cybersecurity authorities in the United States and the United Kingdom have issued a joint alert about a previously undocumented malware strain called Firestarter that is capable of maintaining access on Cisco firewall systems even after updates and security patches are applied.

The malware affects Cisco Firepower and Secure Firewall devices running Adaptive Security Appliance (ASA) or Firepower Threat Defense (FTD) software. Investigators have linked the activity to a threat actor tracked by Cisco Talos as UAT-4356, a group associated with espionage-focused operations, including campaigns such as ArcaneDoor.

According to assessments from the Cybersecurity and Infrastructure Security Agency (CISA) and the UK’s National Cyber Security Centre (NCSC), the attackers likely gained initial entry by exploiting two vulnerabilities. One is an authorization flaw identified as CVE-2025-20333, and the other is a buffer overflow issue tracked as CVE-2025-20362. Both weaknesses could allow unauthorized access to targeted devices.

In one confirmed case involving a U.S. federal civilian executive branch agency, investigators observed a staged intrusion. The attackers first deployed a tool called Line Viper, which operates as a user-mode shellcode loader. This malware was used to establish VPN connections and extract sensitive configuration data from the device, including administrator credentials, certificates, and private cryptographic keys.

After this initial access phase, the attackers introduced the Firestarter backdoor to ensure continued control. CISA noted that while the precise date of the breach has not been verified, the compromise likely occurred in early September 2025, before the agency applied patches required under Emergency Directive 25-03.

Firestarter is designed to maintain persistence. Once installed, it continues functioning across system reboots, firmware upgrades, and security patching. In addition, if its process is terminated, it is capable of restarting itself automatically.

The malware achieves this persistence by integrating with LINA, a core process within Cisco ASA systems. It uses signal-handling mechanisms to detect termination events and trigger routines that reinstall the malware.

A joint technical analysis from CISA and NCSC found that Firestarter modifies the system’s boot configuration by altering the CSP_MOUNT_LIST file, ensuring that it executes during device startup. It also stores a copy of itself within system log directories and restores its executable into a critical system path, allowing it to run silently in the background.

Separate analysis from Cisco Talos indicates that the persistence mechanism is activated when the system receives a process termination signal, such as during a controlled or “graceful” reboot.

The primary function of Firestarter is to act as a backdoor, providing attackers with remote access to compromised devices. It can also execute arbitrary shellcode supplied by the attacker.

This capability is enabled by modifying an internal XML handler within the LINA process and injecting malicious code directly into memory. Execution is triggered through specially crafted WebVPN requests. Once a built-in identifier is validated, the malware loads and executes attacker-provided payloads in memory without writing them to disk. Authorities have not disclosed details about the specific payloads used in observed incidents.

Cisco has released a security advisory outlining mitigation steps, recommended workarounds, and indicators of compromise to help identify infections. The company advises organizations to fully reimage affected devices and upgrade to fixed software versions, regardless of whether compromise has been confirmed.

To check for signs of infection, administrators are instructed to run a diagnostic command that inspects running processes. If any output is returned indicating the presence of a specific process, the device should be treated as compromised.

As an alternative, Cisco noted that performing a complete power shutdown may remove the malware. However, this approach is not recommended because it introduces the risk of database or disk corruption, which could lead to system instability or boot failures.

To assist with detection, CISA has also released two YARA rules that can identify the Firestarter backdoor when analyzing disk images or memory dumps from affected systems.

There is a noticeable change in how attackers approach the network infrastructure. Instead of focusing only on endpoints such as laptops or servers, threat actors are placing long-term implants directly within security appliances that sit at the edge of enterprise networks.

Firestarter introduces a specific operational challenge. Even after vulnerabilities are patched, the implanted malware remains active because it embeds itself within core system processes and startup routines. This separates the persistence mechanism from the original point of entry.

The use of in-memory execution through WebVPN requests also reduces visibility. Since payloads are not written to disk, traditional file-based detection methods may not identify malicious activity.

For defenders, this means that patching alone cannot be treated as confirmation that a system is secure. Additional validation steps are required, including process inspection, firmware integrity checks, and monitoring for abnormal behavior in network appliances.

The incident also reinforces the importance of restricting exposure of management interfaces and ensuring that critical infrastructure devices are continuously monitored, not just periodically updated.

Sri Lanka Finance Ministry Loses $2.5 Million in Cyberattack on Payment System

 

Sri Lanka is trying to recover $2.5 million after a cyberattack on the Finance Ministry’s payment system redirected funds away from their intended recipient, exposing fresh weaknesses in the country’s public financial controls. Officials say the breach involved email manipulation, and the issue surfaced after opposition lawmakers alleged that treasury money had landed in a hacker’s account instead of reaching the correct creditor. The incident has prompted a high-level probe, with authorities treating it as both a financial loss and a serious security breach. 

According to finance ministry secretary Harshana Suriyapperuma, cybercriminals were first detected trying to enter the External Resources Department’s system in January 2026, and the ministry took steps with overseas partners to stop further damage. He said the earlier attempt was contained, but the later payment breach still led to losses that are now under review. The stolen amount formed part of a larger $22.9 million payment, with $2.5 million reportedly disbursed between December 2025 and January 31, 2026. 

The incident has drawn wider attention because it involves government debt repayment funds and an apparent failure in payment verification. Australia’s high commissioner in Sri Lanka said Canberra was aware of irregularities in payments owed to it, and Australian officials are assisting the investigation. That international angle has made the breach more sensitive, since the diverted funds were tied to a sovereign obligation rather than a routine domestic transaction. 

A high-powered committee has been formed to investigate the hacking incident and identify how the payment was rerouted. Opposition lawyers have also asked Parliament to examine the matter, arguing that public finances fall under legislative oversight. The issue has been raised before the Committee on Public Accounts, adding political pressure on the government to explain how the breach happened and whether more funds may have been exposed. 

The episode is a damaging reminder that cyberattacks can hit not just banks and companies but also state payment systems handling international debt obligations. For Sri Lanka, which is still recovering from its severe economic crisis and debt default, even a single diverted payment can deepen concerns about administrative safeguards and digital resilience. The investigation will likely focus on email security, approval controls, and how quickly suspicious payment changes were detected.

ADT Data Breach Confirmed After ShinyHunters Threatens Leak of Stolen Customer Information

 

Now comes word that ADT, a provider of home security systems, suffered a data breach following threats by the hacking collective ShinyHunters to expose purloined records if payment isn’t made. This event joins others recently where attackers gain access via compromised credentials or outside service providers. 

