<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 10 Apr 2026 09:35:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Cybersecurity &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Fake Messaging Apps Used to Deliver ProSpy Spyware</title>
		<link>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/</link>
					<comments>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 09:35:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11582</guid>

					<description><![CDATA[<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as <strong>ProSpy</strong>, aimed primarily at journalists, activists, and political figures.</p>



<h2 class="wp-block-heading"><strong>Social Engineering and Delivery Tactics</strong></h2>



<p>The attack typically begins with direct contact. Victims are approached through platforms like LinkedIn, email, or messaging apps by accounts posing as journalists, support staff, or known contacts. These interactions are carefully crafted to build trust before introducing a malicious link.</p>



<p>The link is usually presented as something urgent or relevant, such as a video call request, shared document, or account alert. Once clicked, victims are redirected either to fake login pages or download portals.</p>



<p>Common tactics used:</p>



<ul class="wp-block-list">
<li>Impersonation of trusted individuals or organizations</li>



<li>Spearphishing messages tailored to the target</li>



<li>Fake login pages mimicking services like email or cloud platforms</li>



<li>Malicious download links disguised as secure communication tools</li>
</ul>



<p>This approach relies heavily on human trust rather than technical exploitation, making it highly effective even against cautious users.</p>



<h2 class="wp-block-heading"><strong>Fake Apps and Spyware Capabilities</strong></h2>



<p>The core of the campaign is the use of fake Android applications that appear to be secure messaging tools. These apps are distributed through convincing websites that mimic official sources and offer “enhanced” or “pro” versions of popular platforms.</p>



<p>Once installed, the spyware operates silently in the background, collecting and transmitting sensitive data to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="472" height="325" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png" alt="" class="wp-image-11583" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2-300x207.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png 472w" sizes="(max-width: 472px) 100vw, 472px" /><figcaption class="wp-element-caption">ProSpy searches for backup files from third-party applications and exfiltrates them (Source: Lookout).<br></figcaption></figure>



<p>Key capabilities include:</p>



<ul class="wp-block-list">
<li>Access to contacts, messages, and call-related data</li>



<li>Collection of device information and stored files</li>



<li>Extraction of documents, media, and backup data</li>



<li>Continuous communication with remote command servers</li>
</ul>



<p>The malware is designed to blend in as a legitimate app, making detection difficult for users who install it outside official app stores.</p>



<h2 class="wp-block-heading"><strong>Broader Implications</strong></h2>



<p>This campaign highlights a growing trend where attackers combine social engineering with mobile spyware to conduct surveillance operations. The targeting of civil society groups suggests a shift toward more personalized and contract-driven espionage activities.</p>



<p>It also reinforces a critical point: even advanced threats often rely on simple entry points — convincing a user to trust and install something that appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious npm Package Impersonates Gemini to Steal AI Tokens</title>
		<link>https://firsthackersnews.com/fake-gemini-npm-package/</link>
					<comments>https://firsthackersnews.com/fake-gemini-npm-package/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:57:53 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#APITokenTheft]]></category>
		<category><![CDATA[#CodeSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#FakePackage]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MaliciousPackage]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Nodejs]]></category>
		<category><![CDATA[#NpmSecurity]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#SoftwareSupplyChain]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11574</guid>

					<description><![CDATA[<p>Attackers are actively targeting developers by distributing a malicious npm package disguised as a tool for validating AI</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-gemini-npm-package/">Malicious npm Package Impersonates Gemini to Steal AI Tokens</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are actively targeting developers by distributing a malicious npm package disguised as a tool for validating AI tokens. The package pretends to be مرتبط with Google Gemini but is designed to quietly steal sensitive data from systems using popular AI development tools.</p>



<h3 class="wp-block-heading">How the Malicious Package Operates</h3>



<p>The fake package was uploaded under a seemingly legitimate name and presented as a utility for checking AI tokens. However, several warning signs were overlooked. The documentation was copied from an unrelated project, indicating a lack of authenticity, and the package structure was crafted to appear credible at first glance.</p>



<p>Once installed, the package connects to a remote server hosted on Vercel to fetch additional hidden code. Instead of storing malicious files on disk, it executes payloads directly in memory, making detection significantly harder.</p>



<p>Key behaviors observed:</p>



<ul class="wp-block-list">
<li>Contacts a remote endpoint to download and execute hidden scripts</li>



<li>Uses obfuscation to hide command-and-control (C2) details</li>



<li>Executes payloads in memory to bypass traditional security tools</li>



<li>Disguises itself with legitimate-looking files and dependencies</li>
</ul>



<p>Even after the main package was removed, related packages from the same source remain active and continue to be downloaded.</p>



<h3 class="wp-block-heading">Multi-Stage Malware Capabilities</h3>



<p>Further analysis revealed that the payload is not a simple script but a modular backdoor with multiple capabilities running in parallel. Each module performs a specific malicious function, allowing attackers to maintain control and extract valuable data.</p>



