<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber threat &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/cyber-threat/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Sun, 03 May 2026 21:10:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Cyber threat &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Trellix Confirms Source Code Repository Breach</title>
		<link>https://firsthackersnews.com/trellix-security-breach/</link>
					<comments>https://firsthackersnews.com/trellix-security-breach/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 03 May 2026 21:09:42 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[#BlueTeam]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityBreach]]></category>
		<category><![CDATA[#securityincident]]></category>
		<category><![CDATA[#SOC]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Trellix]]></category>
		<category><![CDATA[#XDR]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11686</guid>

					<description><![CDATA[<p>Cybersecurity firm Trellix has disclosed that attackers gained unauthorized access to a portion of its internal source code</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/trellix-security-breach/">Trellix Confirms Source Code Repository Breach</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity firm Trellix has disclosed that attackers gained unauthorized access to a portion of its internal source code repository. The company identified the activity and quickly initiated an incident response, bringing in external forensic experts and notifying law enforcement.</p>



<p>Source code environments are considered high-value targets because they reveal the inner workings of security products. Even limited access can give attackers insights into detection logic, configurations, or potential weaknesses that could be studied for future exploitation or used in supply chain-style attacks.</p>



<h2 class="wp-block-heading"><strong>Investigation Findings and Potential Risks</strong></h2>



<p>Trellix has stated that the breach appears contained and, at this stage, there is no evidence of direct impact on customers or product integrity.</p>



<p>Key findings so far include:</p>



<ul class="wp-block-list">
<li>No compromise of the build, release, or update pipeline</li>



<li>No signs of malicious code being inserted into products</li>



<li>No evidence of active exploitation using the accessed data</li>
</ul>



<p>However, the nature of source code exposure still raises concerns. Attackers could analyze the code offline to identify vulnerabilities, reverse-engineer protections, or develop evasion techniques against Trellix security tools.</p>



<p>The company is continuing a detailed forensic review to understand how the access occurred, what data was viewed or copied, and whether any long-term risks remain. Strengthening internal controls, access monitoring, and repository protections is likely part of the ongoing response.</p>



<p>This incident reflects a broader trend where attackers target software vendors instead of end users, aiming to gain leverage through trusted platforms. Similar breaches involving Microsoft, Okta, and LastPass show how valuable internal systems have become as entry points.</p>



<p>Trellix has committed to transparency and plans to release more technical details once the investigation is complete, helping the wider security community understand and defend against similar threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/trellix-security-breach/">Trellix Confirms Source Code Repository Breach</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/trellix-security-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Flags Axios npm Hack in Supply Chain Attack</title>
		<link>https://firsthackersnews.com/axios-npm-hack/</link>
					<comments>https://firsthackersnews.com/axios-npm-hack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 07:01:39 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#AxiosNpmHack]]></category>
		<category><![CDATA[#AxiosSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DevSecOps]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#JavaScriptSecurity]]></category>
		<category><![CDATA[#MalwareAttack]]></category>
		<category><![CDATA[#Nodejs]]></category>
		<category><![CDATA[#NpmSecurity]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SoftwareSecurity]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11617</guid>

					<description><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) has warned about a serious supply chain attack involving the popular</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/axios-npm-hack/">CISA Flags Axios npm Hack in Supply Chain Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity and Infrastructure Security Agency (CISA) has warned about a serious supply chain attack involving the popular Axios npm package, highlighting the potential for an axios npm hack.</p>



<p>Axios is a widely used JavaScript library that helps developers handle HTTP requests in both Node.js and browsers. Because it is used in so many projects, this axios npm hack can affect a large number of applications and development systems.</p>



<p>The attack took place on March 31, 2026, when hackers compromised two versions of Axios — 1.14.1 and 0.30.4. When developers installed these versions, a hidden malicious package called “plain-crypto-js” was automatically included without their knowledge, demonstrating the dangers of an axios npm hack.</p>



<p>This package acts as a loader. It connects to attacker-controlled servers and downloads additional malware. One of the main threats is a Remote Access Trojan (RAT), which allows attackers to gain control over infected machines.</p>



<p>If a developer’s system is affected, attackers can quietly steal sensitive data such as source code, environment variables, and credentials. They can also move deeper into company systems, including CI/CD pipelines, which increases the overall risk.</p>



<h2 class="wp-block-heading"><strong>What You Should Do Immediately</strong></h2>



<p>CISA recommends that organizations review their systems for any recent Axios updates. If the affected versions were installed, quick action is important.</p>



<p>Teams should downgrade to safe versions like 1.14.0 or 0.30.3 and remove the malicious “plain-crypto-js” package from their projects. It is also important to rotate all sensitive credentials, including API keys, SSH keys, and access tokens.</p>



<p>Monitoring network activity is another key step. Any unusual outbound connections should be investigated, and security scans should be run to ensure no hidden threats remain.</p>



<h2 class="wp-block-heading"><strong>How to Prevent Similar Attacks</strong></h2>



<p>This incident highlights how software supply chain attacks are becoming more advanced. Many of these attacks take advantage of default package manager settings that automatically install dependencies.</p>



