<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Application Security &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/application-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 10 Apr 2026 09:35:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Application Security &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Fake Messaging Apps Used to Deliver ProSpy Spyware</title>
		<link>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/</link>
					<comments>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 09:35:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11582</guid>

					<description><![CDATA[<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as <strong>ProSpy</strong>, aimed primarily at journalists, activists, and political figures.</p>



<h2 class="wp-block-heading"><strong>Social Engineering and Delivery Tactics</strong></h2>



<p>The attack typically begins with direct contact. Victims are approached through platforms like LinkedIn, email, or messaging apps by accounts posing as journalists, support staff, or known contacts. These interactions are carefully crafted to build trust before introducing a malicious link.</p>



<p>The link is usually presented as something urgent or relevant, such as a video call request, shared document, or account alert. Once clicked, victims are redirected either to fake login pages or download portals.</p>



<p>Common tactics used:</p>



<ul class="wp-block-list">
<li>Impersonation of trusted individuals or organizations</li>



<li>Spearphishing messages tailored to the target</li>



<li>Fake login pages mimicking services like email or cloud platforms</li>



<li>Malicious download links disguised as secure communication tools</li>
</ul>



<p>This approach relies heavily on human trust rather than technical exploitation, making it highly effective even against cautious users.</p>



<h2 class="wp-block-heading"><strong>Fake Apps and Spyware Capabilities</strong></h2>



<p>The core of the campaign is the use of fake Android applications that appear to be secure messaging tools. These apps are distributed through convincing websites that mimic official sources and offer “enhanced” or “pro” versions of popular platforms.</p>



<p>Once installed, the spyware operates silently in the background, collecting and transmitting sensitive data to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="472" height="325" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png" alt="" class="wp-image-11583" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2-300x207.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png 472w" sizes="(max-width: 472px) 100vw, 472px" /><figcaption class="wp-element-caption">ProSpy searches for backup files from third-party applications and exfiltrates them (Source: Lookout).<br></figcaption></figure>



<p>Key capabilities include:</p>



<ul class="wp-block-list">
<li>Access to contacts, messages, and call-related data</li>



<li>Collection of device information and stored files</li>



<li>Extraction of documents, media, and backup data</li>



<li>Continuous communication with remote command servers</li>
</ul>



<p>The malware is designed to blend in as a legitimate app, making detection difficult for users who install it outside official app stores.</p>



<h2 class="wp-block-heading"><strong>Broader Implications</strong></h2>



<p>This campaign highlights a growing trend where attackers combine social engineering with mobile spyware to conduct surveillance operations. The targeting of civil society groups suggests a shift toward more personalized and contract-driven espionage activities.</p>



<p>It also reinforces a critical point: even advanced threats often rely on simple entry points — convincing a user to trust and install something that appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</title>
		<link>https://firsthackersnews.com/cups-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/cups-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:15:04 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#CUPS]]></category>
		<category><![CDATA[#CUPSVulnerabilities]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#LinuxSecurity]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#PrivilegeEscalation]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#RootAccess]]></category>
		<category><![CDATA[#SecurityFlaws]]></category>
		<category><![CDATA[#SecurityRisk]]></category>
		<category><![CDATA[#ServerSecurity]]></category>
		<category><![CDATA[#SystemSecurity]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11569</guid>

					<description><![CDATA[<p>The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cups-vulnerabilities/">CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to execute code and potentially gain full control over affected systems. </p>



<p>Since the print scheduler operates with elevated privileges, it becomes an attractive target for exploitation, especially in environments where print services are exposed over a network.</p>



<h3 class="wp-block-heading">Remote Code Execution Risk</h3>



<p>One of the identified issues enables attackers to execute code remotely on systems that expose shared print queues without authentication. The flaw originates from improper handling of print job inputs, where specially crafted data can bypass validation checks.</p>



<p>By injecting malicious input into print job parameters, an attacker can manipulate how the system processes configurations. This can result in the execution of unauthorized programs through the print service, effectively giving attackers control over the affected machine under the print service context.</p>



<p>This risk is particularly concerning for systems that allow anonymous access to shared printers, as it removes a key barrier to exploitation.</p>



<h3 class="wp-block-heading">Privilege Escalation to Root</h3>



<p>A second vulnerability allows local users with minimal privileges to escalate their access to full system control. This attack leverages weaknesses in how temporary printers are created and validated within the system.</p>



<p>An attacker can trick the system into granting elevated privileges during the printer setup process, then exploit a timing gap to redirect operations toward sensitive system files. By doing so, they can overwrite critical files and gain root-level access.</p>



<p>This type of attack is especially dangerous because it works even in default configurations, meaning no special setup is required beyond initial access to the system.</p>



<h3 class="wp-block-heading">Security Recommendations</h3>



<p>While fixes are in progress, organizations should take immediate precautions. Disabling external access to print services can significantly reduce exposure. Where shared printing is necessary, enforcing authentication is essential.</p>