On April 20, the company noticed unusual activity within its systems - response teams moved quickly to limit exposure and launch a review from within. It turned out some customer and prospective customer details were reached and copied by those responsible. Names, contact numbers, and home locations made up most of what was seen; in a few cases, birth dates showed up alongside incomplete identification digits used for tax or government purposes. Though only a narrow collection of files was involved, steps followed to assess how far the breach extended. 

What ADT made clear is that financial details of high sensitivity stayed secure. It turned out bank accounts, credit cards, along with any payment records, remained untouched through the incident. On top of this, home security setups and active monitoring kept running without interference. Evidently, the breach never reached operational systems - only certain data areas felt its effect. After claims surfaced on a hacker forum, ShinyHunters stated they accessed more than 10 million records - some containing personal details and private business files. 
Despite the threat to publish everything unless met with demands, confirmation of the full extent remains unverified by ADT. Still, notification letters have gone out to impacted users during ongoing review efforts. What happens next depends on internal assessments already underway. One claim points to vishing as the starting point - a tactic aimed at one worker. Posing as known contacts, hackers won entry through a company-wide login system. 

Once inside, they navigated sideways into linked environments without immediate detection. Access likely extended to cloud services including Salesforce, where information was pulled from storage. Identity theft now drives many cyber intrusions, moving past old tactics that hunted software bugs. Instead of probing code flaws, hackers aim at sign-in systems like Okta, Microsoft Entra, or Google logins. Breaching one verified profile opens doors to numerous company tools. 

With entry secured, stolen information gets pulled out quietly. That data then becomes leverage - no malware needed to lock files. What happened lately isn’t new for ADT - earlier leaks of staff and client details came out earlier this year. Facing repeated issues, many companies struggle to protect digital identities while handling permissions in linked platforms. 

Still under investigation, the incident highlights how often social engineering now shapes current cyber attacks. Rather than exploiting software flaws, hackers rely on mistakes people make - slipping past defenses by tricking users. 

Because of this shift, training staff to spot risks matters just as much as strong login protections. Preventing future breaches depends less on technology alone, more on understanding human behavior. Awareness becomes a shield when passwords fail.

Sophisticated Scams Surge in 2025, Costing Americans $2.1 Billion

 

Online fraud is evolving rapidly, with scammers employing increasingly sophisticated techniques that have already cost Americans an estimated $2.1 billion in 2025—a number expected to climb further. While social media continues to be the leading platform where scams originate, impersonated phone calls, text messages, and emails remain a major avenue for cybercriminal activity.

In the past, scam attempts were often easy to identify—poorly written emails and far-fetched stories, such as appeals from so-called Nigerian princes, made them obvious to most recipients. Today, however, fraudsters have significantly refined their approach, making their schemes far more convincing.

A recent case highlights how advanced these scams have become. Jennifer Lichthardt was deceived into transferring $40,000 after receiving a call that appeared to come directly from Chase Bank, as reported by ABC Chicago News. The caller ID matched the number listed on the back of her bank card, and the scammers even possessed detailed information about her account, including the exact balance.

Such access to sensitive data is often the result of data breaches—incidents that many people overlook. Personal information is frequently sold on the dark web at surprisingly low prices, allowing scammers to craft highly targeted attacks.

To reduce exposure, individuals can use data removal services like DeleteMe, though no solution is foolproof. Authorities, including the FBI, urge consumers to remain cautious when contacted by anyone claiming to represent banks or government agencies. In Lichthardt’s case, the fraudsters convinced her that her account was compromised internally and instructed her to move her funds into a “secured” account. The money was withdrawn shortly after the transfer.

Because the transaction was authorized by Lichthardt herself, it bypassed traditional security measures. However, awareness of official warnings could have prevented the loss. Financial institutions and government bodies do not request sensitive information or ask customers to transfer funds over phone calls. For example, the IRS does not collect payments via phone, and legitimate banks do not require customers to move money into so-called “secure” accounts.

If you receive such a call, experts recommend ending the conversation immediately and contacting the organization directly using verified contact details, such as those found on official websites or the back of your card. Taking this extra step can be crucial in avoiding becoming the next victim of fraud.

When Screens Turn Against You: The Dark Mechanics of Webcam Sextortion

 

In the dim privacy of a personal screen, where anonymity is often assumed and discretion rarely questioned, a silent threat has begun to take shape. What was once dismissed as a crude bluff has, in certain cases, evolved into something far more tangible. Cybercriminals are increasingly exploiting adult content viewers, using a blend of malware, deception, and psychological manipulation to turn private moments into instruments of blackmail. 
 
Security researchers have identified malware capable of detecting when explicit content is being viewed and quietly activating a device’s camera to capture compromising footage. These recordings, paired with screenshots of on-screen activity, are then transmitted to attackers who weaponise them in what is now widely known as sextortion. However, what makes this threat particularly insidious is the emotional leverage it exploits, more than the technology behind it. Shame, fear, and urgency become tools more powerful than any line of malicious code. 
 

Fear as a Weapon: The Psychology Behind the Scam 

 
Even in cases where no actual recording exists, scammers have perfected the art of persuasion. Victims often receive emails claiming that their devices have been hacked and that their webcam has captured explicit footage. To make the threat believable, attackers sometimes include previously leaked passwords or personal details, creating an illusion of total access.   
 
In reality, many such claims are entirely fabricated. Experts have repeatedly clarified that these messages rely on social engineering rather than real surveillance. The objective is simple. Induce panic, push the victim into silence, and extract payment before reason can intervene.   
 
This strategy has proven alarmingly effective. Large-scale campaigns have generated substantial profits, not through technical sophistication alone, but through an acute understanding of human vulnerability. 
 

Beyond Malware: A Wider Ecosystem of Exploitation 

 
The threat landscape extends well beyond a single strain of malicious software. Adult content platforms, particularly those operating outside regulated ecosystems, have long been fertile ground for cybercrime. Malware disguised as media players or exclusive content continues to lure users into unknowingly compromising their own devices.   
 
At the same time, new variations of these scams are emerging. In some instances, fraudsters pose as law enforcement officials, accusing individuals of viewing illegal material and demanding immediate payment under the threat of legal action.  Taken together, these tactics reveal a broader pattern. The target is the individual behind the device, not just the device. 

Over 80 Organisations Impacted by Phishing Leveraging SimpleHelp and ScreenConnect

 


Researchers have identified a systematic intrusion operation that is utilizing remote management utilities, and recent findings reinforce this shift in phishing campaigns, which have evolved from opportunistic scams to structured intrusion operations. 