<p>To reduce risk, organizations should strengthen their security practices. Enabling strong authentication for developer accounts can prevent unauthorized access. Disabling automatic script execution during installations can also block malicious behavior.</p>



<p>It is also a good practice to avoid using newly published packages without proper verification. Monitoring systems for unusual activity, such as unexpected processes or unknown network connections, can help detect threats early.</p>



<p>By taking these precautions, organizations can better protect their development environments from future attacks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/axios-npm-hack/">CISA Flags Axios npm Hack in Supply Chain Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/axios-npm-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>W3LL Phishing Kit Takedown Disrupts MFA Bypass Campaign</title>
		<link>https://firsthackersnews.com/w3ll-phishing-kit/</link>
					<comments>https://firsthackersnews.com/w3ll-phishing-kit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 10:25:18 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[#AccountTakeover]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#FBI]]></category>
		<category><![CDATA[#FraudPrevention]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MFABypass]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#PhishingToolkit]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityBreach]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#W3LL]]></category>
		<category><![CDATA[#W3LLPhishingKit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11592</guid>

					<description><![CDATA[<p>The FBI Atlanta Field Office, in collaboration with Indonesian law enforcement, has taken down a large-scale global phishing</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/w3ll-phishing-kit/">W3LL Phishing Kit Takedown Disrupts MFA Bypass Campaign</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The FBI Atlanta Field Office, in collaboration with Indonesian law enforcement, has taken down a large-scale global phishing operation linked to the W3LL toolkit. This joint effort marks a major milestone, as it is the first coordinated action between the United States and Indonesia targeting a phishing kit developer.</p>



<p>The operation focused on the W3LL phishing kit, a tool widely used by cybercriminals to steal credentials and bypass multi-factor authentication. Attackers used this kit to carry out large-scale fraud attempts, with losses estimated to exceed $20 million.</p>



<h2 class="wp-block-heading">How the W3LL Phishing Kit Worked</h2>



<p>The W3LL toolkit was designed to make cybercrime easier, even for low-skilled attackers. It was sold as a service, allowing buyers to quickly launch phishing campaigns using ready-made fake login pages that closely mimicked legitimate websites.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>What made this tool especially dangerous was its ability to go beyond simple credential theft. Instead of just capturing usernames and passwords, it also collected session data and authentication tokens. This allowed attackers to bypass MFA protections and gain ongoing access to accounts without raising immediate alerts.</p>



<p>The ecosystem also included an underground marketplace called W3LLSTORE. This platform enabled criminals to buy and sell stolen credentials, corporate access, and remote connections, creating a full cybercrime supply chain.</p>



<ul class="wp-block-list">
<li>Over 25,000 compromised accounts were sold between 2019 and 2023</li>



<li>More than 17,000 victims were targeted globally in recent campaigns</li>



<li>Fraud attempts exceeded $20 million</li>



<li>Stolen access was often resold multiple times for profit</li>
</ul>



<h2 class="wp-block-heading">Law Enforcement Action and Impact</h2>



<p>Even after the original marketplace shut down, the operation continued through private channels. Investigators tracked its evolution and identified the key individuals behind it.</p>



<p>With support from U.S. authorities, the FBI seized critical infrastructure used to run the phishing service. At the same time, Indonesian police arrested the suspected developer and took control of domains linked to the operation.</p>



<p>Officials described the platform as more than just a phishing kit—it functioned as a complete cybercrime service. By shutting it down, authorities have disrupted a major tool that attackers relied on to breach organizations.</p>



<p>This takedown highlights how modern phishing has evolved into organized, scalable operations—and why international cooperation is essential to combat today’s cyber threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/w3ll-phishing-kit/">W3LL Phishing Kit Takedown Disrupts MFA Bypass Campaign</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/w3ll-phishing-kit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Messaging Apps Used to Deliver ProSpy Spyware</title>
		<link>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/</link>
					<comments>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 09:35:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11582</guid>

					<description><![CDATA[<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as <strong>ProSpy</strong>, aimed primarily at journalists, activists, and political figures.</p>



<h2 class="wp-block-heading"><strong>Social Engineering and Delivery Tactics</strong></h2>



<p>The attack typically begins with direct contact. Victims are approached through platforms like LinkedIn, email, or messaging apps by accounts posing as journalists, support staff, or known contacts. These interactions are carefully crafted to build trust before introducing a malicious link.</p>



<p>The link is usually presented as something urgent or relevant, such as a video call request, shared document, or account alert. Once clicked, victims are redirected either to fake login pages or download portals.</p>



<p>Common tactics used:</p>



<ul class="wp-block-list">
<li>Impersonation of trusted individuals or organizations</li>



<li>Spearphishing messages tailored to the target</li>



<li>Fake login pages mimicking services like email or cloud platforms</li>



<li>Malicious download links disguised as secure communication tools</li>
</ul>



<p>This approach relies heavily on human trust rather than technical exploitation, making it highly effective even against cautious users.</p>



<h2 class="wp-block-heading"><strong>Fake Apps and Spyware Capabilities</strong></h2>



<p>The core of the campaign is the use of fake Android applications that appear to be secure messaging tools. These apps are distributed through convincing websites that mimic official sources and offer “enhanced” or “pro” versions of popular platforms.</p>