<p>Additionally, running the print service within security frameworks such as AppArmor or SELinux can help contain potential damage by limiting what the service is allowed to access or modify.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cups-vulnerabilities/">CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cups-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</title>
		<link>https://firsthackersnews.com/linkedin-data-scanning/</link>
					<comments>https://firsthackersnews.com/linkedin-data-scanning/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 06:09:20 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalPrivacy]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#linkedin]]></category>
		<category><![CDATA[#OnlinePrivacy]]></category>
		<category><![CDATA[#PrivacyIssues]]></category>
		<category><![CDATA[#PrivacyMatters]]></category>
		<category><![CDATA[#PrivacyRisk]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#Surveillance]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11564</guid>

					<description><![CDATA[<p>A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linkedin-data-scanning/">LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn. The report, referred to as “BrowserGate,” alleges that the platform deploys hidden code capable of scanning user systems to identify installed software and browser extensions, without transparent disclosure or explicit user consent.</p>



<h3 class="wp-block-heading">Overview of the Findings</h3>



<p>The investigation indicates that this activity is directly tied to identifiable user profiles. Given that LinkedIn accounts are built on real-world identities, including professional roles and organizational affiliations, the collected data is inherently non-anonymous and can be mapped to individuals and enterprises.</p>



<p>The report further suggests that the platform can detect a wide range of browser extensions, some of which may indirectly reveal sensitive attributes such as personal interests, behavioral patterns, or professional intent. In particular, the tracking of job-search-related tools introduces a risk of exposing users who are actively exploring new employment opportunities.</p>



<p>Key observations include:</p>



<ul class="wp-block-list">
<li>Alleged system-level scanning without explicit consent mechanisms</li>



<li>Absence of clear disclosure within publicly available privacy documentation</li>



<li>Ability to infer sensitive personal and professional information through extension detection</li>



<li>Monitoring of a large number of job-related tools used by professionals</li>
</ul>



<p>Such practices, if confirmed, could raise compliance concerns under the General Data Protection Regulation, which imposes strict requirements on the collection and processing of sensitive personal data.</p>



<h3 class="wp-block-heading">Competitive Intelligence and Market Implications</h3>



<p>Beyond individual privacy risks, the report outlines potential implications in the context of competitive intelligence. It alleges that LinkedIn can detect the use of third-party sales and prospecting tools, including platforms such as Apollo, Lusha, and ZoomInfo.</p>



<p>By correlating tool usage with user identities, the platform could theoretically derive insights into competitor adoption, customer segmentation, and enterprise tool preferences. The report also claims that such intelligence has been leveraged in enforcement actions targeting users of external tools.</p>



<p>Notable findings include:</p>



<ul class="wp-block-list">
<li>Detection and monitoring of a broad range of competing commercial tools</li>



<li>Significant expansion in the number of tracked third-party applications over time</li>



<li>Use of internal infrastructure, including the “Voyager” API, with limited visibility in regulatory disclosures</li>



<li>Allegations of targeted actions against users leveraging non-native tools</li>
</ul>



<p>These concerns intersect with obligations under the Digital Markets Act, under which LinkedIn has been designated as a gatekeeper. While limited APIs were introduced as part of compliance efforts, the report suggests these interfaces are not representative of the platform’s full operational scope.</p>



<h3 class="wp-block-heading">Use of Tracking Technologies</h3>



<p>The investigation also highlights the integration of external tracking mechanisms within LinkedIn’s web environment. It alleges that invisible elements sourced from HUMAN Security are used to deploy cookies without user visibility. Additionally, encrypted scripts associated with Google, along with proprietary fingerprinting techniques, are reported to execute during routine page interactions.</p>



<p>These components are said to operate passively in the background, contributing to continuous data collection without direct user awareness.</p>



<h3 class="wp-block-heading">Closing Perspective</h3>



<p>If substantiated, the findings outlined in the BrowserGate report point to a potentially sophisticated and opaque data collection framework operating within a widely trusted professional platform. The implications extend beyond individual privacy, touching on regulatory compliance, competitive fairness, and transparency in large-scale digital ecosystems.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linkedin-data-scanning/">LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/linkedin-data-scanning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious “ChatGPT Ad Blocker” Extension Steals User Data</title>
		<link>https://firsthackersnews.com/chatgpt-ad-blocker-malware/</link>
					<comments>https://firsthackersnews.com/chatgpt-ad-blocker-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 10:05:33 +0000</pubDate>
				<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#AdBlockerMalware]]></category>
		<category><![CDATA[#AIPrivacy]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#ChatGPTMalware]]></category>
		<category><![CDATA[#ChatGPTSecurity]]></category>
		<category><![CDATA[#ChromeExtension]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataTheft]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MaliciousExtension]]></category>
		<category><![CDATA[#ThreatAlert]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11551</guid>