Researchers have identified an ongoing campaign that has compromised more than 80 organizations across multiple industries since April 2025, with a significant concentration in the United States. In the operation, malicious software is deliberately used, allowing attackers to establish covert and persistent access under the guise of legitimate administrative activity through the deliberate use of vendor-signed Remote Monitoring and Management software. 

Through the deployment of modified versions of SimpleHelp and ScreenConnect, the threat actors have effectively bypassed conventional security controls, relying on trusted installation workflows initiated by innocent individuals. 

The activity aligns with previously observed clusters tracked by independent security teams, but this latest analysis provides enhanced insight into the campaign's indicators, behavior, and operational sophistication, highlighting a coordinated effort that is extending its reach in a coordinated fashion. 

Securonix analysis, which tracks the VENOMOUS#HELPER activity cluster, shows that the operation has maintained continuous momentum since April 2025, extending its reach beyond the U.S. into Western Europe and Latin America. 

The campaign is distinguished by its calculated use of two Remote Monitoring and Management platforms, SimpleHelp and ScreenConnect both of which are legitimately signed and widely utilized by enterprises. Rather than deploying conventional malware payloads, threat actors employ these trusted tools to embed persistent access within victim systems, effectively blending malicious activity with routine administrative functions in order to achieve effective results. 

By using two RMM solutions in parallel, there is built-in redundancy, which ensures access continues regardless of whether a channel is detected and removed. Although no formal attribution has been established, Securonix concludes that these operational patterns are consistent with financial motivated Initial Access Brokers and early-stage ransomware campaigns, particularly those targeting organizations in economically significant regions. 

The activity cluster, known as VENOMOUS#HELPER, continues to demonstrate significant overlap with threat patterns previously documented by Red Canary and Sophos, whose designation for it is STAC6405, based on these findings. Although its operational characteristics are consistent with financial-driven initial access brokerage or early-stage ransomware enablement, its attribution remains unclear. 

A researcher involved in the investigation indicates that by deploying SimpleHelp and ScreenConnect in customized configurations, the campaign is able to circumvent conventional defensive mechanisms by embedding itself within legitimate administrative workflows, which allows attackers to bypass conventional defensive mechanisms. 

Additionally, a deliberate dual-channel access strategy is used to strengthen the resilience and continuity of control, even if one access vector is identified and neutralised. The intrusion sequence is initiated through a carefully crafted phishing email impersonating the U.S. Social Security Administration, asking recipients to verify their email address and download a purported statement via an embedded link. 

In an attempt to bypass email filtering systems, the link does not redirect victims to an overtly suspicious infrastructure; instead, it redirects victims to a legitimate Mexican business domain that is compromised, but otherwise legitimate. A disguised executable masquerading as an official document is retrieved from a secondary attacker-controlled domain in order to stage the subsequent payload delivery. 

A compromised cPanel account on a legitimate hosting environment was used to create the infrastructure for this purpose. When the JWrapper-packaged Windows binary is executed, it initiates a sequence aimed at ensuring persistence and stability of the application. Windows services are configured to survive Safe Mode conditions and employ a self-healing watchdog mechanism for automatic restoration of execution if terminated. 

Parallel to periodic reconnaissance, the implant queries the root/SecurityCenter2 WMI namespace to enumerate installed security solutions periodically. It is also configured to poll users on a periodic basis in order to monitor user activity. A combination of these behaviors illustrates a high level of technical maturity that is intended to maintain low-visibility access within compromised environments over long periods of time. 

STAC6405 infection chain reveals a methodical, multi-stage delivery framework designed to delay suspicion until execution has been established firmly on the victim computer. In the first stage, the intrusion begins with phishing emails impersonating the U.S. Social Security Administration, informing recipients of the recently released statement and requesting immediate action. 

In place of utilizing attacker-registered infrastructure, the embedded link redirects to a compromised but legitimate Mexican domain, a method designed to circumvent Secure Email Gateway filtering by utilizing the inherent trust that is associated with established .com.mx domains. Users are required to confirm their email addresses on the landing page to proceed with the SSA verification interface. This intermediate harvesting step not only validates the target’s authenticity but also provides attackers with an established communication channel to target them in the future. 

In response to this interaction, victims are seamlessly redirected to an attacker-controlled secondary host where a payload is staged for download. Based on the delivery URL structure, it appears to have been a compromise of a single cPanel account in a shared hosting environment, as indicated by the tilde-prefixed directory names. This report emphasizes the fact that the primary website infrastructure remains intact, with malicious content confined to a subdirectory deliberately named to maintain thematic consistency with the lure involving Social Security. 

To conceal the binary's true nature, the final payload, which is distributed as a Windows executable, takes advantage of default operating system behavior. File extensions are hidden in Explorer, which makes the binary appear legitimate, while JWrapper packaging incorporates customised visual elements such as iconography and splash screens to reinforce the authenticity of the binary. 

At each stage of execution, STAC6405 prioritizes credibility, evasion, and user manipulation in an effort to convey a carefully orchestrated delivery mechanism. The foundation of STAC6405's effectiveness lies in the use of calculated methods to exploit implicit trust in remote administration programs.

In addition, both SimpleHelp and ScreenConnect binaries are signed with Authenticode certificates, issued by globally recognized certificate authorities, which enables them to pass signature-based security checks seamlessly. These binaries are not flagged by traditional antivirus controls, Windows SmartScreen and Mark-of-the-Web protections are effectively neutralized, and endpoint detection mechanisms are forced to make use of behavioral telemetry, such as process lineage, rather than static indicators, such as file hashes, to detect endpoints. 

A network perspective indicates that outbound traffic is blending with legitimate activity by communicating with infrastructure that appears consistent with commercial software usage rather than overt command-and-control mechanisms. A cracked distribution of SimpleHelp, version 5.0.1 compiled in July 2017, aligns with the instance deployed in this campaign, which was widely circulated in underground forums between 2016 and 2019. 

Due to its expiring certificate window and lack of license validation mechanisms, it is highly likely that the tool has been deployed without financial traceability or vendor oversight by threat actors. The foundation supports a dual-RMM architecture that is purposefully engineered to fulfill distinct operational roles while bolstering the persistence of the other tools. 

The SimpleHelp application primarily utilizes UDP and HTTP communications over port 5555 to connect directly to an IP-based command endpoint for automated surveillance, scripted execution, and low visibility control. By contrast, ScreenConnect facilitates interactive, hands-on keyboard access over TCP port 8041 by using a proprietary relay protocol whose domain is controlled by an attacker. 