<p>Once installed, the spyware operates silently in the background, collecting and transmitting sensitive data to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="472" height="325" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png" alt="" class="wp-image-11583" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2-300x207.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png 472w" sizes="(max-width: 472px) 100vw, 472px" /><figcaption class="wp-element-caption">ProSpy searches for backup files from third-party applications and exfiltrates them (Source: Lookout).<br></figcaption></figure>



<p>Key capabilities include:</p>



<ul class="wp-block-list">
<li>Access to contacts, messages, and call-related data</li>



<li>Collection of device information and stored files</li>



<li>Extraction of documents, media, and backup data</li>



<li>Continuous communication with remote command servers</li>
</ul>



<p>The malware is designed to blend in as a legitimate app, making detection difficult for users who install it outside official app stores.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>Broader Implications</strong></h2>



<p>This campaign highlights a growing trend where attackers combine social engineering with mobile spyware to conduct surveillance operations. The targeting of civil society groups suggests a shift toward more personalized and contract-driven espionage activities.</p>



<p>It also reinforces a critical point: even advanced threats often rely on simple entry points — convincing a user to trust and install something that appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious npm Package Impersonates Gemini to Steal AI Tokens</title>
		<link>https://firsthackersnews.com/fake-gemini-npm-package/</link>
					<comments>https://firsthackersnews.com/fake-gemini-npm-package/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:57:53 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#APITokenTheft]]></category>
		<category><![CDATA[#CodeSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#FakePackage]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MaliciousPackage]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Nodejs]]></category>
		<category><![CDATA[#NpmSecurity]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#SoftwareSupplyChain]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11574</guid>

					<description><![CDATA[<p>Attackers are actively targeting developers by distributing a malicious npm package disguised as a tool for validating AI</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-gemini-npm-package/">Malicious npm Package Impersonates Gemini to Steal AI Tokens</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are actively targeting developers by distributing a malicious npm package disguised as a tool for validating AI tokens. The package pretends to be مرتبط with Google Gemini but is designed to quietly steal sensitive data from systems using popular AI development tools.</p>



<h3 class="wp-block-heading">How the Malicious Package Operates</h3>



<p>The fake package was uploaded under a seemingly legitimate name and presented as a utility for checking AI tokens. However, several warning signs were overlooked. The documentation was copied from an unrelated project, indicating a lack of authenticity, and the package structure was crafted to appear credible at first glance.</p>



<p>Once installed, the package connects to a remote server hosted on Vercel to fetch additional hidden code. Instead of storing malicious files on disk, it executes payloads directly in memory, making detection significantly harder.</p>



<p>Key behaviors observed:</p>



<ul class="wp-block-list">
<li>Contacts a remote endpoint to download and execute hidden scripts</li>



<li>Uses obfuscation to hide command-and-control (C2) details</li>



<li>Executes payloads in memory to bypass traditional security tools</li>



<li>Disguises itself with legitimate-looking files and dependencies</li>
</ul>



<p>Even after the main package was removed, related packages from the same source remain active and continue to be downloaded.</p>



<h3 class="wp-block-heading">Multi-Stage Malware Capabilities</h3>



<p>Further analysis revealed that the payload is not a simple script but a modular backdoor with multiple capabilities running in parallel. Each module performs a specific malicious function, allowing attackers to maintain control and extract valuable data.</p>



<p>Core functionalities include:</p>



<ul class="wp-block-list">
<li>Remote access module enabling attackers to control the infected system</li>



<li>Credential theft targeting browsers and cryptocurrency wallets</li>



<li>File exfiltration scanning for sensitive documents and configuration files</li>



<li>Clipboard monitoring to capture copied data such as keys or passwords</li>
</ul>



<p>The malware uses advanced obfuscation techniques, making it difficult to analyze. Its structure and behavior closely resemble known backdoors, particularly those linked to sophisticated threat campaigns.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">Focus on AI Development Environments</h3>



<p>The malicious code actively searches for folders linked to widely used AI tools such as Cursor, Claude, Gemini CLI, Windsurf, PearAI, and Eigent. These directories often store API keys, authentication tokens, and even conversation histories.</p>



<p>By extracting this data, attackers can misuse paid AI services, access proprietary code, and potentially pivot deeper into enterprise systems using additional credentials like SSH keys or cloud access tokens.</p>



<p>Key risks include:</p>



<ul class="wp-block-list">
<li>Theft of API keys and AI service tokens</li>



<li>Exposure of sensitive prompts and development data</li>



<li>Unauthorized use of paid AI platforms</li>



<li>Increased risk of broader infrastructure compromise</li>
</ul>



<h3 class="wp-block-heading">Detection and Defensive Measures</h3>



<p>From a defensive standpoint, visibility into unusual outbound traffic is critical. Monitoring connections to external infrastructure, especially uncommon endpoints, can help identify suspicious package behavior early.</p>



<p>Security teams can also leverage threat hunting techniques to detect patterns associated with multi-process Node.js malware and unusual communication channels such as Socket.IO-based command-and-control traffic.</p>



<p>Recommended actions:</p>



<ul class="wp-block-list">
<li>Monitor and restrict unnecessary outbound network connections</li>