<p>Core functionalities include:</p>



<ul class="wp-block-list">
<li>Remote access module enabling attackers to control the infected system</li>



<li>Credential theft targeting browsers and cryptocurrency wallets</li>



<li>File exfiltration scanning for sensitive documents and configuration files</li>



<li>Clipboard monitoring to capture copied data such as keys or passwords</li>
</ul>



<p>The malware uses advanced obfuscation techniques, making it difficult to analyze. Its structure and behavior closely resemble known backdoors, particularly those linked to sophisticated threat campaigns.</p>



<h3 class="wp-block-heading">Focus on AI Development Environments</h3>



<p>The malicious code actively searches for folders linked to widely used AI tools such as Cursor, Claude, Gemini CLI, Windsurf, PearAI, and Eigent. These directories often store API keys, authentication tokens, and even conversation histories.</p>



<p>By extracting this data, attackers can misuse paid AI services, access proprietary code, and potentially pivot deeper into enterprise systems using additional credentials like SSH keys or cloud access tokens.</p>



<p>Key risks include:</p>



<ul class="wp-block-list">
<li>Theft of API keys and AI service tokens</li>



<li>Exposure of sensitive prompts and development data</li>



<li>Unauthorized use of paid AI platforms</li>



<li>Increased risk of broader infrastructure compromise</li>
</ul>



<h3 class="wp-block-heading">Detection and Defensive Measures</h3>



<p>From a defensive standpoint, visibility into unusual outbound traffic is critical. Monitoring connections to external infrastructure, especially uncommon endpoints, can help identify suspicious package behavior early.</p>



<p>Security teams can also leverage threat hunting techniques to detect patterns associated with multi-process Node.js malware and unusual communication channels such as Socket.IO-based command-and-control traffic.</p>



<p>Recommended actions:</p>



<ul class="wp-block-list">
<li>Monitor and restrict unnecessary outbound network connections</li>



<li>Watch for abnormal Node.js process activity</li>



<li>Identify unusual file access in developer environments</li>



<li>Use threat hunting queries to detect similar attack patterns</li>
</ul>



<h3 class="wp-block-heading">Securing Developer Workflows</h3>



<p>This campaign reflects a broader trend of supply chain attacks targeting developer ecosystems, particularly those involving AI tools. As these tools become deeply integrated into workflows, they also become high-value targets.</p>



<p>Developers should treat AI-related directories with the same level of sensitivity as critical folders like .ssh or cloud configuration paths. Before installing any package, it is essential to verify its authenticity, review its dependencies, and examine any unusual installation behavior.</p>



<p>Early reporting of suspicious packages and increased awareness within the developer community can significantly reduce the impact of such threats.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td class="has-text-align-left" data-align="left">Type</td><td class="has-text-align-left" data-align="left">Value</td><td class="has-text-align-left" data-align="left">Purpose</td></tr><tr><td class="has-text-align-left" data-align="left">Download URL</td><td class="has-text-align-left" data-align="left">server-check-genimi.vercel[.]app/defy/v3</td><td class="has-text-align-left" data-align="left">Malicious domain serving OtterCookie</td></tr><tr><td class="has-text-align-left" data-align="left">Download Token</td><td class="has-text-align-left" data-align="left">logo</td><td class="has-text-align-left" data-align="left">HTTP bearer token</td></tr><tr><td class="has-text-align-left" data-align="left">C2 IP Address</td><td class="has-text-align-left" data-align="left">216.126.237[.]71:4891 (AS14956 – RouterHosting LLC)</td><td class="has-text-align-left" data-align="left">RAT/C2</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Port</td><td class="has-text-align-left" data-align="left">4896</td><td class="has-text-align-left" data-align="left">File exfiltration</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Port</td><td class="has-text-align-left" data-align="left">4899</td><td class="has-text-align-left" data-align="left">Credential Theft</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Endpoint</td><td class="has-text-align-left" data-align="left">/api/service/makelog</td><td class="has-text-align-left" data-align="left">Initial connection containing victim fingerprinting info</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Endpoint</td><td class="has-text-align-left" data-align="left">/api/service/process</td><td class="has-text-align-left" data-align="left">C2 command output reporting</td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-gemini-npm-package/">Malicious npm Package Impersonates Gemini to Steal AI Tokens</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fake-gemini-npm-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</title>
		<link>https://firsthackersnews.com/cups-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/cups-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:15:04 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#CUPS]]></category>
		<category><![CDATA[#CUPSVulnerabilities]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#LinuxSecurity]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#PrivilegeEscalation]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#RootAccess]]></category>
		<category><![CDATA[#SecurityFlaws]]></category>
		<category><![CDATA[#SecurityRisk]]></category>
		<category><![CDATA[#ServerSecurity]]></category>
		<category><![CDATA[#SystemSecurity]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11569</guid>

					<description><![CDATA[<p>The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cups-vulnerabilities/">CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The widely used CUPS printing system has been found to contain critical vulnerabilities that could allow attackers to execute code and potentially gain full control over affected systems. </p>