By separating these channels, not only is operational flexibility enhanced, but a resilient environment is created which ensures that disruption of one channel does not lead to the complete loss of access to the attacker. 

Remote administration capabilities are available through the SimpleHelp deployment, which includes full desktop control through VNC-based interaction, command execution by a virtual terminal bridge, silent session establishment without notification of the user, and privilege escalation mechanisms that bypass conventional user account control prompts. 

A number of additional features further reinforce persistence, including bidirectional file transfer, automated firewall rule modification, remote scripting, and self-healing service restoration. Cross-platform binaries are also indicative of adaptability, as they indicate that the same toolkit can be used on macOS and Linux systems as well, thereby expanding the potential attack surface and maintaining the same operational footprint across the same platforms. 

VENOMOUS#HELPER illustrates a measured shift in adversary tradecraft where stealth, legitimacy, and operational resilience are given greater priority than traditional malware deployments. By integrating themselves within trusted administrative ecosystems and utilizing a dual-RMM framework, operators dissolve the distinction between benign and malicious activity, creating a complex detection and response process. 

There was an intentional effort to circumvent conventional controls at every stage of the intrusion life cycle by means of the campaign's structured delivery chain, abuse of compromised infrastructure, and use of signed binaries. Therefore, defensive strategies based solely on signature detection or known indicators fail to be sufficient in this context.

Organisations, therefore, must reevaluate their security posture toward behavioural analysis, tight control over remote access tools, and continuous monitoring of the relationships between processes and the use of privileges. As threat actors refine these techniques, the campaign is a clear indicator that trusted software is becoming increasingly effective for executing untrusted intent in the cyberspace.

Tropic Trooper Expands Operations with Home Router Attacks and New Targets in Asia




A China-linked advanced persistent threat group known as Tropic Trooper is modifying how it operates, introducing unusual attack methods and expanding both its target base and technical toolkit. Recent observations show the group experimenting with new intrusion paths, including an incident where a victim’s personal home Wi-Fi network became the entry point.

The activity was discussed during a session at Black Hat Asia, where researchers explained that the group is no longer limiting itself to conventional enterprise-focused attacks.

Tropic Trooper, also tracked under names such as Pirate Panda, APT23, Bronze Hobart, and Earth Centaur, has been active since at least 2011. Earlier campaigns primarily focused on sectors including government, military, healthcare, transportation, and high-technology organizations located in Taiwan, the Philippines, and Hong Kong. More recently, analysts identified a separate campaign in the Middle East. Current findings now show that the group is directing efforts toward specific individuals in countries such as Japan, South Korea, and Taiwan, indicating that both its geographic reach and victim selection strategy are expanding.

Researchers from Itochu Cyber & Intelligence noted that one defining characteristic of the group is its willingness to rely on unconventional access techniques. In earlier cases, this included placing fake Wi-Fi access points inside targeted office environments. The group is also known for quickly adopting newly available or open-source malware, which allows it to change its attack chains frequently and complicates tracking efforts. Recent investigations conducted alongside Zscaler confirm that these patterns continue, with multiple new tools and creative delivery mechanisms observed.


Compromise Originating from a Home Router

During the conference session titled “Tropic Trooper Reloaded: Unraveling the Invisible Supply Chain Mystery,” researchers Suguru Ishimaru and Satoshi Kamekawa described a case that initially appeared difficult to trace. The infection chain delivered a Cobalt Strike beacon carrying a watermark value “520,” a marker previously associated with Tropic Trooper activity since 2024.

The affected user had downloaded what appeared to be a legitimate update file named youdaodict.exe for a widely used dictionary application. However, the update package contained two small additional files, one of which was an XML file that triggered the infection. At first, investigators could not determine how the software update itself had been altered.

Further analysis revealed that unauthorized changes had been made to the victim’s home router. Nearly a year later, the same system was compromised again using an identical infection process. This prompted a deeper investigation, which uncovered manipulation of DNS settings tied to the software update process.

Although the domain name and application appeared legitimate, the underlying IP address had been redirected. Researchers traced this manipulation back to the home router, where DNS configurations had been modified to point toward an attacker-controlled server. This technique aligns with what is commonly known as an “evil twin” scenario, where legitimate traffic is silently redirected without the user’s awareness.

This case demonstrates that the group is not limiting itself to corporate environments and is willing to exploit personal infrastructure to reach its targets.


Expansion of Malware and Targeting Strategy

The investigation revealed additional infrastructure linked to the group. Researchers identified a publicly accessible Amazon S3 bucket containing 48 files, including new malware samples and phishing pages designed to imitate authentication interfaces for applications such as Signal.

The evidence suggests that Tropic Trooper is focusing on carefully selected individuals, using tailored decoy content in regions including Japan, Taiwan, and South Korea. This represents a change from earlier campaigns that were more organization-centric.

Because the group occasionally reuses IP addresses and file naming patterns, researchers attempted to reconstruct parts of its command-and-control environment through brute-force techniques. This effort led to the discovery of several encrypted payloads stored as .dat files.

After decrypting these files, analysts identified multiple malware components. These included DaveShell and Donut loader, both open-source tools not previously linked to Tropic Trooper. They also identified Merlin Agent and Apollo Agent, which are remote access trojans written in Go and associated with the Mythic command-and-control framework. In addition, a custom backdoor named C6DOOR was found, also developed using the Go programming language.

At the same time, the group continues to deploy previously known tools. These include the EntryShell backdoor, heavily obfuscated variants of the Xiangoop loader, and the previously mentioned Cobalt Strike beacon with the identifiable watermark.


Parallel Campaigns and Delivery Methods

Researchers from Zscaler’s ThreatLabz team reported a related campaign involving a malicious ZIP archive containing documents designed to resemble military-related material. These files were used to lure Chinese-speaking individuals located in Japan and South Korea.

In this campaign, attackers used a modified version of the SumatraPDF application to install an AdaptixC2 beacon. The infection chain eventually resulted in the deployment of Visual Studio Code on compromised systems, likely to support further malicious activity.


Operational Pattern and Security Implications

Taken together, these findings show that Tropic Trooper is rapidly updating its tools and experimenting with different attack paths while extending its reach across multiple regions. Researchers involved in the Black Hat Asia session stated that recent investigations conducted in 2025 revealed several previously unseen malware families, tools, and decoy materials, offering deeper visibility into the group’s activities.

They also observed increased reliance on open-source components within the attack chain. This approach allows the group to modify its methods quickly without relying entirely on custom-built malware.