<li>Watch for abnormal Node.js process activity</li>



<li>Identify unusual file access in developer environments</li>



<li>Use threat hunting queries to detect similar attack patterns</li>
</ul>



<h3 class="wp-block-heading">Securing Developer Workflows</h3>



<p>This campaign reflects a broader trend of supply chain attacks targeting developer ecosystems, particularly those involving AI tools. As these tools become deeply integrated into workflows, they also become high-value targets.</p>



<p>Developers should treat AI-related directories with the same level of sensitivity as critical folders like .ssh or cloud configuration paths. Before installing any package, it is essential to verify its authenticity, review its dependencies, and examine any unusual installation behavior.</p>



<p>Early reporting of suspicious packages and increased awareness within the developer community can significantly reduce the impact of such threats.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td class="has-text-align-left" data-align="left">Type</td><td class="has-text-align-left" data-align="left">Value</td><td class="has-text-align-left" data-align="left">Purpose</td></tr><tr><td class="has-text-align-left" data-align="left">Download URL</td><td class="has-text-align-left" data-align="left">server-check-genimi.vercel[.]app/defy/v3</td><td class="has-text-align-left" data-align="left">Malicious domain serving OtterCookie</td></tr><tr><td class="has-text-align-left" data-align="left">Download Token</td><td class="has-text-align-left" data-align="left">logo</td><td class="has-text-align-left" data-align="left">HTTP bearer token</td></tr><tr><td class="has-text-align-left" data-align="left">C2 IP Address</td><td class="has-text-align-left" data-align="left">216.126.237[.]71:4891 (AS14956 – RouterHosting LLC)</td><td class="has-text-align-left" data-align="left">RAT/C2</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Port</td><td class="has-text-align-left" data-align="left">4896</td><td class="has-text-align-left" data-align="left">File exfiltration</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Port</td><td class="has-text-align-left" data-align="left">4899</td><td class="has-text-align-left" data-align="left">Credential Theft</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Endpoint</td><td class="has-text-align-left" data-align="left">/api/service/makelog</td><td class="has-text-align-left" data-align="left">Initial connection containing victim fingerprinting info</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Endpoint</td><td class="has-text-align-left" data-align="left">/api/service/process</td><td class="has-text-align-left" data-align="left">C2 command output reporting</td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-gemini-npm-package/">Malicious npm Package Impersonates Gemini to Steal AI Tokens</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fake-gemini-npm-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NoVoice: A Silent Rootkit Campaign Targeting Android Users</title>
		<link>https://firsthackersnews.com/novoice-android-malware/</link>
					<comments>https://firsthackersnews.com/novoice-android-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 09:43:11 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#GooglePlay]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#NoVoice]]></category>
		<category><![CDATA[#ThreatIntel]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11546</guid>

					<description><![CDATA[<p>A newly discovered Android threat called NoVoice Android malware highlights how advanced malware can quietly spread through trusted</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/novoice-android-malware/">NoVoice: A Silent Rootkit Campaign Targeting Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly discovered Android threat called NoVoice Android malware highlights how advanced malware can quietly spread through trusted platforms like Google Play. This campaign was found hiding inside more than 50 apps that appeared completely normal, including utility tools, casual games, and gallery apps.</p>



<p>These applications worked as expected, which helped them avoid suspicion and gain user trust. Before they were removed, they reached over 2.3 million downloads, exposing a large number of users.</p>



<p>The campaign mainly targets older Android devices by exploiting 22 known vulnerabilities that were originally patched between 2016 and 2021. Devices running outdated versions, especially Android 7 and below, are at the highest risk because they no longer receive security updates.</p>



<h3 class="wp-block-heading">Stealthy Entry Through Legitimate Apps</h3>



<p>The attack begins when a user installs one of the infected apps and opens it. Everything appears normal, but hidden code is triggered in the background during the app’s startup process.</p>



<p>To remain undetected, these apps request minimal permissions and include common frameworks like Firebase, analytics tools, and social SDKs. This helps them blend in with legitimate applications.</p>



<p>The initial malicious payload is hidden inside what looks like a normal image file. In reality, the image contains encrypted data attached to it. Once executed, the app extracts and decrypts this payload directly in memory, leaving very little trace behind.</p>



<p>The malware then runs a series of checks to avoid detection. It looks for emulators, debugging tools, VPNs, proxies, and even uses geofencing to skip certain regions. Only after passing these checks does it connect to its command-and-control server.</p>



<h3 class="wp-block-heading">Modular Payload and Deep System Control</h3>



<p>After connecting to its server, the malware downloads additional components disguised as harmless files. These components are customized based on the infected device.</p>



<p>It collects detailed information such as device model, kernel version, installed apps, and security patch level. Based on this, it selects the most effective exploit to gain control.</p>



<p>Once successful, the attackers gain root access and disable important security protections like SELinux. The rootkit then embeds itself into the system by modifying critical libraries, allowing it to inject malicious code into every app running on the device.</p>



<p>On older devices, this level of access allows the malware to survive even after a factory reset.</p>



<h3 class="wp-block-heading">WhatsApp Session Hijacking</h3>



<p>One of the most serious capabilities of this campaign is targeting WhatsApp.</p>