<p>Since the print scheduler operates with elevated privileges, it becomes an attractive target for exploitation, especially in environments where print services are exposed over a network.</p>



<h3 class="wp-block-heading">Remote Code Execution Risk</h3>



<p>One of the identified issues enables attackers to execute code remotely on systems that expose shared print queues without authentication. The flaw originates from improper handling of print job inputs, where specially crafted data can bypass validation checks.</p>



<p>By injecting malicious input into print job parameters, an attacker can manipulate how the system processes configurations. This can result in the execution of unauthorized programs through the print service, effectively giving attackers control over the affected machine under the print service context.</p>



<p>This risk is particularly concerning for systems that allow anonymous access to shared printers, as it removes a key barrier to exploitation.</p>



<h3 class="wp-block-heading">Privilege Escalation to Root</h3>



<p>A second vulnerability allows local users with minimal privileges to escalate their access to full system control. This attack leverages weaknesses in how temporary printers are created and validated within the system.</p>



<p>An attacker can trick the system into granting elevated privileges during the printer setup process, then exploit a timing gap to redirect operations toward sensitive system files. By doing so, they can overwrite critical files and gain root-level access.</p>



<p>This type of attack is especially dangerous because it works even in default configurations, meaning no special setup is required beyond initial access to the system.</p>



<h3 class="wp-block-heading">Security Recommendations</h3>



<p>While fixes are in progress, organizations should take immediate precautions. Disabling external access to print services can significantly reduce exposure. Where shared printing is necessary, enforcing authentication is essential.</p>



<p>Additionally, running the print service within security frameworks such as AppArmor or SELinux can help contain potential damage by limiting what the service is allowed to access or modify.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/cups-vulnerabilities/">CUPS Vulnerabilities: Remote Code Execution and Root Access Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/cups-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</title>
		<link>https://firsthackersnews.com/linkedin-data-scanning/</link>
					<comments>https://firsthackersnews.com/linkedin-data-scanning/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 06:09:20 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalPrivacy]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#linkedin]]></category>
		<category><![CDATA[#OnlinePrivacy]]></category>
		<category><![CDATA[#PrivacyIssues]]></category>
		<category><![CDATA[#PrivacyMatters]]></category>
		<category><![CDATA[#PrivacyRisk]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#Surveillance]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11564</guid>

					<description><![CDATA[<p>A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linkedin-data-scanning/">LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A recent investigation by Fairlinked e.V. has raised significant concerns regarding potential undisclosed data collection practices by LinkedIn. The report, referred to as “BrowserGate,” alleges that the platform deploys hidden code capable of scanning user systems to identify installed software and browser extensions, without transparent disclosure or explicit user consent.</p>



<h3 class="wp-block-heading">Overview of the Findings</h3>



<p>The investigation indicates that this activity is directly tied to identifiable user profiles. Given that LinkedIn accounts are built on real-world identities, including professional roles and organizational affiliations, the collected data is inherently non-anonymous and can be mapped to individuals and enterprises.</p>



<p>The report further suggests that the platform can detect a wide range of browser extensions, some of which may indirectly reveal sensitive attributes such as personal interests, behavioral patterns, or professional intent. In particular, the tracking of job-search-related tools introduces a risk of exposing users who are actively exploring new employment opportunities.</p>



<p>Key observations include:</p>



<ul class="wp-block-list">
<li>Alleged system-level scanning without explicit consent mechanisms</li>



<li>Absence of clear disclosure within publicly available privacy documentation</li>



<li>Ability to infer sensitive personal and professional information through extension detection</li>



<li>Monitoring of a large number of job-related tools used by professionals</li>
</ul>



<p>Such practices, if confirmed, could raise compliance concerns under the General Data Protection Regulation, which imposes strict requirements on the collection and processing of sensitive personal data.</p>



<h3 class="wp-block-heading">Competitive Intelligence and Market Implications</h3>



<p>Beyond individual privacy risks, the report outlines potential implications in the context of competitive intelligence. It alleges that LinkedIn can detect the use of third-party sales and prospecting tools, including platforms such as Apollo, Lusha, and ZoomInfo.</p>



<p>By correlating tool usage with user identities, the platform could theoretically derive insights into competitor adoption, customer segmentation, and enterprise tool preferences. The report also claims that such intelligence has been leveraged in enforcement actions targeting users of external tools.</p>



<p>Notable findings include:</p>



<ul class="wp-block-list">
<li>Detection and monitoring of a broad range of competing commercial tools</li>



<li>Significant expansion in the number of tracked third-party applications over time</li>



<li>Use of internal infrastructure, including the “Voyager” API, with limited visibility in regulatory disclosures</li>



<li>Allegations of targeted actions against users leveraging non-native tools</li>
</ul>



<p>These concerns intersect with obligations under the Digital Markets Act, under which LinkedIn has been designated as a gatekeeper. While limited APIs were introduced as part of compliance efforts, the report suggests these interfaces are not representative of the platform’s full operational scope.</p>