The pace at which these changes are being introduced demonstrates that the group can adjust its operations within short timeframes, making detection and defense more difficult for targeted organizations and individuals.


Indirect Prompt Injection: The Hidden AI Threat


Indirect prompt injection is becoming one of the most worrying AI security risks because attackers can hide malicious instructions inside content that an AI system reads and trusts. In plain terms, the AI is not being attacked through the chat box alone; it can also be manipulated through emails, web pages, documents, or other external data it processes. 

The danger is that these hidden prompts can make an AI leak sensitive data, follow malicious commands, or guide users to malicious websites. Security experts note that cybercriminals are already using this technique to push AI systems toward unsafe actions, including executing code and exposing information. That makes the problem more serious than a simple model glitch, because the output can directly affect real-world decisions and user safety. 

A major reason indirect prompt injection works is that many AI systems mix trusted instructions with untrusted content in the same workflow. If the system does not clearly separate what should be obeyed from what should merely be read, the model may treat attacker-controlled text as if it were part of its core task. This is especially risky in agentic tools that can browse, summarize, click links, or take actions on behalf of users. 

Security experts recommend building multiple layers of defense instead of relying on one fix. Common measures include sanitizing input and output, using clear boundaries around external content, enforcing least privilege, and requiring human approval for sensitive actions. Monitoring unusual behavior also helps, such as unexpected tool calls, odd requests, or suspicious links in AI-generated responses. 

For users, the safest habits are simple but important. Give AI tools only the access they truly need, avoid sharing unnecessary personal data, and be cautious when an AI suddenly recommends links, purchases, or requests for sensitive information. If the system starts acting strangely, the session should be stopped and the output verified independently before trusting it.

The broader lesson is that prompt injection is now a practical cybersecurity issue, not a theoretical one. As AI becomes more connected to browsers, inboxes, databases, and business workflows, attackers gain more ways to exploit weak guardrails. Organizations that want to use AI safely will need strict controls, continuous testing, and a security-first design mindset from the start.

Exposed by Design: What 1 Million Open AI Services Reveal About the Future of Cyber Risk

 

The rapid ascent of artificial intelligence, once heralded as the great accelerator of productivity, now casts a long and unsettling shadow, one that reveals not merely innovation, but a profound erosion of foundational security discipline. 

A recent large scale scan of internet facing AI infrastructure has uncovered a reality that is difficult to ignore. Over 1 million exposed AI services across more than 2 million hosts were identified, many of them operating with little to no protection, silently accessible to anyone who knows where to look. This is not a marginal oversight. It is a systemic condition, one that reflects how speed, ambition, and competitive pressure are quietly outpacing prudence. 

The Illusion of Progress: When Innovation Outruns Security 


For decades, the software industry painstakingly evolved toward secure by design principles, including authentication layers, least privilege access, and hardened deployments. Yet, in the fervour surrounding AI, many of these hard earned lessons appear to have been set aside. 

Organizations are increasingly self hosting large language models and AI agents, driven by the promise of efficiency and control. But in doing so, they are deploying systems that are, paradoxically, less secure than legacy software ever was. 

The result is a peculiar contradiction. The most advanced technologies of our time are often protected by the weakest defenses. 

Perhaps the most alarming discovery is deceptively simple. Many AI services have no authentication at all. Fresh installations frequently grant immediate, high level access without requiring credentials. This is not due to sophisticated bypass techniques or unknown exploits. It stems from defaults that were never hardened in the first place. In such environments, attackers simply walk through the front door. 

When Conversations Become Vulnerabilities 


Among the exposed systems were AI chat interfaces that inadvertently revealed complete conversation histories. In enterprise contexts, such data is far from trivial. These exchanges may contain internal operational strategies, infrastructure configurations, proprietary code snippets, and sensitive business queries. 

Even seemingly harmless prompts can, when combined, form a detailed map of an organization’s inner workings. The quiet intimacy of human and machine interaction, once considered private, is thus transformed into a potential intelligence goldmine. A deeper inspection of these systems reveals not isolated mistakes, but recurring design flaws. Applications are often running with elevated privileges. Credentials are sometimes hardcoded into deployment files. Containers are misconfigured and services are left exposed. AI agents operate without sufficient sandboxing. Within days of analysis, researchers were able to identify new vulnerabilities, including risks related to remote code execution, which highlights how immature much of this ecosystem remains. 

These are patterns that repeat across environments. Unlike traditional applications, AI systems often possess extended capabilities. They can execute code, interact with APIs, and manipulate infrastructure. 

When such systems are exposed, the consequences escalate dramatically. A compromised AI agent is not merely a data leak. It can become an active participant in its own exploitation. Weak sandboxing and poorly segmented environments further amplify this risk, allowing attackers to move from one system to another with alarming ease. 

In this sense, AI does not just introduce new vulnerabilities. It magnifies existing ones. This phenomenon does not exist in isolation. Across the cybersecurity landscape, AI is reshaping both offense and defense. Recent analyses indicate that the time required to exploit vulnerabilities has shrunk dramatically, often from years to mere weeks. AI generated phishing and malware are increasing in both scale and sophistication. Even individuals with limited technical expertise can now execute complex attacks. 

The exposed AI services are therefore part of a larger transformation in how cyber risk evolves. 

At the heart of this issue lies a cultural shift. Organizations today operate under relentless pressure to innovate, deploy, and iterate. In this race, security is often treated as a secondary concern rather than a foundational requirement. 

Developers focus on functionality. Businesses focus on speed. Security becomes something to address later, once the system is already live. The irony is difficult to ignore. The very tools designed to enhance efficiency are being deployed in ways that create inefficiencies of far greater consequence, including breaches, downtime, and reputational loss. 

Lessons from the Exposure: What Must Change 


If there is a singular lesson to be drawn, it is this. AI infrastructure must be treated with the same level of rigor as traditional systems, if not more. 

This requires secure default configurations, mandatory authentication and access controls, elimination of hardcoded secrets, proper isolation of AI agents, and continuous monitoring of external attack surfaces. Security cannot remain reactive. In an AI driven world, it must become anticipatory. 

Conclusion: A Turning Point, Not a Footnote 


The exposure of over a million AI services is a warning more than just headlines. It reveals a fragile foundation beneath a rapidly expanding technological landscape. If left unaddressed, these vulnerabilities will not remain theoretical. They will manifest as real world breaches, financial losses, and systemic disruptions. 