<p>When WhatsApp is opened, the malware extracts sensitive data, including encrypted databases and key identifiers used by the app. It also collects information such as phone number, country code, and account details.</p>



<p>This data is sent to attacker-controlled servers using encrypted communication that mimics legitimate traffic. With this information, attackers can clone or hijack the victim’s WhatsApp session on another device.</p>



<h3 class="wp-block-heading">Infrastructure and Evasion Techniques</h3>



<p>NoVoice uses a segmented infrastructure where different servers handle different tasks like device tracking, payload delivery, exploit hosting, and command execution.</p>



<p>It also uses cloud services to host its payloads, allowing attackers to quickly change servers if any part of the operation is detected. This makes the campaign more resilient and harder to shut down completely.</p>



<p>The techniques used in this campaign show similarities with previously known Android malware, especially in how it injects code into system processes and maintains persistence.</p>



<h3 class="wp-block-heading">Who Is Most at Risk</h3>



<p>Devices running newer Android versions with updated security patches are not affected by the specific exploits used in this campaign. However, they may still be exposed to other malicious components.</p>



<p>Older and unsupported devices remain the most vulnerable. Since they no longer receive updates, they continue to be exposed to known security flaws that attackers can exploit.</p>



<h3 class="wp-block-heading">Final Thoughts</h3>



<p>The NoVoice campaign is a strong reminder that even official app stores are not completely safe from advanced threats.</p>



<p>It also highlights the risks of using outdated devices. Keeping systems updated, being cautious with app installations, and using mobile security tools are essential steps to reduce exposure to such attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/novoice-android-malware/">NoVoice: A Silent Rootkit Campaign Targeting Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/novoice-android-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Viral “Three-Finger” Test — A Simple Trick Exposing Deepfake Live Calls</title>
		<link>https://firsthackersnews.com/three-finger-deepfake-detection/</link>
					<comments>https://firsthackersnews.com/three-finger-deepfake-detection/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 18:43:55 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#cyberfraud]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#deepfake]]></category>
		<category><![CDATA[#deepfakedetection]]></category>
		<category><![CDATA[#identityverification]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#threefingerdeepfake]]></category>
		<category><![CDATA[#videosecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11533</guid>

					<description><![CDATA[<p>A short clip has been circulating online showing a person on a video call being asked to raise</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/three-finger-deepfake-detection/">The Viral “Three-Finger” Test — A Simple Trick Exposing Deepfake Live Calls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A short clip has been circulating online showing a person on a video call being asked to raise three fingers and move their hand across their face. For a moment, everything looks normal — and then the face starts to glitch. It flickers, slightly misaligns, and loses its natural look.</p>



<p>That brief moment is exactly why this “three-finger test” has gone viral. It reveals something important: even advanced deepfake systems still struggle under certain real-time conditions.</p>



<h2 class="wp-block-heading"><strong>What’s Really Happening in That Viral Clip</strong></h2>



<p>At first, the video seems like a normal interaction. The person responds naturally, maintains eye contact, and appears authentic. But when the hand moves in front of the face, the illusion begins to break.</p>



<p>This happens because most live deepfake systems depend on continuously tracking facial features. When those features are partially blocked, the system briefly loses its reference points. The result is a visual inconsistency that the human eye can catch — even if only for a second.</p>



<p>That one second is enough to raise suspicion.</p>



<h2 class="wp-block-heading"><strong>Why This Simple Trick Works</strong></h2>



<p>The effectiveness of this trick lies in how it disrupts the assumptions deepfake systems rely on. These systems expect a relatively stable, visible face to maintain accuracy. A sudden, close-range hand movement changes that completely.</p>



<p>Here’s why it works so well right now:</p>



<ul class="wp-block-list">
<li>It introduces unpredictability into a controlled system</li>



<li>It blocks key facial landmarks needed for tracking</li>



<li>It forces real-time recalculation under time pressure</li>



<li>It exposes weaknesses in rendering hands and motion together</li>
</ul>



<p>Each of these factors increases the chances of visible glitches.</p>



<h2 class="wp-block-heading"><strong>Why Fingers Are a Problem for AI</strong></h2>



<p>Hands are one of the most complex parts of the human body to replicate digitally. Fingers bend, overlap, and change shape depending on angle and movement.</p>



<p>When this complexity is added in front of a moving face, the system has to process both occlusion and motion at once. This is where errors start to appear — and where the illusion becomes fragile.</p>



<h2 class="wp-block-heading"><strong>Why This Matters More Than It Seems</strong></h2>



<p>This isn’t just a social media trick. It highlights a growing security concern.</p>



<p>Deepfake technology is already being used in:</p>



<ul class="wp-block-list">
<li>Fraud attempts during video-based verification</li>



<li>Impersonation in business communication</li>



<li>Social engineering attacks targeting employees</li>
</ul>



<p>In these scenarios, trust is built visually. If something looks real, it is often accepted as real. That’s what makes live deepfakes dangerous.</p>



<p>The viral video is a reminder that even simple interactions can challenge that trust.</p>



<h2 class="wp-block-heading"><strong>Not a Perfect Solution — But a Useful Signal</strong></h2>



