<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IOC&#8217;s &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/iocs/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Wed, 21 Aug 2024 17:14:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>IOC&#8217;s &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Beware: Fake AI Editor Stealing Logins</title>
		<link>https://firsthackersnews.com/fake-ai-editor/</link>
					<comments>https://firsthackersnews.com/fake-ai-editor/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 05 Aug 2024 17:40:10 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[infostealer]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Fake AI Editor]]></category>
		<category><![CDATA[malware campaign]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[steal login credentials]]></category>
		<category><![CDATA[stealinformation]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8443</guid>

					<description><![CDATA[<p>Recently, Trend Micro researchers uncovered a sophisticated malvertising campaign targeting social media users with a multi-step deception to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-ai-editor/">Beware: Fake AI Editor Stealing Logins</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Recently, Trend Micro researchers uncovered a sophisticated malvertising campaign targeting social media users with a multi-step deception to steal login credentials. </p>



<p>Hackers use fake AI editor websites to trick users into providing personal information, downloading malware, and paying for fraudulent services.</p>



<h2 class="wp-block-heading"><strong>Fake AI Editor </strong></h2>



<p>The threat actor promotes fake photo editing sites through sponsored ads. When users download software from these sites, they inadvertently install a tool that, while appearing harmless, is actually embedded with malicious code. This allows hackers to control the users&#8217; devices remotely, enabling them to deploy credential stealers or access valuable data.</p>



<p>Threat actors send phishing messages to social media page admins, using personalized links or Facebook’s open redirect URLs to appear legitimate. Once they access the accounts, they post malicious ads linking to fake AI photo editor sites.</p>



<p>These platforms mimic real services like Evoto but actually distribute endpoint management software.</p>



<p>The campaign has generated notable traffic, with about 16,000 downloads for the Windows version and 1,200 hits on a non-functional macOS version, showing its broad reach and effectiveness in deceiving users.</p>



<p>Victims’ devices are unknowingly enrolled in ITarian&#8217;s remote management system, disguised as a photo editor MSI package. This setup allows full control without using obvious malicious components.</p>



<p>Two key actions occur:</p>



<ol class="wp-block-list">
<li>A Python script downloads and runs Lumma Stealer, encrypted with PackLab Crypter.</li>



<li>Another script disables Microsoft Defender scans for the C: drive.</li>
</ol>



<p>Lumma Stealer then communicates with its command and control server via POST requests to receive a base64 encoded configuration. This configuration directs the stealer to target and exfiltrate social media credentials and other sensitive data.</p>



<h4 class="wp-block-heading"><strong>Recommendations for protecting against fake AI editor scams:</strong></h4>



<ol class="wp-block-list">
<li><strong>Verify Sources</strong>: Only download software from official and trusted sources. Be cautious of links from unsolicited emails or social media ads.</li>



<li><strong>Check URLs</strong>: Ensure that the URL of the website is legitimate and not a lookalike or misspelled version of a real site.</li>



<li><strong>Use Security Software</strong>: Keep your antivirus and anti-malware software up to date to detect and block malicious downloads.</li>



<li><strong>Enable Browser Security Features</strong>: Use browser extensions or settings that warn you about potentially dangerous sites and downloads.</li>



<li><strong>Be Cautious with Permissions</strong>: Avoid granting excessive permissions to software or apps that request more access than necessary.</li>



<li><strong>Educate Yourself and Others</strong>: Stay informed about common phishing tactics and scams to better recognize and avoid them.</li>



<li><strong>Report Suspicious Activity</strong>: Report any suspicious ads or websites to the relevant platforms or authorities to help prevent others from falling victim.</li>



<li><strong>Regularly Update Software</strong>: Ensure that your operating system and applications are up-to-date with the latest security patches.</li>
</ol>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-ai-editor/">Beware: Fake AI Editor Stealing Logins</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fake-ai-editor/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious Python Package Targets macOS Developers for Google Cloud Login Theft</title>
		<link>https://firsthackersnews.com/malicious-python-package/</link>
					<comments>https://firsthackersnews.com/malicious-python-package/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 29 Jul 2024 16:22:10 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[inject harmful code]]></category>
		<category><![CDATA[macOS Developers]]></category>
		<category><![CDATA[Malicious Python Package]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[sensitive information]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8353</guid>