					<description><![CDATA[<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It pretends to be a helpful tool designed to remove ads, but instead, it quietly collects sensitive data from ChatGPT sessions.</p>



<p>The extension takes advantage of user curiosity around ads in AI platforms, using a familiar name to appear trustworthy. Once installed, it monitors activity without interrupting the user experience, making it difficult to notice anything unusual.</p>



<p>It captures prompts, responses, and related metadata while continuing to behave like a normal extension on the surface.</p>



<h3 class="wp-block-heading">Behind the Operation</h3>



<p>After installation, the extension runs silently in the background and maintains persistence through scheduled activity. It regularly connects to a remote configuration hosted on GitHub, allowing attackers to change how it behaves without requiring any update from the user side.</p>



<p>When a user visits ChatGPT, the extension injects hidden scripts into the webpage. Instead of performing any ad-blocking function, it extracts the content of the page by removing styling and media elements while preserving the actual text of conversations.</p>



<p>This data is then compiled into a file and transmitted externally through a Discord webhook controlled by the attacker. The process is automated, meaning stolen conversations are continuously delivered without user awareness.</p>



<p>Investigators also observed suspicious activity linked to the developer account behind the extension. After years of inactivity, the account suddenly became active again, shifting focus toward JavaScript-based behavior. The same developer is connected to other AI-related services, raising broader concerns around data exposure.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">What This Means for Users</h3>



<ul class="wp-block-list">
<li>Conversations on ChatGPT can be silently captured</li>



<li>Prompts, responses, and session data are exposed</li>



<li>Data is sent to external servers without visibility</li>



<li>Remote control allows attackers to modify behavior anytime</li>



<li>Associated services may carry similar risks</li>
</ul>



<p>This incident shows how easily malicious tools can blend into everyday usage. Even simple extensions can operate quietly in the background while collecting valuable data.</p>



<p>Being cautious with browser extensions, especially those linked to popular platforms, is essential. Trust should not be based on names or claims alone, but on verified sources and transparency.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chatgpt-ad-blocker-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ClickFix Variant Bypasses Detection Using Rundll32 &#038; WebDAV</title>
		<link>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/</link>
					<comments>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 19:09:57 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#ClickFix]]></category>
		<category><![CDATA[#ClickFixVariant]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DetectionBypass]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Rundll32]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#WebDAV]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11539</guid>

					<description><![CDATA[<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking a smarter route than before. Earlier variants relied heavily on PowerShell or mshta, which many security tools already watch closely. This time, attackers are using built-in Windows tools like rundll32.exe and WebDAV to stay under the radar and avoid early detection.</p>



<p>Instead of obvious scripting activity, the attack blends into normal system behavior. This makes it harder for security teams to notice anything suspicious during the initial stages.</p>



<h2 class="wp-block-heading"><strong>How the Attack Tricks Users</strong></h2>



<p>ClickFix still depends on social engineering. The attacker lures users to a fake website that looks like a CAPTCHA verification page. One such example is “healthybyhillary[.]com.”</p>



<figure class="wp-block-image size-full"><img decoding="async" width="903" height="534" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image.png" alt="" class="wp-image-11540" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-300x177.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-768x454.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image.png 903w" sizes="(max-width: 903px) 100vw, 903px" /><figcaption class="wp-element-caption">Phishing Website (Source – CyberProof)</figcaption></figure>



<p>The page guides the user through a simple-looking process:</p>



<ul class="wp-block-list">
<li>Press <strong>Win + R</strong> to open the Run dialog</li>



<li>Paste a pre-copied command using <strong>Ctrl + V</strong></li>



<li>Hit <strong>Enter</strong> to execute it</li>
</ul>



<p>To an average user, this feels like a normal verification step. But in reality, it triggers a malicious command that starts the infection process.</p>



<h2 class="wp-block-heading"><strong>How It Evades Detection</strong></h2>



<p>Once executed, the attack uses rundll32.exe along with WebDAV to pull a malicious DLL from a remote server. Since rundll32.exe is a trusted Windows tool, this activity often appears legitimate.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="825" height="858" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png" alt="" class="wp-image-11541" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-288x300.png 288w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-768x799.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png 825w" sizes="(max-width: 825px) 100vw, 825px" /><figcaption class="wp-element-caption">Attack Chain  (Source – CyberProof)<br></figcaption></figure>



<p>A few key techniques make this variant harder to detect:</p>



<ul class="wp-block-list">
<li>Uses <strong>WebDAV</strong> to fetch remote files like a network share</li>



<li>Executes DLL functions using <strong>ordinal numbers (#1)</strong> instead of readable names</li>



<li>Avoids early use of PowerShell to bypass common detection rules</li>



<li>Runs most of the attack <strong>in memory</strong>, leaving minimal traces on disk</li>
</ul>