<h3 class="wp-block-heading">Use of Tracking Technologies</h3>



<p>The investigation also highlights the integration of external tracking mechanisms within LinkedIn’s web environment. It alleges that invisible elements sourced from HUMAN Security are used to deploy cookies without user visibility. Additionally, encrypted scripts associated with Google, along with proprietary fingerprinting techniques, are reported to execute during routine page interactions.</p>



<p>These components are said to operate passively in the background, contributing to continuous data collection without direct user awareness.</p>



<h3 class="wp-block-heading">Closing Perspective</h3>



<p>If substantiated, the findings outlined in the BrowserGate report point to a potentially sophisticated and opaque data collection framework operating within a widely trusted professional platform. The implications extend beyond individual privacy, touching on regulatory compliance, competitive fairness, and transparency in large-scale digital ecosystems.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/linkedin-data-scanning/">LinkedIn Data Scanning: Hidden Tracking of User Devices Exposed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/linkedin-data-scanning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TP-Link Tapo Camera Vulnerabilities Put Devices at Risk</title>
		<link>https://firsthackersnews.com/tp-link-camera-vulnerability/</link>
					<comments>https://firsthackersnews.com/tp-link-camera-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 10:31:53 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CameraVulnerability]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#dosattack]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#IoTSecurity]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#TapoCamera]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#TPLink]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11555</guid>

					<description><![CDATA[<p>TP-Link has fixed multiple serious security issues affecting the Tapo C520WS security camera. These devices are widely used</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/tp-link-camera-vulnerability/">TP-Link Tapo Camera Vulnerabilities Put Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>TP-Link has fixed multiple serious security issues affecting the Tapo C520WS security camera. These devices are widely used for surveillance, so any weakness can directly impact both home and business security.</p>



<p>If attackers are able to crash the device or change its configuration, it can disrupt monitoring and create security gaps. This makes it important for users to install the latest firmware updates as soon as possible.</p>



<h2 class="wp-block-heading"><strong>Multiple Memory Handling Flaws</strong></h2>



<p>Several vulnerabilities were discovered in how the camera processes incoming data. These issues are mainly related to improper validation of HTTP requests and video stream inputs.</p>



<p>Because the system does not correctly check data size limits, an attacker on the same network can send specially crafted inputs that overflow memory and cause instability.</p>



<p>The identified issues include:</p>



<ul class="wp-block-list">
<li>CVE-2026-34118: Weak validation in HTTP POST request handling after memory allocation</li>



<li>CVE-2026-34119: Improper handling of segmented HTTP request data without boundary checks</li>



<li>CVE-2026-34120: Insecure processing of video stream inputs leading to overflow</li>



<li>CVE-2026-34122: Stack-based overflow caused by oversized configuration values</li>



<li>CVE-2026-34124: Path expansion issue where processed request paths exceed memory limits</li>
</ul>



<p>These vulnerabilities can lead to memory corruption, causing the device to freeze, crash, or reboot, resulting in denial-of-service conditions.</p>



<h2 class="wp-block-heading"><strong>Authentication Bypass – Critical Risk</strong></h2>



<p>The most severe issue in this set is an authentication bypass vulnerability.</p>



<ul class="wp-block-list">
<li>CVE-2026-34121: Allows attackers to bypass login checks</li>
</ul>



<p>This flaw exists due to inconsistent validation during request processing. An attacker can craft a request that combines permitted and restricted actions, tricking the system into skipping authentication.</p>



<p>As a result, unauthorized users can execute restricted commands and modify device settings without logging in.</p>



<h3 class="wp-block-heading"><strong>Impact and Risk</strong></h3>



<p>All these vulnerabilities carry high severity scores, with most rated around 7.1 and the authentication bypass reaching a higher critical score.</p>



<p>These issues are especially dangerous because they can be exploited by attackers on the same network, making local access a key risk factor.</p>



<p>Older or unpatched devices are more vulnerable, particularly those running firmware versions earlier than 1.2.4 Build 260326 Rel.24666n.</p>



<h3 class="wp-block-heading"><strong>What Users Should Do</strong></h3>



<ul class="wp-block-list">
<li>Update the device firmware to the latest available version immediately</li>



<li>Use the Tapo app or device interface to check for updates</li>



<li>Avoid running outdated firmware on security devices</li>



<li>Regularly review and maintain IoT device security</li>
</ul>



<p>Applying updates ensures that these vulnerabilities are patched and reduces the risk of unauthorized access or service disruption.</p>



<h3 class="wp-block-heading"><strong>Final Thoughts</strong></h3>



<p>This case highlights an important reality: even security devices can become weak points if not properly maintained.</p>