<p>While the three-finger test works today, it should not be treated as a guaranteed detection method. Deepfake systems are improving quickly, and future versions may handle these situations more smoothly.</p>



<p>Still, the idea behind it is powerful: introduce real-time, unexpected actions that are hard for AI to predict.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>The Bigger Takeaway</strong></h2>



<p>The real lesson from this viral moment is not just about fingers or gestures. It’s about how we verify identity in a world where visuals can no longer be trusted completely.</p>



<p>Small, human-driven checks can sometimes reveal what advanced systems try to hide.</p>



<h2 class="wp-block-heading"><strong>Closing Thoughts</strong></h2>



<p>The “three-finger” trick became popular because it is simple, visual, and surprisingly effective. It shows that even the most convincing deepfake can break under the right conditions.</p>



<p>But as technology evolves, detection will need to evolve with it.</p>



<p>Because in the near future, the challenge will not be spotting what looks fake — but questioning what looks real.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/three-finger-deepfake-detection/">The Viral “Three-Finger” Test — A Simple Trick Exposing Deepfake Live Calls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/three-finger-deepfake-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>VoidStealer Uses a Smarter Trick to Bypass Chrome Protection</title>
		<link>https://firsthackersnews.com/voidstealer-chrome-abe-bypass/</link>
					<comments>https://firsthackersnews.com/voidstealer-chrome-abe-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 10:34:26 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#ChromeABEBypass]]></category>
		<category><![CDATA[#ChromeSecurity]]></category>
		<category><![CDATA[#CookieTheft]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberResilience]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MalwareTrends]]></category>
		<category><![CDATA[#SecurityOperations]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#ThreatIntel]]></category>
		<category><![CDATA[#VoidStealer]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11490</guid>

					<description><![CDATA[<p>A newer version of VoidStealer is getting attention for using a quieter way to steal protected data from</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/voidstealer-chrome-abe-bypass/">VoidStealer Uses a Smarter Trick to Bypass Chrome Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newer version of <strong>VoidStealer</strong> is getting attention for using a quieter way to steal protected data from Google Chrome. </p>



<p>Instead of depending on code injection or high-level privileges, it uses a debugger-based method to capture Chrome’s <strong>v20_master_key</strong> directly from memory during normal browser activity, making it a significant concern related to the <strong>VoidStealer Chrome ABE bypass</strong>.</p>



<p>This makes the technique especially concerning because attackers can access protected cookies and credentials while avoiding some of the louder behaviors that security tools usually look for.</p>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>Google introduced <strong>Application-Bound Encryption (ABE)</strong> in Chrome 127 to better protect browser secrets such as cookies and saved credentials. The idea was to make theft attempts harder and easier to detect by tying decryption to Chrome and its privileged elevation service.</p>



<p>Older malware often used noisy methods to get around this. Some strains tried to run with <strong>SYSTEM-level privileges</strong> and copy the service logic. Others injected code into the browser process to trigger decryption from inside Chrome. Both methods usually create strong detection signals in endpoint telemetry.</p>



<p>The <strong>VoidStealer Chrome ABE bypass</strong> technique poses a serious risk, further complicating the protection landscape for users and organizations alike.</p>



<p>As cyber threats evolve, understanding the implications of methods like the VoidStealer Chrome ABE bypass becomes essential for users and security professionals alike.</p>



<p>VoidStealer’s newer approach is different because it avoids both of those steps while still reaching the same goal.</p>



<h2 class="wp-block-heading"><strong>How Chrome ABE Protects Browser Secrets</strong></h2>



<p>Chrome stores protected data like cookies, and in some cases passwords, as <strong>v20-prefixed encrypted values</strong>. These values are encrypted using a special application key called the <strong>v20_master_key</strong>.</p>



<p>That key is protected using Windows security mechanisms and is only decrypted briefly when Chrome needs to access protected data through its elevation service.</p>



<p>In simple terms, the key is normally locked away and appears in plaintext only for a short moment during legitimate browser operations. VoidStealer abuses that exact moment.</p>



<h2 class="wp-block-heading"><strong>What Makes VoidStealer Different</strong></h2>



<p>The most notable feature in <strong>VoidStealer v2.0</strong> is its <strong>debugger-driven bypass</strong>. Instead of forcing decryption through escalation or injection, the malware waits until Chrome decrypts the key naturally and then steals it from memory.</p>



<p>That gives attackers a stealthier path to the same result.</p>



<h3 class="wp-block-heading"><strong>Why attackers may like this method</strong></h3>



<ul class="wp-block-list">
<li>No SYSTEM privilege escalation</li>



<li>No browser code injection</li>



<li>Lower detection footprint</li>



<li>Access to ABE-protected cookies and credentials</li>
</ul>



<p>This makes the attack more attractive for threat actors trying to stay under the radar.</p>



<h2 class="wp-block-heading"><strong>How the Debugger-Based Bypass Works</strong></h2>



<p>The technique closely follows ideas from the open-source <strong>ElevationKatz</strong> project. VoidStealer launches a hidden browser instance, starts it in a suspended state, resumes it, and quickly attaches as a debugger.</p>