<p>After the initial stage, PowerShell is used quietly with flags like <strong>-NoP</strong> and <strong>-NonI</strong>, along with <strong>IEX (Invoke-Expression)</strong> to load additional payloads.</p>



<p>The final payload, known as <strong>SkimokKeep</strong>, includes advanced evasion methods:</p>



<ul class="wp-block-list">
<li>Resolves system functions using <strong>hashing instead of direct imports</strong></li>



<li>Checks for sandbox or VM environments before running</li>



<li>Uses anti-debugging tricks like timing checks</li>



<li>Injects code into legitimate processes such as browsers</li>
</ul>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>This shift is significant because many defenses are still focused on detecting script-based attacks. By abusing trusted Windows components and reducing visible activity, attackers get a much quieter entry point.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>What Security Teams Should Watch</strong></h2>



<p>To detect or prevent this attack, organizations should focus on unusual system behavior rather than just scripts:</p>



<ul class="wp-block-list">
<li>Monitor suspicious use of <strong>rundll32.exe</strong>, especially with WebDAV-related arguments</li>



<li>Enable <strong>command-line logging</strong> for system binaries (LOLBins)</li>



<li>Restrict or monitor <strong>WebDAV traffic over port 80</strong></li>



<li>Block known malicious IPs and domains linked to the campaign</li>



<li>Educate users about <strong>fake CAPTCHA pages and ClickFix tricks</strong></li>
</ul>



<p>This variant shows how attackers continue to adapt. The real risk isn’t just the malware itself—it’s how easily users can be convinced to launch it.</p>



<h2 class="wp-block-heading"><strong>Block Known Malicious Infrastructure</strong></h2>



<p>Security teams should proactively block known indicators linked to this campaign to reduce exposure:</p>



<ul class="wp-block-list">
<li><strong>178.16.53[.]137</strong></li>



<li><strong>141.98.234[.]27</strong></li>



<li><strong>46.149.73[.]60</strong></li>



<li><strong>91.219.23[.]245</strong></li>
</ul>



<p>Suspicious domains to watch or block:</p>



<ul class="wp-block-list">
<li><strong>mer-forgea.sightup[.]in[.]net</strong></li>



<li><strong>data-x7-sync.neurosync[.]in[.]net</strong></li>
</ul>



<p>You can place this section right after the “What Security Teams Should Watch” section so it flows naturally as an action step.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</title>
		<link>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/</link>
					<comments>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 07:07:44 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#APM]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CVE202553521]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EdgeSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#F5BIGIP]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfrastructureSecurity]]></category>
		<category><![CDATA[#KEV]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#RCE]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityUpdates]]></category>
		<category><![CDATA[#ThreatActors]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11526</guid>

					<description><![CDATA[<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified vulnerability in F5 BIG-IP systems is now under active exploitation, prompting urgent warnings from the Cybersecurity and Infrastructure Security Agency. The flaw, tracked as CVE-2025-53521, has been added to the Known Exploited Vulnerabilities catalog, highlighting its real-world impact and immediate risk to organizations.</p>



<p>Tracked as <strong>CVE-2025-53521</strong>, the flaw impacts the Access Policy Manager (APM) component and could allow remote code execution. While detailed technical information has not yet been fully disclosed, the nature of the vulnerability makes it particularly dangerous. BIG-IP devices often sit at the edge of networks, handling authentication, traffic management, and secure application delivery — making them a prime target for attackers seeking initial access.</p>



<p>CISA’s decision to add this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog is a clear indicator that organizations cannot afford to delay response. This is not a theoretical risk — threat actors are already leveraging it. Historically, similar vulnerabilities in BIG-IP systems have been quickly adopted by both financially motivated attackers and advanced threat groups because compromising these devices can provide deep visibility and control over network traffic.</p>



<h3 class="wp-block-heading">Why This Vulnerability Matters</h3>



<p>What makes this issue more concerning is the potential ease of exploitation. Even without full public disclosure, vulnerabilities that enable remote code execution are often rapidly weaponized. Once exploited, attackers can move laterally across the network, escalate privileges, and potentially access sensitive data.</p>



<p>Edge infrastructure like BIG-IP plays a critical role in enterprise environments. When such systems are compromised, they can act as a gateway for broader attacks. This aligns with a growing trend where attackers focus on perimeter devices rather than traditional endpoints, as these systems offer higher impact with less resistance.</p>



<h3 class="wp-block-heading">Immediate Actions for Security Teams</h3>



<p>Organizations using F5 BIG-IP products should treat this vulnerability as a high-priority security event and respond without delay.</p>



<p>• Apply vendor-provided patches or mitigation steps immediately<br>• If fixes are unavailable, restrict or temporarily disable affected services<br>• Continuously monitor logs for unusual administrative actions or configuration changes<br>• Enforce strict access controls and reduce unnecessary exposure<br>• Implement network segmentation to limit potential spread after compromise</p>