Yet within this warning lies an opportunity to pause, to reassess and to restore the balance between innovation and responsibility. In the end, the true measure of technological progress is how wisely we secure what we create.

Mullvad Introduces Optional Fix for iOS VPN Leak Risks While Avoiding Update Glitches

 

Apple’s iOS ecosystem continues to pose distinct challenges for VPN services, particularly due to potential data leaks affecting certain types of traffic. On Tuesday, Mullvad VPN—widely recognized for its strong privacy standards—announced a new solution aimed at addressing this issue. However, the company is allowing users to decide whether to enable it, as the fix may complicate the iOS update process.

Security concerns on iOS include vulnerabilities to leaks and LocalNet attacks, in which attackers imitate trusted nearby Wi-Fi networks, such as those found in cafes. While VPNs can mitigate these risks, doing so requires routing all app data through the VPN. Mullvad’s approach involves enabling an “includeAllNetworks” configuration to enforce this behavior.

Although Mullvad has long been aware of this method, it previously avoided implementing it due to compatibility issues with Apple’s update system. In some cases, this setup could trigger a loop where iOS repeatedly attempts to update the Mullvad app, potentially causing devices to freeze, restart, and retry the update continuously.

The company has now introduced a new setting that activates includeAllNetworks, effectively addressing the leak vulnerability. To prevent update-related issues, Mullvad has made the feature optional and added a safeguard mechanism. When an iOS update is detected, users will receive a notification advising them to temporarily disable the VPN or switch off the includeAllNetworks setting to avoid complications. A representative from Mullvad didn't immediately respond to a request for comment.

Details about the rollout of this feature remain unclear, but Mullvad indicates it will be available soon. The company also cautions that the workaround is not flawless and encourages iOS users to report any instances of device freezing or bricking during updates directly to Apple.

For users exploring VPN options, Mullvad continues to stand out for its focus on advanced privacy measures. The service has incorporated post-quantum encryption to safeguard against future quantum-based threats and has implemented protections against AI-driven traffic analysis. Priced at $5 per month, it remains an affordable choice for privacy-conscious users.

Global Surge in Military Grade Spyware Puts Personal Smartphones at Risk


 

Global cybersecurity discourse is emerging with a growing surveillance threat under the surface as the UK's top cyber authority issues a stark assessment of the unchecked proliferation of commercial spyware capabilities. Initially restricted to tightly regulated law enforcement use, advanced intrusion tools are now widely used across more than 100 countries, able to remotely compromise smartphones, bypass encrypted communications, and covertly activate device sensors. 

NSO Group and an increasingly opaque ecosystem of competitors are driving this rapid expansion, signaling the shift from targeted investigative use to a wider landscape of state-aligned digital intrusion, a shift in which state-aligned cyberattacks are becoming increasingly commonplace. 

In spite of their increasing accessibility and operational stealth, enterprises and operators of critical national infrastructure are not adequately prepared for the scale and sophistication of these threats. There is an evolving threat landscape supporting it, which is supported by the increasing sophistication of modern spyware frameworks, which leverage "zero-click" exploitation chains to gain unauthorized access without requiring the user's involvement. 

NSO Group's Pegasus platform and Paragon's Graphite platform function as highly advanced intrusion suites. They exploit latent vulnerabilities within mobile operating systems to extract sensitive communications, media, geolocation information, and other artifacts through forensic minimalism. 

The commercial dynamics underpinning this ecosystem demonstrate the magnitude of the challenge as well as its persistence. As part of the United States entity list, the Israeli developer NSO Group, widely associated with high-end surveillance tooling, was listed in 2021 for its supply of technologies to foreign governments. These technologies were then utilized to target a wide range of individuals, including government officials, journalists, business leaders, academicians, and diplomats. 

In defending its claims that such capabilities serve legitimate anti-terrorism and law enforcement purposes, the company asserts that it lacks direct visibility into operational use, while retaining the right to terminate client relationships in instances of verified misuse. 

In spite of the rapid expansion of the vendor landscape, NSO Group represents only one node within it. According to industry observers, including Casey, the sector is extremely profitable and is undergoing rapid growth. There are currently dozens of firms offering comparable capabilities in this market. 

According to estimates, more than 100 countries have procured mobile spyware, an increase over earlier assessments, which indicated deployment across more than 80 national jurisdictions. Along with offering a cost-effective shortcut to the development of capabilities that would otherwise require years of development, commercial intrusion platforms offer a fast and easy means for states lacking indigenous cyber expertise.

In addition, the National Cyber Security Centre noted previously that, despite the fact that these tools are intended for law enforcement purposes, there is credible evidence that they have been used on a widespread basis against journalists, human rights defenders, political dissidents, and foreign officials with thousands of individuals being targeted annually. 

Several leaked toolkits, including DarkSword, demonstrate the dispersal of capabilities once restricted to state intelligence agencies into less controlled environments, making it possible for state-aligned and criminal actors to launch attacks by utilizing vectors as inconspicuous as compromised web sessions on unpatched iOS devices. In addition to theoretical risk models, operational exploits are being actively employed against targets who often assume device-level security as the basis of their attack. 

A notable increase in the victim profile is that it includes corporate executives, financial professionals, and organizations dealing with valuable information, as well as journalists and political dissidents. It was highlighted by Richard Horne, the director of the UK's National Cyber Security Centre, that there still remains a significant gap in industry readiness. 

Many enterprises underestimate the capability and operational maturity of these surveillance capabilities. Essentially, this shift illustrates the democratization of offensive cyber tools, where sophisticated surveillance, once monopolized by a few intelligence agencies, is now available to a broader range of state actors lacking native cyber expertise. 

As a result, these capabilities are increasingly available economically and they are unintentionally disseminated, which fundamentally alters the threat equation. Through the transition from tightly controlled assets to commercially traded products, advanced surveillance tools become increasingly difficult to contain as they are propagated through illicit channels, including corrupt procurement practices, insider exfiltration, and secondary resale markets. 

In the wake of this leakage, non-state actors, including organized criminal networks, have acquired capabilities that were previously available only to sovereign intelligence operations. The proliferation of state-linked campaigns, including those attributed to China and focused on large-scale data exfiltration, illustrates the use of such tools not only for immediate intelligence gain, but also to establish strategic prepositioning for future geopolitical conflicts. 

Traditional device-based safeguards and consumer privacy controls are only marginally effective against adversaries equipped with exploit chains developed specifically to circumvent them. International efforts to regulate and oversee exports are gaining momentum, but operational reality suggests that containment may already lag behind proliferation, which enables a significant expansion of attack surfaces across both civilian and enterprise digital environments. 