					<description><![CDATA[<p>Hackers exploit malicious Python packages to attack developer environments, inject harmful code, and steal sensitive information or install</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/malicious-python-package/">Malicious Python Package Targets macOS Developers for Google Cloud Login Theft</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hackers exploit malicious Python packages to attack developer environments, inject harmful code, and steal sensitive information or install malware. This method leverages popular repositories for broad impact with minimal effort.</p>



<p>CheckMarx researchers recently found that attackers are using the malicious package &#8220;lr-utils-lib&#8221; to target macOS developers and steal Google Cloud logins.</p>



<h2 class="wp-block-heading"><strong>Malicious Python Package Targets macOS Developers</strong></h2>



<p>A malicious package named “lr-utils-lib” targets macOS systems to steal Google Cloud Platform credentials. Its <code>setup.py</code> file includes hidden code that activates upon installation, specifically targeting macOS by checking the system type and comparing the IOPlatformUUID with 64 known hashes.</p>



<p>When a match is found, the malware extracts sensitive data from <code>~/.config/gcloud/application_default_credentials.json</code> and <code>credentials.db</code> files, then sends this information to a remote server (europe-west2-workload-422915.cloudfunctions.net).</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="673" src="https://firsthackersnews.com/wp-content/uploads/2024/07/image-24-1024x673.png" alt="" class="wp-image-8354" srcset="https://firsthackersnews.com/wp-content/uploads/2024/07/image-24-200x132.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-24-300x197.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-24-400x263.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-24-600x395.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-24-768x505.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-24-800x526.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-24-1024x673.png 1024w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-24.png 1142w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Source – CheckMarx</em></figcaption></figure>



<p>The “lr-utils-lib” malware attack involved a fake LinkedIn profile under “Lucid Zenith,” falsely claiming to be the CEO of Apex Companies, LLC. This incident highlights the sophistication of modern cyber threats, combining malware distribution, social engineering, and AI verification flaws.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="673" src="https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-1024x673.png" alt="" class="wp-image-8355" srcset="https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-200x131.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-300x197.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-400x263.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-600x394.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-768x505.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-800x526.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-1024x673.png 1024w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-25-1200x789.png 1200w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-25.png 1232w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Source – CheckMarx</em></figcaption></figure>



<p>AI-driven search engines failed to properly verify the fake LinkedIn profile, which shows how threat actors exploit flaws in AI verification. This highlights the need for thorough checks and multiple sources when using AI tools.</p>



<p>The “lr-utils-lib” package attacks macOS users to steal Google Cloud credentials, emphasizing the importance of securing third-party packages. </p>



<p>This case underscores broader cybersecurity issues, such as the impact of fake profiles and unreliable AI verifiers. It demonstrates the need for rigorous vetting and careful information-seeking to prevent data breaches and reputational damage.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<ul class="wp-block-list">
<li>europe-west2-workload-422915[.]cloudfunctions[.]net</li>



<li>lucid[.]zeniths[.]0j@icloud[.]com</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/malicious-python-package/">Malicious Python Package Targets macOS Developers for Google Cloud Login Theft</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/malicious-python-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CapraRAT Mimics Popular Apps to Attack Android Users</title>
		<link>https://firsthackersnews.com/caprarat/</link>
					<comments>https://firsthackersnews.com/caprarat/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 02 Jul 2024 20:44:47 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[android apps]]></category>
		<category><![CDATA[Android users]]></category>
		<category><![CDATA[CapraRAT]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=8173</guid>

					<description><![CDATA[<p>Transparent Tribe (aka APT36), active since 2016, uses social engineering to target Indian government and military personnel. Recently,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/caprarat/">CapraRAT Mimics Popular Apps to Attack Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Transparent Tribe (aka APT36), active since 2016, uses social engineering to target Indian government and military personnel. Recently, their CapraRAT has been mimicking popular Android apps to attack Android users, showing adaptability and expanding their espionage efforts against Indian targets.</p>