<p>In addition to these steps, security teams should remain vigilant for evolving attack techniques, as exploitation methods may become more sophisticated over time.</p>



<h3 class="wp-block-heading">Final Thoughts</h3>



<p>The rapid inclusion of CVE-2025-53521 in the KEV catalog highlights an ongoing shift in attacker strategy — targeting critical infrastructure components that sit at the heart of enterprise networks. Organizations must move beyond reactive security and adopt a proactive approach that prioritizes visibility, rapid patching, and strong access controls.</p>



<p>Delaying action in cases like this significantly increases the risk of widespread compromise. For organizations relying on BIG-IP systems, the message is clear: act fast, monitor closely, and assume attackers are already attempting to exploit this weakness.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/">Active Exploitation of F5 BIG-IP Vulnerability Raises Urgency</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/f5-big-ip-vulnerability-active-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical BIND 9 Vulnerabilities Require Immediate Attention</title>
		<link>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/</link>
					<comments>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 16:31:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#ACLBypass]]></category>
		<category><![CDATA[#BIND9]]></category>
		<category><![CDATA[#CVE]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DNS]]></category>
		<category><![CDATA[#DNSVulnerability]]></category>
		<category><![CDATA[#DoS]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#ServerCrash]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11508</guid>

					<description><![CDATA[<p>The Internet Systems Consortium (ISC) has disclosed three new vulnerabilities in BIND 9, a widely used DNS software.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/">Critical BIND 9 Vulnerabilities Require Immediate Attention</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Internet Systems Consortium (ISC) has disclosed three new vulnerabilities in BIND 9, a widely used DNS software. These issues can allow attackers to bypass access controls, overload system resources, or even crash DNS servers if left unpatched.</p>



<p>Announced on March 25, 2026, the vulnerabilities impact both authoritative servers and DNS resolvers, making them a serious concern for organizations relying on BIND 9 for critical network operations. Administrators are strongly advised to apply patches immediately to avoid service disruption or unauthorized access.</p>



<h2 class="wp-block-heading"><strong>CVE Breakdown and Security Impact</strong></h2>



<p>The most severe issue, <strong>CVE-2026-1519 (CVSS 7.5 &#8211; High)</strong>, can lead to a Denial of Service. It is triggered when a resolver performs DNSSEC validation on a specially crafted zone, causing excessive NSEC3 processing. This results in high CPU usage and significantly reduces the server’s ability to handle queries. While disabling DNSSEC validation can reduce the impact, it is not recommended as it weakens security.</p>



<p>The second issue, <strong>CVE-2026-3119 (CVSS 6.5 &#8211; Medium)</strong>, can cause the BIND “named” process to crash. This happens when handling a valid query containing a TKEY record. However, exploitation requires access to a trusted TSIG key already configured on the server. As a temporary measure, administrators should review and remove any unnecessary or potentially compromised TSIG keys.</p>



<p>The third vulnerability, <strong>CVE-2026-3591 (CVSS 5.4 &#8211; Medium)</strong>, is related to improper memory handling in SIG(0) processing. A crafted DNS request can lead to incorrect ACL checks, potentially allowing unauthorized access in environments where permissive access rules are used. There are no effective workarounds for this issue, making patching essential.</p>



<h2 class="wp-block-heading"><strong>Affected Versions and Fixes</strong></h2>



<p>These vulnerabilities impact multiple BIND 9 versions, including:</p>



<ul class="wp-block-list">
<li>9.11.0 to 9.16.50</li>



<li>9.18.0 to 9.18.46</li>



<li>9.20.0 to 9.20.20</li>



<li>9.21.0 to 9.21.19</li>
</ul>



<p>To address these issues, ISC has released patched versions:</p>



<ul class="wp-block-list">
<li>9.18.47</li>



<li>9.20.21</li>



<li>9.21.20</li>
</ul>



<p>Users of the BIND Supported Preview Edition should also apply the relevant S1 patches immediately.</p>



<p>At the time of disclosure, there are no confirmed reports of active exploitation. However, due to the potential impact on DNS infrastructure, organizations should prioritize updates, verify their deployed versions, and ensure proper monitoring to reduce risk.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/">Critical BIND 9 Vulnerabilities Require Immediate Attention</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/bind-9-vulnerabilities-dos-acl-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Mirai Botnets Now Driving DDoS and Proxy Abuse</title>
		<link>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/</link>
					<comments>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 15:08:45 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#BotnetActivity]]></category>
		<category><![CDATA[#Botnets]]></category>
		<category><![CDATA[#C2Servers]]></category>
		<category><![CDATA[#CyberAttacks]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DDoS]]></category>
		<category><![CDATA[#DDoSAttack]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#IoTBotnet]]></category>
		<category><![CDATA[#IoTSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#Mirai]]></category>
		<category><![CDATA[#MiraiBotnet]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#ProxyAbuse]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11502</guid>