<p>Keeping firmware up to date is one of the simplest and most effective ways to protect your network and ensure your surveillance systems remain reliable.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/tp-link-camera-vulnerability/">TP-Link Tapo Camera Vulnerabilities Put Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/tp-link-camera-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious “ChatGPT Ad Blocker” Extension Steals User Data</title>
		<link>https://firsthackersnews.com/chatgpt-ad-blocker-malware/</link>
					<comments>https://firsthackersnews.com/chatgpt-ad-blocker-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 10:05:33 +0000</pubDate>
				<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[#AdBlockerMalware]]></category>
		<category><![CDATA[#AIPrivacy]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#ChatGPTMalware]]></category>
		<category><![CDATA[#ChatGPTSecurity]]></category>
		<category><![CDATA[#ChromeExtension]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataTheft]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MaliciousExtension]]></category>
		<category><![CDATA[#ThreatAlert]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11551</guid>

					<description><![CDATA[<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a rogue Chrome extension called “ChatGPT Ad Blocker” that secretly steals user conversations. It pretends to be a helpful tool designed to remove ads, but instead, it quietly collects sensitive data from ChatGPT sessions.</p>



<p>The extension takes advantage of user curiosity around ads in AI platforms, using a familiar name to appear trustworthy. Once installed, it monitors activity without interrupting the user experience, making it difficult to notice anything unusual.</p>



<p>It captures prompts, responses, and related metadata while continuing to behave like a normal extension on the surface.</p>



<h3 class="wp-block-heading">Behind the Operation</h3>



<p>After installation, the extension runs silently in the background and maintains persistence through scheduled activity. It regularly connects to a remote configuration hosted on GitHub, allowing attackers to change how it behaves without requiring any update from the user side.</p>



<p>When a user visits ChatGPT, the extension injects hidden scripts into the webpage. Instead of performing any ad-blocking function, it extracts the content of the page by removing styling and media elements while preserving the actual text of conversations.</p>



<p>This data is then compiled into a file and transmitted externally through a Discord webhook controlled by the attacker. The process is automated, meaning stolen conversations are continuously delivered without user awareness.</p>



<p>Investigators also observed suspicious activity linked to the developer account behind the extension. After years of inactivity, the account suddenly became active again, shifting focus toward JavaScript-based behavior. The same developer is connected to other AI-related services, raising broader concerns around data exposure.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">What This Means for Users</h3>



<ul class="wp-block-list">
<li>Conversations on ChatGPT can be silently captured</li>



<li>Prompts, responses, and session data are exposed</li>



<li>Data is sent to external servers without visibility</li>



<li>Remote control allows attackers to modify behavior anytime</li>



<li>Associated services may carry similar risks</li>
</ul>



<p>This incident shows how easily malicious tools can blend into everyday usage. Even simple extensions can operate quietly in the background while collecting valuable data.</p>



<p>Being cautious with browser extensions, especially those linked to popular platforms, is essential. Trust should not be based on names or claims alone, but on verified sources and transparency.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chatgpt-ad-blocker-malware/">Malicious “ChatGPT Ad Blocker” Extension Steals User Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chatgpt-ad-blocker-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NoVoice: A Silent Rootkit Campaign Targeting Android Users</title>
		<link>https://firsthackersnews.com/novoice-android-malware/</link>
					<comments>https://firsthackersnews.com/novoice-android-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 09:43:11 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#GooglePlay]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#NoVoice]]></category>
		<category><![CDATA[#ThreatIntel]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11546</guid>

					<description><![CDATA[<p>A newly discovered Android threat called NoVoice Android malware highlights how advanced malware can quietly spread through trusted</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/novoice-android-malware/">NoVoice: A Silent Rootkit Campaign Targeting Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly discovered Android threat called NoVoice Android malware highlights how advanced malware can quietly spread through trusted platforms like Google Play. This campaign was found hiding inside more than 50 apps that appeared completely normal, including utility tools, casual games, and gallery apps.</p>



<p>These applications worked as expected, which helped them avoid suspicion and gain user trust. Before they were removed, they reached over 2.3 million downloads, exposing a large number of users.</p>



<p>The campaign mainly targets older Android devices by exploiting 22 known vulnerabilities that were originally patched between 2016 and 2021. Devices running outdated versions, especially Android 7 and below, are at the highest risk because they no longer receive security updates.</p>



<h3 class="wp-block-heading">Stealthy Entry Through Legitimate Apps</h3>



<p>The attack begins when a user installs one of the infected apps and opens it. Everything appears normal, but hidden code is triggered in the background during the app’s startup process.</p>



<p>To remain undetected, these apps request minimal permissions and include common frameworks like Firebase, analytics tools, and social SDKs. This helps them blend in with legitimate applications.</p>



<p>The initial malicious payload is hidden inside what looks like a normal image file. In reality, the image contains encrypted data attached to it. Once executed, the app extracts and decrypts this payload directly in memory, leaving very little trace behind.</p>



<p>The malware then runs a series of checks to avoid detection. It looks for emulators, debugging tools, VPNs, proxies, and even uses geofencing to skip certain regions. Only after passing these checks does it connect to its command-and-control server.</p>



<h3 class="wp-block-heading">Modular Payload and Deep System Control</h3>



<p>After connecting to its server, the malware downloads additional components disguised as harmless files. These components are customized based on the infected device.</p>