<h2 class="wp-block-heading"><strong>All about CapraRAT</strong></h2>



<p>The malware uses obfuscated URLs and WebView to open YouTube and CrazyGames[.]com. In addition, apps like &#8220;Sexy Videos&#8221; employ social engineering tactics centered on romance. Meanwhile, others, such as &#8220;TikTok&#8221; and &#8220;Weapons,&#8221; direct users to specific YouTube channels or gaming sites like CrazyGames[.]com.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="676" height="665" src="https://firsthackersnews.com/wp-content/uploads/2024/07/image-1.png" alt="" class="wp-image-8174" srcset="https://firsthackersnews.com/wp-content/uploads/2024/07/image-1-66x66.png 66w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-1-200x197.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-1-300x295.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-1-400x393.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-1-600x590.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/07/image-1.png 676w" sizes="(max-width: 676px) 100vw, 676px" /><figcaption class="wp-element-caption"><em>Source – Sentinel Labs</em></figcaption></figure>



<p>SentinelLabs researchers noted that CapraRAT’s evolving tactics highlight its adaptability. By using legitimate platforms as covers for malicious activities, the malware maintains access to sensitive device permissions.</p>



<p>The latest CapraTube campaign continues its romance-themed social engineering through these apps, which open YouTube and perform related searches. Despite removing some previously requested permissions, the malware still demands numerous dangerous permissions during monitoring.</p>



<p>Targeting Android 8.0 (Oreo) and newer versions contrasts with the September 2023 campaign, thereby enhancing compatibility with modern devices. However, suspicious permissions are still requested despite these updates. As a result, a new WebView class has been added to support older Android versions, aiming to maintain functionality across different platforms.</p>



<p>Despite updates, CapraRAT&#8217;s core functionality, centered on surveillance, remains largely unchanged. Initiated through MainActivity and utilizing the TCHPClient class, it performs malicious activities such as audio streaming, call recording, contact logging, file browsing, and SMS sniffing. Moreover, these capabilities underscore its persistent focus on gathering sensitive information.</p>



<p>These variants communicate with C2 servers via specific hostnames and IP addresses, some of which are linked to threats like CrimsonRAT. Furthermore, recent updates focus on enhancing software reliability and compatibility with newer Android versions.</p>



<p>The malware employs social engineering tactics targeting groups like mobile gamers or firearms enthusiasts. </p>



<p>Users should carefully review app permissions during installation to avoid unnecessary access requests. Additionally, incident responders must vigilantly monitor network indicators and method names associated with CapraRAT.</p>



<h2 class="wp-block-heading"><strong>IoCs &#8211; CapraRAT</strong></h2>



<h3 class="wp-block-heading"><strong>Files</strong></h3>



<figure class="wp-block-table"><table><tbody><tr><td><strong>SHA1</strong></td><td><strong>Name</strong></td></tr><tr><td>28bc3b3d8878be4267ee08f20b7816a6ba23623e</td><td>TikTok signed.apk</td></tr><tr><td>c307f523a1d1aa928fe3db2c6c3ede6902f1084b</td><td>Crazy Game signed.apk</td></tr><tr><td>dba9f88ba548cebfa389972cddf2bec55b71168b</td><td>Sexy Videos signed.apk</td></tr><tr><td>fff24e9f11651e0bdbee7c5cd1034269f40fc424</td><td>Weapons signed.apk</td></tr></tbody></table></figure>



<h3 class="wp-block-heading"><strong>Network Indicators</strong></h3>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Domain/IP</strong></td><td><strong>Description</strong></td></tr><tr><td>shareboxs[.]net</td><td>C2 domain</td></tr><tr><td>173[.]212[.]206[.]227</td><td>Resolved C2 IP address, hosts shareboxs.net</td></tr><tr><td>173[.]249[.]50[.]243</td><td>Hardcoded failover C2 IP address</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/caprarat/">CapraRAT Mimics Popular Apps to Attack Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/caprarat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GuptiMiner Exploits eScan to Distribute Miners and Backdoors</title>
		<link>https://firsthackersnews.com/guptiminer-exploits/</link>
					<comments>https://firsthackersnews.com/guptiminer-exploits/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 25 Apr 2024 16:20:25 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[eScan]]></category>
		<category><![CDATA[GUPTIMINER EXPLOITS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7780</guid>