					<description><![CDATA[<p>Mirai botnets are rapidly evolving into powerful platforms used for large-scale DDoS attacks and proxy abuse across IoT</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/">Mirai Botnets Now Driving DDoS and Proxy Abuse</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Mirai botnets are rapidly evolving into powerful platforms used for large-scale DDoS attacks and proxy abuse across IoT and mobile devices.</p>



<p>Researchers observed over 21,000 command-and-control (C2) servers between July and December 2025. Along with this growth, attackers are increasingly using infected devices as residential proxies, not just for DDoS attacks.</p>



<p>This rise also aligns with a surge in massive DDoS campaigns. Reports highlight “hyper-volumetric” attacks, including one reaching 31.4 Tbps, showing how far these botnets have evolved. At the same time, botnet activity has sharply increased after a period of stability, indicating a renewed wave of large-scale operations.</p>



<h2 class="wp-block-heading"><strong>Evolution of Mirai-Based Botnets</strong></h2>



<p>Mirai first appeared in 2016, targeting internet-connected devices such as routers and IoT systems that often rely on weak or default credentials. Once compromised, these devices are added to a botnet that can launch high-volume traffic floods across multiple layers.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="750" height="686" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-5.png" alt="" class="wp-image-11503" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-5-300x274.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-5.png 750w" sizes="auto, (max-width: 750px) 100vw, 750px" /><figcaption class="wp-element-caption">Top regions hosting botnet C2 infrastructure (Source: Spamhaus).<br></figcaption></figure>



<p>The public release of Mirai’s source code played a major role in its growth. It allowed attackers to create multiple variants, each adding new capabilities while keeping the core attack techniques intact.</p>



<p>One well-known variant, Satori, rapidly spread by exploiting vulnerabilities in routers, especially through command injection flaws. It used automated scripts to download and execute malware across different device architectures, allowing infections to scale quickly without user interaction.</p>



<h2 class="wp-block-heading">Expanding Capabilities and Abuse Techniques</h2>



<p>Modern Mirai botnets are no longer limited to DDoS attacks. They are now being used in more advanced and flexible ways, increasing their overall impact.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1000" height="563" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-6.png" alt="" class="wp-image-11504" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-6-300x169.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-6-768x432.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-6.png 1000w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /><figcaption class="wp-element-caption">Botnets used in brute-force attacks (Source: Spamhaus).<br></figcaption></figure>



<p>Key capabilities seen in recent campaigns include:</p>



<ul class="wp-block-list">
<li>Large-scale DDoS attacks reaching record-breaking volumes</li>



<li>Use of infected devices as residential proxy networks</li>



<li>Automated exploitation of IoT vulnerabilities</li>



<li>Multi-architecture malware deployment for wider coverage</li>



<li>Stealthier operations to avoid detection</li>
</ul>



<h2 class="wp-block-heading">Aisuru-Kimwolf Expanding DDoS and Proxy Abuse</h2>



<p>Newer botnet families like Aisuru and Kimwolf have taken Mirai-based threats to the next level. These botnets are now used not only for massive DDoS attacks but also as residential proxy networks that can be rented for cybercrime activities.</p>



<p>Security reports have linked Aisuru-Kimwolf to extremely large attacks, including one reaching 31.4 Tbps. These attacks often generate massive traffic with billions of packets per second, using random patterns to avoid basic detection and filtering systems.</p>



<p>At the same time, Kimwolf, which targets Android devices, is being used to exploit residential proxy services. Attackers use these networks to access internal systems, infect devices like smart TVs and smartphones, and then sell that access for activities such as fraud and credential stuffing.</p>



<h2 class="wp-block-heading">Ongoing Threat and Defensive Focus</h2>



<p>Law enforcement and tech companies have started taking action against these botnets by targeting their command-and-control infrastructure and disrupting the platforms used to manage proxy networks.</p>



<p>However, these efforts have not fully stopped the threat. Mirai-based botnets continue to survive and grow because many devices remain unpatched, especially routers and Android systems. Attackers can also quickly rebuild their infrastructure after disruptions.</p>



<p>For defenders, the focus should remain on strong basic security practices:</p>



<ul class="wp-block-list">
<li>Keep routers and IoT devices updated</li>



<li>Monitor unusual outbound traffic</li>



<li>Secure Android and edge devices</li>



<li>Track indicators linked to Mirai variants</li>
</ul>



<p>As these botnets continue to evolve, they are becoming more powerful and more versatile, combining large-scale disruption with stealthy abuse of network access.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/">Mirai Botnets Now Driving DDoS and Proxy Abuse</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</title>
		<link>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/</link>
					<comments>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 19:24:57 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Web application security]]></category>
		<category><![CDATA[#AppleDevices]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DarkSword]]></category>
		<category><![CDATA[#ExploitChain]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#iOSExploit]]></category>
		<category><![CDATA[#iOSVulnerability]]></category>
		<category><![CDATA[#iPhoneRisk]]></category>
		<category><![CDATA[#iPhoneSecurity]]></category>
		<category><![CDATA[#KernelExploit]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#SafariExploit]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11498</guid>