<p>This timing matters because browsers often load and decrypt cookies during startup.</p>



<p>After attaching, the malware monitors module load events and identifies <strong>chrome.dll</strong> or <strong>msedge.dll</strong>. It then scans memory to locate a known string linked to the ABE decryption path.</p>



<p>When the browser reaches that point, current builds of Chrome and Edge temporarily hold a pointer to the decrypted <strong>v20_master_key</strong> in a processor register. VoidStealer reads that pointer and extracts the key from memory.</p>



<p>The malware does not need to call decryption APIs inside the victim browser process. It simply watches Chrome at the right moment and takes the key when it becomes available.</p>



<h2 class="wp-block-heading"><strong>What Attackers Gain</strong></h2>



<p>Once the <strong>v20_master_key</strong> is stolen, attackers can use it offline to decrypt <strong>v20-protected cookies and credentials</strong> stored in the browser’s SQLite databases.</p>



<p>That effectively removes the protection ABE was meant to provide for that browser profile. A stolen session cookie can be enough to hijack active logins and gain access to web services without needing the victim’s password again.</p>



<h2 class="wp-block-heading"><strong>Detection Opportunities for Defenders</strong></h2>



<p>Even though this method is quieter, it still creates useful detection signals that defenders can monitor.</p>



<h3 class="wp-block-heading"><strong>Key indicators to watch</strong></h3>



<ul class="wp-block-list">
<li>Debugger attachment to <strong>chrome.exe</strong> or <strong>msedge.exe</strong></li>



<li>Use of <strong>DebugActiveProcess</strong> involving browser processes</li>



<li>Suspicious <strong>ReadProcessMemory</strong> activity against browsers</li>



<li>Hidden or non-interactive browser sessions launched by unknown parent processes</li>



<li>Unsigned or untrusted binaries reading browser memory</li>
</ul>



<p>These signals become much stronger when they appear together.</p>



<h2 class="wp-block-heading"><strong>Why This Matters for Security Teams</strong></h2>



<p>VoidStealer shows that infostealers are evolving beyond older, noisy bypass techniques. Instead of relying on privilege escalation or injection, attackers are moving toward quieter methods that abuse normal runtime behavior.</p>



<p>For defenders, this means detection strategies need to expand. Monitoring should not focus only on classic red flags like code injection. It also needs to cover <strong>debugger abuse, hidden browser launches, and unusual memory access patterns</strong>.</p>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>VoidStealer’s latest technique highlights a clear shift in browser-focused malware. By stealing Chrome’s decryption key at the brief moment it appears in memory, attackers can bypass ABE protections in a more subtle way.</p>



<p>Chrome’s ABE still raises the barrier for browser data theft, but this case shows that determined threat actors continue to adapt. Security teams need to respond in the same way by strengthening behavioral detection and improving visibility into suspicious browser-related activity.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/voidstealer-chrome-abe-bypass/">VoidStealer Uses a Smarter Trick to Bypass Chrome Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/voidstealer-chrome-abe-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake LastPass Support Scam Targets Password Vaults</title>
		<link>https://firsthackersnews.com/lastpass-support-phishing-attack/</link>
					<comments>https://firsthackersnews.com/lastpass-support-phishing-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 06:05:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#AccountSecurity]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#LastPass]]></category>
		<category><![CDATA[#LastPassPhishing]]></category>
		<category><![CDATA[#PasswordManager]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11335</guid>

					<description><![CDATA[<p>A new phishing campaign is pretending to be LastPass support emails to trick users into revealing their vault</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lastpass-support-phishing-attack/">Fake LastPass Support Scam Targets Password Vaults</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>A new phishing campaign is pretending to be <strong>LastPass support emails</strong> to trick users into revealing their vault passwords and account credentials.</p>



<p>Attackers send emails that look like internal support conversations about suspicious activity on a user’s account.</p>



<p>These messages claim that someone is attempting actions such as:</p>



<ul class="wp-block-list">
<li>Exporting vault data</li>



<li>Recovering the account</li>



<li>Registering a new trusted device</li>
</ul>



<p>The goal is to scare users into reacting quickly.</p>



<h2 class="wp-block-heading">How the Phishing Attack Works</h2>



<p>Hackers use a method called <strong>display name spoofing</strong>. The sender name appears as <em>LastPass Support</em>, but the actual email address comes from a different domain.</p>



<p>Many email apps, especially on mobile devices, show only the sender name. Because of this, users may not notice the fake address.</p>



<p>The email then asks users to secure or verify their account by clicking a link.</p>



<p>However, the link leads to a malicious website such as:</p>



<p>verify-lastpass[.]com</p>



<p>This site hosts a fake <strong>LastPass login page</strong> designed to look identical to the official one. If users enter their credentials, attackers can capture their master password and access their stored vault data.</p>



<h2 class="wp-block-heading">Common Phishing Email Signs</h2>



<p>The phishing emails often include LastPass branding and fake message threads to appear legitimate.</p>



<p>Some of the subject lines used include:</p>



<ul class="wp-block-list">
<li>“Account recovery verification request”</li>



<li>“Unauthorized vault export attempt detected”</li>



<li>“New trusted device registered to your account”</li>
</ul>



<p>These messages create urgency so users click before verifying the source.</p>



<h2 class="wp-block-heading">Security Advice for LastPass Users</h2>



<p>LastPass has warned that it will <strong>never ask for a user’s master password</strong> through email.</p>