<p>It collects detailed information such as device model, kernel version, installed apps, and security patch level. Based on this, it selects the most effective exploit to gain control.</p>



<p>Once successful, the attackers gain root access and disable important security protections like SELinux. The rootkit then embeds itself into the system by modifying critical libraries, allowing it to inject malicious code into every app running on the device.</p>



<p>On older devices, this level of access allows the malware to survive even after a factory reset.</p>



<h3 class="wp-block-heading">WhatsApp Session Hijacking</h3>



<p>One of the most serious capabilities of this campaign is targeting WhatsApp.</p>



<p>When WhatsApp is opened, the malware extracts sensitive data, including encrypted databases and key identifiers used by the app. It also collects information such as phone number, country code, and account details.</p>



<p>This data is sent to attacker-controlled servers using encrypted communication that mimics legitimate traffic. With this information, attackers can clone or hijack the victim’s WhatsApp session on another device.</p>



<h3 class="wp-block-heading">Infrastructure and Evasion Techniques</h3>



<p>NoVoice uses a segmented infrastructure where different servers handle different tasks like device tracking, payload delivery, exploit hosting, and command execution.</p>



<p>It also uses cloud services to host its payloads, allowing attackers to quickly change servers if any part of the operation is detected. This makes the campaign more resilient and harder to shut down completely.</p>



<p>The techniques used in this campaign show similarities with previously known Android malware, especially in how it injects code into system processes and maintains persistence.</p>



<h3 class="wp-block-heading">Who Is Most at Risk</h3>



<p>Devices running newer Android versions with updated security patches are not affected by the specific exploits used in this campaign. However, they may still be exposed to other malicious components.</p>



<p>Older and unsupported devices remain the most vulnerable. Since they no longer receive updates, they continue to be exposed to known security flaws that attackers can exploit.</p>



<h3 class="wp-block-heading">Final Thoughts</h3>



<p>The NoVoice campaign is a strong reminder that even official app stores are not completely safe from advanced threats.</p>



<p>It also highlights the risks of using outdated devices. Keeping systems updated, being cautious with app installations, and using mobile security tools are essential steps to reduce exposure to such attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/novoice-android-malware/">NoVoice: A Silent Rootkit Campaign Targeting Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/novoice-android-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ClickFix Variant Bypasses Detection Using Rundll32 &#038; WebDAV</title>
		<link>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/</link>
					<comments>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 19:09:57 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#ClickFix]]></category>
		<category><![CDATA[#ClickFixVariant]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DetectionBypass]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Rundll32]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#WebDAV]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11539</guid>

					<description><![CDATA[<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking a smarter route than before. Earlier variants relied heavily on PowerShell or mshta, which many security tools already watch closely. This time, attackers are using built-in Windows tools like rundll32.exe and WebDAV to stay under the radar and avoid early detection.</p>



<p>Instead of obvious scripting activity, the attack blends into normal system behavior. This makes it harder for security teams to notice anything suspicious during the initial stages.</p>



<h2 class="wp-block-heading"><strong>How the Attack Tricks Users</strong></h2>



<p>ClickFix still depends on social engineering. The attacker lures users to a fake website that looks like a CAPTCHA verification page. One such example is “healthybyhillary[.]com.”</p>



<figure class="wp-block-image size-full"><img decoding="async" width="903" height="534" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image.png" alt="" class="wp-image-11540" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-300x177.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-768x454.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image.png 903w" sizes="(max-width: 903px) 100vw, 903px" /><figcaption class="wp-element-caption">Phishing Website (Source – CyberProof)</figcaption></figure>



<p>The page guides the user through a simple-looking process:</p>



<ul class="wp-block-list">
<li>Press <strong>Win + R</strong> to open the Run dialog</li>



<li>Paste a pre-copied command using <strong>Ctrl + V</strong></li>



<li>Hit <strong>Enter</strong> to execute it</li>
</ul>



<p>To an average user, this feels like a normal verification step. But in reality, it triggers a malicious command that starts the infection process.</p>



<h2 class="wp-block-heading"><strong>How It Evades Detection</strong></h2>



<p>Once executed, the attack uses rundll32.exe along with WebDAV to pull a malicious DLL from a remote server. Since rundll32.exe is a trusted Windows tool, this activity often appears legitimate.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="825" height="858" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png" alt="" class="wp-image-11541" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-288x300.png 288w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-768x799.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png 825w" sizes="(max-width: 825px) 100vw, 825px" /><figcaption class="wp-element-caption">Attack Chain  (Source – CyberProof)<br></figcaption></figure>



<p>A few key techniques make this variant harder to detect:</p>



<ul class="wp-block-list">
<li>Uses <strong>WebDAV</strong> to fetch remote files like a network share</li>



<li>Executes DLL functions using <strong>ordinal numbers (#1)</strong> instead of readable names</li>



<li>Avoids early use of PowerShell to bypass common detection rules</li>



<li>Runs most of the attack <strong>in memory</strong>, leaving minimal traces on disk</li>
</ul>