					<description><![CDATA[<p>Avast researchers recently uncovered GuptiMiner, an aged malware. It leverages the eScan antivirus update system to surreptitiously implant</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/guptiminer-exploits/">GuptiMiner Exploits eScan to Distribute Miners and Backdoors</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Avast researchers recently uncovered GuptiMiner, an aged malware. It leverages the eScan antivirus update system to surreptitiously implant backdoors and cryptocurrency mining software into users’ computers and extensive corporate networks. This discovery underscores cybercriminals&#8217; efforts to circumvent contemporary security protocols. Let’s delve deeper into this development.</p>



<h2 class="wp-block-heading"><strong>GUPTIMINER EXPLOITS</strong></h2>



<p>Avast experts examined GuptiMiner, a malware active since 2018, targeting corporate networks with backdoors and concealed cryptomining. Employing a multi-stage infection process, the malware initiates by intercepting antivirus updates via man-in-the-middle (MitM) assaults, enabling attackers to replace authentic updates with malicious ones.</p>



<p><br>Avast alerted eScan and India CERT about the discovered vulnerability, successfully patched on July 31, 2023. However, as users seldom employ multiple antivirus programs, it hampers the ability to fully detect and analyze GuptiMiner&#8217;s operations.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="215" src="https://firsthackersnews.com/wp-content/uploads/2024/04/image-8.png" alt="" class="wp-image-7781" srcset="https://firsthackersnews.com/wp-content/uploads/2024/04/image-8-200x42.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/04/image-8-300x63.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/04/image-8-400x84.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/04/image-8-600x126.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/04/image-8-768x161.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/04/image-8-800x168.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/04/image-8.png 1024w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">GuptiMiner is requesting the payload from a real IP address</figcaption></figure>



<p>The malware employs a sophisticated infection process. Initially, it intercepts eScan antivirus updates. During the download process, an attacker intervenes, replacing the legitimate update with a malicious version. Subsequently, eScan decompresses and downloads the package, initiating a chain of infection via a DLL. This DLL facilitates further downloads and code execution by the virus.</p>



<p>Following this, GuptiMiner employs a sideloading method to insert malicious code into trusted processes, ensuring its invisibility to antivirus systems. Additionally, the malware communicates with remote command and control (C2) servers to receive instructions and updates. This grants attackers control over infected systems, enabling the execution of further malicious activities or cryptocurrency mining operations.</p>



<h2 class="wp-block-heading"><strong>HOW GUPTIMINER OPERATES</strong></h2>



<p><br>The GuptiMiner analysis unveiled its utilization of sophisticated methods to install and conceal its presence on systems. Key techniques encompassed sideloading DLL, altering system files, and employing forged digital signatures to feign legitimacy.</p>



<p>Furthermore, GuptiMiner&#8217;s distinguishing trait is its capacity to modularize infections, involving DNS queries to the attacker’s DNS servers and extracting data from seemingly innocuous images. In addition to its primary function of installing backdoors, GuptiMiner unexpectedly disseminates the XMRig miner for Monero cryptocurrency mining.</p>



<p>The malware is potentially associated with Kimsuky, a prominent North Korean hacking group, suggesting potential state sponsorship and highly organized attacks. Given North Korean hackers&#8217; previous interest in cryptocurrency, this revelation isn&#8217;t entirely unexpected.</p>



<p>During GuptiMiner analysis, researchers uncovered two distinct types of backdoors, each tailored to serve specific functions within a meticulously orchestrated and expansive campaign targeting corporate networks.</p>



<p>The initial type of backdoor, a modified PuTTY Link, scans SMBs on the local network. This enables lateral movement, granting access to potentially vulnerable systems running Windows 7 and Windows Server 2008, thus exploiting vulnerabilities in legacy operating systems.</p>



<p>The second type of backdoor is multifunctional and modular, receiving commands from the attacker to install extra modules. Its focus lies in locating and pilfering locally stored private keys and cryptocurrency wallets. This tactic enables attackers to surveil infected systems over extended periods and trigger supplementary malicious functionalities as needed.</p>