<p>Users should take the following precautions:</p>



<ul class="wp-block-list">
<li>Check the full sender email address carefully</li>



<li>Avoid clicking links inside emails</li>



<li>Access LastPass directly through the official website or app</li>



<li>Enable multi-factor authentication (MFA)</li>



<li>Report suspicious emails to <strong><a>abuse@lastpass.com</a></strong></li>
</ul>



<h2 class="wp-block-heading">Why This Attack Matters</h2>



<p>Phishing attacks are becoming more realistic and harder to detect.</p>



<p>Since password managers store sensitive data, they are a high-value target for cybercriminals. Users should always verify security alerts and avoid rushing to click links, even when the message appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lastpass-support-phishing-attack/">Fake LastPass Support Scam Targets Password Vaults</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/lastpass-support-phishing-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GTFire Phishing Attack Hides Behind Google Services</title>
		<link>https://firsthackersnews.com/gtfire-google-phishing-campaign/</link>
					<comments>https://firsthackersnews.com/gtfire-google-phishing-campaign/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 21:45:10 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#BrandImpersonation]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#GoogleAbuse]]></category>
		<category><![CDATA[#GTFire]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#PhishingCampaign]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11311</guid>

					<description><![CDATA[<p>GTFire is a newly identified phishing campaign that misuses trusted Google services, including Firebase and Google Translate, to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gtfire-google-phishing-campaign/">GTFire Phishing Attack Hides Behind Google Services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>GTFire is a newly identified phishing campaign that misuses trusted Google services, including Firebase and Google Translate, to steal user credentials.</p>



<p>By hosting phishing content on legitimate Google-owned domains, the attackers are able to bypass many email security filters and web gateways. Because the links appear trustworthy, they are less likely to raise suspicion.</p>



<p>Victims are redirected to realistic login pages that imitate well-known brands. After entering their credentials, they are quietly sent to the real website, making the attack difficult to detect.</p>



<h2 class="wp-block-heading"><strong>Global Impact and Scale</strong></h2>



<p>The campaign is widespread. Investigators uncovered attacker-controlled servers containing thousands of stolen credentials linked to more than 1,000 organizations across 100+ countries and over 200 industries.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="608" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1024x608.png" alt="" class="wp-image-11312" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-300x178.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-768x456.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1024x608.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1536x912.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">GTFire phishing campaign (Source: Group-IB)<br></figcaption></figure>



<p>Mexico has the highest number of confirmed victims, particularly in manufacturing, education, and government sectors. The United States, Spain, India, and Argentina are also significantly affected.</p>



<p>The use of trusted cloud services makes this campaign especially effective and harder to block using traditional security controls.</p>



<p>Group-IB researchers describe GTFire as a structured, large-scale credential theft operation.</p>



<p>Attackers reuse the same phishing templates across multiple brands and store stolen data on centralized servers, organized by date, language, and targeted servic</p>



<p>More than 120 phishing domains were discovered, using similar naming patterns to quickly rotate infrastructure and avoid detection.</p>



<p>Attackers customize each fake login page to closely match real brands. After victims enter their credentials, they are redirected to the legitimate website, delaying suspicion.</p>



<p>Because the campaign uses trusted Google domains, traditional URL filtering and blocklists struggle to detect it — showing how easily legitimate infrastructure can be misused for phishing.</p>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The attack starts with a phishing email that contains a Google Translate link. This link quietly routes the victim through Google’s translation service before redirecting them to a fake login page hosted on Firebase.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="624" height="571" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-2.png" alt="" class="wp-image-11313" style="width:931px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-2-300x275.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-2.png 624w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption">Phishing pages display fake login error messages (Source: Group-IB)<br><br></figcaption></figure>



<p>Because the link uses a Google domain, many email filters and web gateways do not block it.</p>



<p>Attackers create many random *.web.app subdomains to host phishing pages and rotate them frequently to avoid detection. Each page is designed to look like a real brand login portal.</p>



<p>When victims enter their credentials, they are shown a fake “wrong password” message and asked to try again. Both login attempts are secretly captured and sent to attacker-controlled servers, along with basic details like location and browser language.</p>



<p>The stolen data is collected using simple, ready-made backend tools, making the campaign easy to scale.</p>



<h2 class="wp-block-heading"><strong>Mitigation Measures</strong></h2>



<p>Organizations should:</p>



<ul class="wp-block-list">
<li>Enforce phishing-resistant multi-factor authentication (MFA)</li>



<li>Train employees to recognize suspicious Google-based links</li>



<li>Monitor for unusual use of translate.goog and *.web.app domains</li>



<li>Watch for brand impersonation hosted on trusted cloud platforms</li>



<li>Share indicators of compromise with security communities and CERT teams</li>
</ul>



<p>Trusted services can be misused, so detection strategies must go beyond basic domain reputation check</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gtfire-google-phishing-campaign/">GTFire Phishing Attack Hides Behind Google Services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gtfire-google-phishing-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