<p>After the initial stage, PowerShell is used quietly with flags like <strong>-NoP</strong> and <strong>-NonI</strong>, along with <strong>IEX (Invoke-Expression)</strong> to load additional payloads.</p>



<p>The final payload, known as <strong>SkimokKeep</strong>, includes advanced evasion methods:</p>



<ul class="wp-block-list">
<li>Resolves system functions using <strong>hashing instead of direct imports</strong></li>



<li>Checks for sandbox or VM environments before running</li>



<li>Uses anti-debugging tricks like timing checks</li>



<li>Injects code into legitimate processes such as browsers</li>
</ul>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>This shift is significant because many defenses are still focused on detecting script-based attacks. By abusing trusted Windows components and reducing visible activity, attackers get a much quieter entry point.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>What Security Teams Should Watch</strong></h2>



<p>To detect or prevent this attack, organizations should focus on unusual system behavior rather than just scripts:</p>



<ul class="wp-block-list">
<li>Monitor suspicious use of <strong>rundll32.exe</strong>, especially with WebDAV-related arguments</li>



<li>Enable <strong>command-line logging</strong> for system binaries (LOLBins)</li>



<li>Restrict or monitor <strong>WebDAV traffic over port 80</strong></li>



<li>Block known malicious IPs and domains linked to the campaign</li>



<li>Educate users about <strong>fake CAPTCHA pages and ClickFix tricks</strong></li>
</ul>



<p>This variant shows how attackers continue to adapt. The real risk isn’t just the malware itself—it’s how easily users can be convinced to launch it.</p>



<h2 class="wp-block-heading"><strong>Block Known Malicious Infrastructure</strong></h2>



<p>Security teams should proactively block known indicators linked to this campaign to reduce exposure:</p>



<ul class="wp-block-list">
<li><strong>178.16.53[.]137</strong></li>



<li><strong>141.98.234[.]27</strong></li>



<li><strong>46.149.73[.]60</strong></li>



<li><strong>91.219.23[.]245</strong></li>
</ul>



<p>Suspicious domains to watch or block:</p>



<ul class="wp-block-list">
<li><strong>mer-forgea.sightup[.]in[.]net</strong></li>



<li><strong>data-x7-sync.neurosync[.]in[.]net</strong></li>
</ul>



<p>You can place this section right after the “What Security Teams Should Watch” section so it flows naturally as an action step.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Viral “Three-Finger” Test — A Simple Trick Exposing Deepfake Live Calls</title>
		<link>https://firsthackersnews.com/three-finger-deepfake-detection/</link>
					<comments>https://firsthackersnews.com/three-finger-deepfake-detection/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 18:43:55 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#cyberfraud]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#deepfake]]></category>
		<category><![CDATA[#deepfakedetection]]></category>
		<category><![CDATA[#identityverification]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#threefingerdeepfake]]></category>
		<category><![CDATA[#videosecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11533</guid>

					<description><![CDATA[<p>A short clip has been circulating online showing a person on a video call being asked to raise</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/three-finger-deepfake-detection/">The Viral “Three-Finger” Test — A Simple Trick Exposing Deepfake Live Calls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A short clip has been circulating online showing a person on a video call being asked to raise three fingers and move their hand across their face. For a moment, everything looks normal — and then the face starts to glitch. It flickers, slightly misaligns, and loses its natural look.</p>



<p>That brief moment is exactly why this “three-finger test” has gone viral. It reveals something important: even advanced deepfake systems still struggle under certain real-time conditions.</p>



<h2 class="wp-block-heading"><strong>What’s Really Happening in That Viral Clip</strong></h2>



<p>At first, the video seems like a normal interaction. The person responds naturally, maintains eye contact, and appears authentic. But when the hand moves in front of the face, the illusion begins to break.</p>



<p>This happens because most live deepfake systems depend on continuously tracking facial features. When those features are partially blocked, the system briefly loses its reference points. The result is a visual inconsistency that the human eye can catch — even if only for a second.</p>



<p>That one second is enough to raise suspicion.</p>



<h2 class="wp-block-heading"><strong>Why This Simple Trick Works</strong></h2>



<p>The effectiveness of this trick lies in how it disrupts the assumptions deepfake systems rely on. These systems expect a relatively stable, visible face to maintain accuracy. A sudden, close-range hand movement changes that completely.</p>



<p>Here’s why it works so well right now:</p>



<ul class="wp-block-list">
<li>It introduces unpredictability into a controlled system</li>



<li>It blocks key facial landmarks needed for tracking</li>



<li>It forces real-time recalculation under time pressure</li>



<li>It exposes weaknesses in rendering hands and motion together</li>
</ul>



<p>Each of these factors increases the chances of visible glitches.</p>



<h2 class="wp-block-heading"><strong>Why Fingers Are a Problem for AI</strong></h2>



<p>Hands are one of the most complex parts of the human body to replicate digitally. Fingers bend, overlap, and change shape depending on angle and movement.</p>