					<description><![CDATA[<p>DarkSword iOS exploit is now drawing serious attention after researchers confirmed that the advanced exploit chain is no</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-exploit-leaked-online/">DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>DarkSword iOS exploit is now drawing serious attention after researchers confirmed that the advanced exploit chain is no longer limited to its original operators.</strong><br> This development raises serious concerns because it means a highly sophisticated exploit is no longer restricted to a limited group of attackers.</p>



<p>A recent demonstration by security researcher @matteyeux showed successful kernel read and write access on an iPad mini 6 running iOS 18.6.2 using the DarkSword exploit. This public validation shows that the exploit remains effective in real-world conditions and increases the risk for millions of Apple devices that have not yet been patched.</p>



<p>Google Threat Intelligence Group reportedly first observed DarkSword in active campaigns in November 2025. The exploit kit has been mainly linked to UNC6353, a suspected Russian espionage group that previously used the Coruna iOS exploit kit. Reported targets have included victims in Ukraine, Saudi Arabia, Turkey, and Malaysia, showing that the threat has already been used in focused international operations.</p>



<h2 class="wp-block-heading">Technical Structure and Post-Compromise Activity</h2>



<p>DarkSword is not just a single exploit but a complete exploit kit and infostealer written in JavaScript. The attack typically begins when a victim visits a compromised website containing a malicious iframe, a method commonly associated with watering hole attacks.</p>



<p>Once the target opens the page, the exploit escapes Safari’s WebContent sandbox. It then bypasses important Apple protections, including Trusted Path Read-Only and Pointer Authentication Codes, by abusing sensitive internal dyld structures in writable stack memory. The chain then moves through the GPU process by exploiting an out-of-bounds write flaw in the ANGLE graphics engine before targeting the XNU kernel through a Copy-On-Write vulnerability in the AppleM2ScalerCSCDriver driver.</p>



<p>This gives attackers arbitrary memory read and write access, allowing them to modify sandbox restrictions and reach protected parts of the file system. Researchers also found that DarkSword operates fully in memory and quickly loads final-stage malware after compromise. Three malware families linked to the activity have been identified as GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER. These payloads are designed to steal sensitive data, including secure messages, saved credentials, and cryptocurrency wallet information.</p>



<h2 class="wp-block-heading">Security Response and Protection Measures</h2>



<p>The public validation of DarkSword by independent researchers significantly increases the overall threat level. Once a working exploit chain becomes accessible beyond its original operators, the chances of wider abuse rise sharply.</p>



<p>The command-and-control infrastructure used in these operations adds to the concern. Instead of using obvious malicious domains, attackers relied on subdomains created on compromised legitimate websites, helping their traffic blend in and making detection harder.</p>



<p>To reduce risk, Apple users and enterprise security teams should ensure that all devices are updated immediately to iOS 26.1 or later, as these versions include fixes for the kernel vulnerabilities involved in the exploit chain. For high-risk users such as journalists, executives, and government personnel, enabling Apple’s Lockdown Mode can provide an additional layer of defense against advanced web-based attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-exploit-leaked-online/">DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical NetScaler Flaws Put ADC and Gateway Systems at Risk</title>
		<link>https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/</link>
					<comments>https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 07:41:51 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#ADC]]></category>
		<category><![CDATA[#Citrix]]></category>
		<category><![CDATA[#CitrixNetScaler]]></category>
		<category><![CDATA[#CVE20263055]]></category>
		<category><![CDATA[#CVE20264368]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetScaler]]></category>
		<category><![CDATA[#NetScalerVulnerabilities]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#SecurityAdvisory]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11494</guid>

					<description><![CDATA[<p>Cloud Software Group has released a critical security advisory for customer-managed NetScaler ADC and NetScaler Gateway deployments. The</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/">Critical NetScaler Flaws Put ADC and Gateway Systems at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cloud Software Group has released a critical security advisory for customer-managed NetScaler ADC and NetScaler Gateway deployments. The bulletin highlights two important vulnerabilities, including critical NetScaler vulnerabilities, that could expose systems to serious attacks.</p>



<p>The flaws are tracked as <strong>CVE-2026-3055</strong> and <strong>CVE-2026-4368</strong>. One can allow attackers to read sensitive data from memory, while the other may lead to session handling issues and unauthorized access. Both are examples of significant NetScaler vulnerabilities.</p>



<p>Administrators are advised to update affected systems as soon as possible.</p>