The convergence of commercial availability, technical sophistication and weak oversight has led to the normalization of capabilities that were once considered exceptional. These developments illustrate a structural shift in the cyber threat environment. 

In conjunction with the widespread adoption of such tools, and their continual evolution and leakage, there is an ongoing need for public and private sectors to assess their security assumptions at a fundamental level. There is no longer a limited need to defend against isolated intrusions for enterprises, critical infrastructure operators, and individual users, but rather to navigate a complex ecosystem where highly advanced surveillance techniques are frequently accessible and increasingly resemble legitimate activity. 

In the absence of strengthened international coordination, enforceable controls, and a corresponding increase in defensive maturity, a continued erosion of digital trust is likely, resulting in compromise becoming not an anomaly, but an expected condition of operating within a hyperconnected environment.

AI Models Surpass Doctors in Emergency Diagnosis, Harvard Study Finds

 




A contemporary study conducted by researchers at Harvard University has revealed that advanced artificial intelligence systems are now capable of exceeding human doctors in both diagnosing medical conditions and determining treatment strategies, including in fast-paced and high-stakes emergency room environments. The research specifically accentuates the potential capabilities of modern AI systems in handling complex clinical reasoning tasks that were traditionally considered exclusive to trained physicians.

The findings, published in the peer-reviewed journal Science, are based on a controlled comparison between OpenAI o1 and experienced attending physicians. To ensure realistic testing conditions, the study used 76 actual emergency department cases sourced from Beth Israel Deaconess Medical Center. These cases were evaluated across multiple stages of the diagnostic process, allowing researchers to assess performance under varying levels of available patient information.

At the earliest stage of patient assessment, commonly referred to as initial triage, where clinicians typically have only limited details about a patient’s condition, the AI model demonstrated a notable advantage. It was able to correctly identify either the exact diagnosis or a closely related condition in 67.1 percent of the cases. In comparison, the two physicians involved in the study achieved accuracy rates of 55.3 percent and 50 percent respectively. This suggests that even with minimal data, the AI system was more effective at narrowing down potential diagnoses.

As the diagnostic process progressed and additional clinical information became available during the emergency room evaluation phase, the model’s performance improved further. Its diagnostic accuracy increased to 72.4 percent, reflecting its ability to refine its conclusions with more context. The physicians also showed improvement at this stage, but their accuracy remained lower, at 61.8 percent and 52.6 percent. This stage is particularly important as it mirrors real-world conditions where doctors continuously update their assessments based on new findings.

In the final phase of care, when patients were admitted either to general hospital wards or intensive care units, the AI model continued to outperform its human counterparts. It achieved an accuracy rate of 81.6 percent, compared to 78.9 percent and 69.7 percent for the physicians. Although the performance gap narrowed slightly at this stage, the AI still maintained a measurable edge, indicating consistency across the full diagnostic timeline.

Beyond identifying illnesses, the study also evaluated how effectively the AI system could design clinical management plans. This included decisions such as selecting appropriate medications, including antibiotics, as well as handling complex and sensitive scenarios like end-of-life care planning. Across five evaluated case studies, the AI achieved a median performance score of 89 percent. In contrast, physicians scored significantly lower, averaging 34 percent when relying on traditional clinical resources and 41 percent when supported by GPT-4. This underlines a substantial gap in structured decision-making support.

The researchers acknowledged that while integrating AI into clinical workflows is often viewed as a high-risk approach due to patient safety concerns, its potential benefits are significant. They noted that wider adoption of such systems could help reduce diagnostic errors, minimize treatment delays, and address disparities in access to healthcare services. These factors collectively contribute to both improved patient outcomes and reduced financial strain on healthcare systems.

At the same time, the study emphasizes that current AI systems are not without limitations. Clinical medicine involves more than text-based data. Doctors routinely rely on non-verbal and non-textual cues, such as observing a patient’s physical discomfort, interpreting imaging results, and making judgment calls based on experience. These aspects are not fully captured by existing AI models, which means human expertise remains essential.

The authors further concluded that large language models have now surpassed many traditional benchmarks used to measure clinical reasoning abilities. However, they stress the urgent need for more detailed research, including real-world clinical trials and studies focused on human-AI collaboration, to determine how these systems can be safely and effectively integrated into healthcare settings.

In comments shared with The Guardian, lead researcher Arjun Manrai clarified that the findings should not be interpreted as suggesting that AI will replace doctors. Instead, he described the results as evidence of a major technological shift that is likely to transform the medical field in the coming years.

From a macro industry perspective, this study reflects a developing trend in which AI is increasingly being used to augment clinical decision-making. However, experts continue to caution that challenges such as data bias, accountability, regulatory oversight, and patient trust must be addressed before such systems can be widely deployed. The future of healthcare, therefore, is likely to involve a collaborative model where AI amplifies efficiency and accuracy, while human doctors provide critical judgment, ethical oversight, and patient-centered care.

Claude Desktop Silently Alters Browser Settings, Even on Uninstalled Browsers

 

Claude Desktop, Anthropic’s standalone AI app for macOS, has come under fire for quietly altering browser‑level settings on users’ machines—even when they have never installed or used certain browsers. Security and privacy researchers have found that the application drops browser‑configuration files across system‑wide directories, effectively pre‑authorizing future browser‑extension links between Claude and Chromium‑based browsers such as Chrome, Edge, Brave, Opera, and others.

Modus operandi 

Upon installation, Claude Desktop generates a Native Messaging manifest and helper binary that register Claude as a trusted “browser host” for several specific Chrome extension IDs. This manifest is placed inside browser‑host folders for multiple Chromium‑based browsers, including some a user may never have installed, meaning a future browser install could immediately grant Claude broad access to page content, form data, and session activity. Anthropic frames this as part of its “agentic” features that let the app automate tasks and interact with the web, but the lack of an explicit opt‑in notification has raised red flags. 

The biggest concern is that these configuration files persist beyond the scope of browsers a user actually runs. Even if a person never uses Chrome or a given Chromium browser, the manifest can already be waiting in the system’s browser‑host directories, pre‑staging a bridge that activates once a corresponding browser and Claude extension are installed. Because the desktop app rewrites these files on every launch, deleting them manually does not permanently remove the hooks unless Claude Desktop itself is uninstalled. 