<p>When this complexity is added in front of a moving face, the system has to process both occlusion and motion at once. This is where errors start to appear — and where the illusion becomes fragile.</p>



<h2 class="wp-block-heading"><strong>Why This Matters More Than It Seems</strong></h2>



<p>This isn’t just a social media trick. It highlights a growing security concern.</p>



<p>Deepfake technology is already being used in:</p>



<ul class="wp-block-list">
<li>Fraud attempts during video-based verification</li>



<li>Impersonation in business communication</li>



<li>Social engineering attacks targeting employees</li>
</ul>



<p>In these scenarios, trust is built visually. If something looks real, it is often accepted as real. That’s what makes live deepfakes dangerous.</p>



<p>The viral video is a reminder that even simple interactions can challenge that trust.</p>



<h2 class="wp-block-heading"><strong>Not a Perfect Solution — But a Useful Signal</strong></h2>



<p>While the three-finger test works today, it should not be treated as a guaranteed detection method. Deepfake systems are improving quickly, and future versions may handle these situations more smoothly.</p>



<p>Still, the idea behind it is powerful: introduce real-time, unexpected actions that are hard for AI to predict.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>The Bigger Takeaway</strong></h2>



<p>The real lesson from this viral moment is not just about fingers or gestures. It’s about how we verify identity in a world where visuals can no longer be trusted completely.</p>



<p>Small, human-driven checks can sometimes reveal what advanced systems try to hide.</p>



<h2 class="wp-block-heading"><strong>Closing Thoughts</strong></h2>



<p>The “three-finger” trick became popular because it is simple, visual, and surprisingly effective. It shows that even the most convincing deepfake can break under the right conditions.</p>



<p>But as technology evolves, detection will need to evolve with it.</p>



<p>Because in the near future, the challenge will not be spotting what looks fake — but questioning what looks real.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/three-finger-deepfake-detection/">The Viral “Three-Finger” Test — A Simple Trick Exposing Deepfake Live Calls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/three-finger-deepfake-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>India Tightens Rules on CCTV and Network Devices</title>
		<link>https://firsthackersnews.com/india-cctv-ban-2026/</link>
					<comments>https://firsthackersnews.com/india-cctv-ban-2026/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 09:51:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CCTVRulesIndia]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurityIndia]]></category>
		<category><![CDATA[#DahuaBan]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalIndia]]></category>
		<category><![CDATA[#HikvisionBan]]></category>
		<category><![CDATA[#IndiaCCTVBan]]></category>
		<category><![CDATA[#IndiaCCTVBan2026]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfrastructureSecurity]]></category>
		<category><![CDATA[#MakeInIndia]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#SecurityCompliance]]></category>
		<category><![CDATA[#SecurityRegulations]]></category>
		<category><![CDATA[#STQC]]></category>
		<category><![CDATA[#SurveillanceSecurity]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#TPLinkBan]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11528</guid>

					<description><![CDATA[<p>From April 1, 2026, India is set to restrict the sale of several foreign surveillance and networking products,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/india-cctv-ban-2026/">India Tightens Rules on CCTV and Network Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>From April 1, 2026, India is set to restrict the sale of several foreign surveillance and networking products, including those from Hikvision, Dahua Technology, and TP-Link.</p>



<p>The upcoming India CCTV ban is a significant development in the country&#8217;s surveillance landscape.</p>



<p>This move comes as part of stricter cybersecurity regulations aimed at reducing risks linked to foreign hardware in sensitive environments. The government now requires all internet-connected CCTV and related devices to meet new certification standards before they can be sold in the country.</p>



<p>At the center of this change is a push for stronger control over hardware security. Devices must clearly disclose where their core components come from and pass strict testing checks. Products that fail to meet these requirements will not be allowed in the Indian market.</p>



<h3 class="wp-block-heading">What This Means for the Market</h3>



<p>The new rules are already reshaping the surveillance industry in India, with local brands gaining a strong advantage. Companies like CP Plus and Qubo have adapted quickly by changing their supply chains and focusing on compliant components.</p>



<p>Key changes include:</p>



<p>• Shift towards locally manufactured or approved hardware<br>• Reduced reliance on Chinese chipsets and components<br>• Increased focus on secure communication and regular updates<br>• Strong growth of “Make in India” surveillance products</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>This transition has helped domestic brands capture a major share of the market, while global players now operate mostly in niche or premium segments.</p>



<p>However, the shift also comes with some impact on pricing and availability. Replacing low-cost components and meeting compliance standards has pushed up costs, especially for mid-range and high-end systems.</p>



<p>For many cybersecurity experts, this is a necessary step toward better data protection and infrastructure security. At the same time, some concerns remain about long-term performance and how quickly local manufacturers can scale without compromising quality.</p>



<p>Overall, the move signals a clear direction — tighter control, stronger security, and reduced dependence on foreign surveillance technology.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/india-cctv-ban-2026/">India Tightens Rules on CCTV and Network Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/india-cctv-ban-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