<p>Addressing these NetScaler vulnerabilities is crucial for maintaining the security of your network.</p>



<h2 class="wp-block-heading"><strong>What Is CVE-2026-3055?</strong></h2>



<p><strong>CVE-2026-3055</strong> is the more serious of the two vulnerabilities. It has a <strong>CVSS v4.0 score of 9.3</strong>, which makes it critical.</p>



<p>This flaw is caused by improper input validation, which can lead to an <strong>out-of-bounds memory read</strong>. In simple terms, an attacker may be able to read sensitive information stored in the memory of the appliance.</p>



<p>This issue affects systems only when the NetScaler ADC or Gateway is configured as a <strong>SAML Identity Provider (IdP)</strong>. If SAML IdP is not enabled, the system is not exposed to this specific flaw.</p>



<h2 class="wp-block-heading"><strong>What Is CVE-2026-4368?</strong></h2>



<p>The second issue, <strong>CVE-2026-4368</strong>, is rated high severity with a <strong>CVSS v4.0 score of 7.7</strong>.</p>



<p>This vulnerability is caused by a <strong>race condition</strong>. It can result in a <strong>session mixup</strong>, where one user’s session may be wrongly assigned or exposed to another user. In some situations, this could affect administrative or normal user sessions.</p>



<p>A system is at risk only if it is configured as:</p>



<ul class="wp-block-list">
<li><strong>AAA virtual server</strong></li>



<li><strong>NetScaler Gateway</strong></li>
</ul>



<p>Gateway deployments that may be affected include:</p>



<ul class="wp-block-list">
<li><strong>SSL VPN</strong></li>



<li><strong>ICA Proxy</strong></li>



<li><strong>Clientless VPN (CVPN)</strong></li>



<li><strong>RDP Proxy</strong></li>
</ul>



<h2 class="wp-block-heading"><strong>Affected NetScaler Versions</strong></h2>



<p>According to the advisory, the vulnerabilities affect only <strong>customer-managed NetScaler environments</strong>. Citrix-managed cloud services and Adaptive Authentication are not affected because they are updated automatically.</p>



<p>The impacted versions include:</p>



<ul class="wp-block-list">
<li><strong>NetScaler ADC and Gateway 14.1 before 14.1-66.59</strong> for CVE-2026-3055</li>



<li><strong>NetScaler ADC and Gateway 14.1-66.54</strong> for CVE-2026-4368</li>



<li><strong>NetScaler ADC and Gateway 13.1 before 13.1-62.23</strong> for CVE-2026-3055</li>



<li><strong>NetScaler ADC FIPS and NDcPP before 13.1-37.262</strong> for CVE-2026-3055</li>
</ul>



<h2 class="wp-block-heading"><strong>Patched Versions</strong></h2>



<p>Cloud Software Group recommends upgrading affected systems immediately to the latest secure builds.</p>



<p>The patched versions are:</p>



<ul class="wp-block-list">
<li><strong>14.1-66.59</strong></li>



<li><strong>13.1-62.23</strong></li>



<li><strong>13.1-37.262</strong> for FIPS and NDcPP editions</li>
</ul>



<p>Updating to these versions is the best way to reduce the risk.</p>



<h2 class="wp-block-heading"><strong>How to Check If Your System Is Exposed</strong></h2>



<p>Administrators can review their NetScaler configuration files to see whether the vulnerable features are enabled.</p>



<p>To check for exposure to <strong>CVE-2026-3055</strong>, search for:</p>



<ul class="wp-block-list">
<li><strong>add authentication samlIdPProfile</strong></li>
</ul>



<p>This helps confirm whether the appliance is configured as a <strong>SAML IdP</strong>.</p>



<p>To check for exposure to <strong>CVE-2026-4368</strong>, search for:</p>



<ul class="wp-block-list">
<li><strong>add authentication vserver</strong> for AAA virtual servers</li>



<li><strong>add vpn vserver</strong> for Gateway configurations</li>
</ul>



<p>If these entries are present, the appliance may be exposed depending on how it is configured.</p>



<p>These vulnerabilities are important because they affect systems that often handle authentication, remote access, and sensitive network traffic. A successful attack could expose confidential data or allow session-related abuse.</p>



<p>Organizations using customer-managed NetScaler ADC or Gateway appliances should review their configurations and apply updates without delay.</p>



<h2 class="wp-block-heading"><strong>Final Thoughts</strong></h2>



<p>The newly disclosed NetScaler vulnerabilities show why timely patching and configuration review remain critical for network security. Since these flaws can impact sensitive sessions and memory handling, administrators should act quickly to secure affected appliances.</p>



<p>For organizations running exposed NetScaler services, delaying updates could increase the risk of compromise.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/">Critical NetScaler Flaws Put ADC and Gateway Systems at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/netscaler-vulnerabilities-adc-gateway/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