Privacy and legal reactions 

Privacy experts and commentators have likened this behavior to “spyware‑like” activity, arguing that silently creating browser‑level hooks without clear consent violates the spirit, if not the letter, of privacy regulations such as the EU ePrivacy Directive. Alexander Hanff, a prominent privacy consultant, has explicitly labeled Claude Desktop’s behavior “spyware” and questioned how much of this browser integration is actually documented and disclosed to end users. Critics stress that such integrations should be opt‑in and transparent, rather than buried in vague terms‑of‑service language most users never read. 

For macOS users who have installed Claude Desktop, experts recommend reviewing whether they actually need the browser‑integration features and, if not, uninstalling the app entirely to remove lingering manifest files and host binaries. Some guides suggest manually cleaning native‑messaging‑host folders for various Chromium browsers and then restarting the browser after removal, although this is only effective if the desktop app is also gone. Until Anthropic adds clearer, upfront consent prompts and the option to disable or remove these hooks, users concerned about privacy should treat Claude Desktop’s browser integration as a potential risk and handle it accordingly.

npm Supply Chain Attack Spreads Worm Malware Stealing Developer Secrets Across Compromised Packages

 

Worry grows within the cybersecurity community following discovery of a fresh supply chain threat aimed at the npm platform, where self-replicating malicious code infiltrates public software libraries to harvest confidential information from coders. Though broad consumer impact seems minimal, investigators at Socket and StepSecurity confirm the assault specifically targets niche development setups - environments often overlooked in typical breach patterns. 

Detection came after unusual network activity flagged automated systems, leading analysts to trace payloads back to tampered dependencies uploaded under legitimate project names. Unlike older variants that rely on user interaction, this version activates silently once installed, transmitting credentials to remote servers without visible signs. Researchers emphasize the sophistication lies not in complexity but timing: attacks unfold during build processes, evading standard runtime checks. 

From initial samples, it appears attackers maintain persistence by chaining exploits across multiple packages. Investigation continues into whether source repositories were breached directly or if hijacked maintainer accounts allowed upload privileges. Not far behind the initial breach, several packages tied to Namastex Labs began showing suspicious behavior. One after another, altered forms of @automagik/genie, pgserve, and similar tools appeared online without warning. 

What started as isolated reports now points to a wider pattern unfolding quietly. Though some tainted releases have been pulled, fresh variants continue turning up unexpectedly. Danger comes from how the code spreads itself automatically. Right after a package installs, it acts like a worm - starting fast, grabbing key details from the system it hits. Things such as API tokens show up on the list, along with SSH keys, cloud login info, and hidden codes used in software build tools, containers, or AI setups. 

Off it goes, sending what it finds to servers run by attackers. Despite lacking conclusive proof, analysts observe patterns matching past operations tied to TeamPCP. Similarities emerge in how malware activates upon installation, grabs login details, and uses distributed infrastructure for spreading code and storing stolen data. What makes this malware more than just a thief is how it pushes outward without pause. 

Once inside, it hunts for npm login details and identifies which libraries the developer can upload. Harmful scripts are then inserted and republished, turning trusted tools into hidden entry points. If Python credentials appear, the same process spreads into PyPI. Not just traditional systems are at risk - crypto-linked holdings face exposure too, with data targeted from tools like MetaMask and Phantom. One weak spot in a developer’s setup can ripple outward, showing how quickly risks spread across software ecosystems.

Hackers Target Cloud Apps Using Phone Scams and Login Tricks



Cybersecurity researchers have identified two threat groups that are executing fast-moving attacks almost entirely within software-as-a-service environments, allowing them to operate with very little visible trace of intrusion.

The groups, tracked as Cordial Spider and Snarky Spider, are also known by multiple alternate identifiers across different security vendors. Investigations show that both groups are involved in high-speed data theft followed by extortion attempts, and their methods show a strong overlap in how operations are carried out. Analysts assess that these groups have been active since at least October 2025. One of them is believed to be composed of native English speakers and is linked to a cybercrime network widely referred to as “The Com.”

According to findings from CrowdStrike, these attackers primarily rely on voice phishing, also known as vishing, to initiate their intrusions. In these cases, individuals are contacted and guided toward fraudulent login pages that are designed to imitate single sign-on systems. These pages act as adversary-in-the-middle setups, meaning they intercept and capture authentication data, including login credentials and session details, as the victim enters them. Once this information is obtained, attackers immediately use it to access SaaS applications that are connected through single sign-on integrations.

Researchers explain that the attackers deliberately operate within trusted SaaS platforms to avoid raising suspicion. Because their activity takes place inside legitimate services already used by organizations, their presence generates fewer detectable signals. This allows them to move quickly from initial compromise to data access. The combination of speed, targeted execution, and reliance on SaaS-only environments makes it harder for defenders to monitor and respond effectively.

Earlier research published in January 2026 by Mandiant revealed that these attack patterns represent a continuation of tactics seen in extortion-focused campaigns linked to the ShinyHunters group. These operations involve impersonating IT staff during phone calls to build trust with victims, then directing them to phishing pages in order to collect both login credentials and multi-factor authentication codes.

More recent analysis from Palo Alto Networks Unit 42 and the Retail & Hospitality ISAC indicates, with moderate confidence, that one of the identified clusters is associated with The Com network. These attacks rely heavily on living-off-the-land techniques, where attackers use legitimate system tools instead of introducing malware. They also make use of residential proxy networks to mask their real geographic location and to evade basic IP-based security filtering systems.

Since February 2026, activity linked to one of these clusters has been directed toward organizations in the retail and hospitality sectors. The attackers combine vishing calls, often impersonating IT help desk personnel, with phishing websites designed to capture employee credentials.

Once access is established, the attackers take steps to maintain long-term control. They register a new device within the compromised account to ensure continued access, and in many cases remove previously registered devices. After doing so, they modify email settings by creating inbox rules that automatically delete notifications related to new device logins or suspicious activity, preventing the legitimate user from being alerted.

Following initial access, the attackers shift their focus toward accounts with higher privileges. They collect internal information, such as employee directories, to identify individuals with elevated access and then use further social engineering techniques to compromise those accounts as well. With increased privileges, they move across SaaS platforms including Google Workspace, HubSpot, Microsoft SharePoint, and Salesforce, searching for sensitive documents and business-critical data. Any valuable information is then exfiltrated to infrastructure controlled by the attackers.

Researchers note that in many observed cases, the stolen credentials provide access to the organization’s identity provider, which acts as a central authentication system. This creates a single entry point into multiple SaaS applications. By exploiting the trust relationships between the identity provider and connected services, attackers are able to move across the organization’s cloud ecosystem without needing to compromise each application separately. This allows them to access multiple systems using a single authenticated session.