<h2 class="wp-block-heading"><strong>Indicators of Compromise</strong></h2>



<h3 class="wp-block-heading">Domains&nbsp;</h3>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Domain</strong></td></tr><tr><td>_spf.microsoft[.]com</td></tr><tr><td>acmeautoleasing[.]net</td></tr><tr><td>b.guterman[.]net</td></tr><tr><td>breedbackfp[.]com</td></tr><tr><td>crl.microsoft[.]com</td></tr><tr><td>crl.peepzo[.]com</td></tr><tr><td>crl.sneakerhost[.]com</td></tr><tr><td>desmoinesreg[.]com</td></tr><tr><td>dl.sneakerhost[.]com</td></tr><tr><td>edgesync[.]net</td></tr><tr><td>espcomp[.]net</td></tr><tr><td>ext.microsoft[.]com</td></tr><tr><td>ext.peepzo[.]com</td></tr><tr><td>ext.sneakerhost[.]com</td></tr><tr><td>gesucht[.]net</td></tr><tr><td>gesucht[.]net</td></tr><tr><td>globalsign.microsoft[.]com</td></tr><tr><td>icamper[.]net</td></tr><tr><td>m.airequipment[.]net</td></tr><tr><td>m.cbacontrols[.]com</td></tr><tr><td>m.gosoengine[.]com</td></tr><tr><td>m.guterman[.]net</td></tr><tr><td>m.indpendant[.]com</td></tr><tr><td>m.insomniaccinema[.]com</td></tr><tr><td>m.korkyt[.]net</td></tr><tr><td>m.satchmos[.]net</td></tr><tr><td>m.sifraco[.]com</td></tr><tr><td>ns.bretzger[.]net</td></tr><tr><td>ns.deannacraite[.]com</td></tr><tr><td>ns.desmoinesreg[.]com</td></tr><tr><td>ns.dreamsoles[.]com</td></tr><tr><td>ns.editaccess[.]com</td></tr><tr><td>ns.encontacto[.]net</td></tr><tr><td>ns.gravelmart[.]net</td></tr><tr><td>ns.gridsense[.]net</td></tr><tr><td>ns.jetmediauk[.]com</td></tr><tr><td>ns.kbdn[.]net</td></tr><tr><td>ns.lesagencestv[.]net</td></tr><tr><td>ns.penawarkanser[.]net</td></tr><tr><td>ns.srnmicro[.]net</td></tr><tr><td>ns.suechiLton[.]com</td></tr><tr><td>ns.trafomo[.]com</td></tr><tr><td>ns.trafomo[.]com</td></tr><tr><td>ns1.earthscienceclass[.]com</td></tr><tr><td>ns1.peepzo[.]com</td></tr><tr><td>ns1.securtelecom[.]com</td></tr><tr><td>ns1.sneakerhost[.]com</td></tr><tr><td>p.bramco[.]net</td></tr><tr><td>p.hashvault[.]pro</td></tr><tr><td>r.sifraco[.]com</td></tr><tr><td>spf.microsoft[.]com</td></tr><tr><td>widgeonhill[.]com</td></tr><tr><td>www.bascap[.]net</td></tr></tbody></table></figure>



<h3 class="wp-block-heading"><strong>Mutexes&nbsp;</strong></h3>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Mutex</strong>&nbsp;</td></tr><tr><td>ESOCESS_&nbsp;</td></tr><tr><td>Global\Fri Aug 13 02:17:49 2021&nbsp;</td></tr><tr><td>Global\Fri Aug 13 02:22:55 2021&nbsp;</td></tr><tr><td>Global\Mon Apr 19 06:03:17 2021&nbsp;</td></tr><tr><td>Global\Mon Apr 24 07:19:54 2023&nbsp;</td></tr><tr><td>Global\Mon Feb 27 08:11:25 2023&nbsp;</td></tr><tr><td>Global\Mon Jun 14 03:22:57 2021&nbsp;</td></tr><tr><td>Global\Mon Mar 13 07:29:11 2023&nbsp;</td></tr><tr><td>Global\Mon Mar 22 09:16:00 2021&nbsp;</td></tr><tr><td>Global\Sun Jun 13 08:22:07 2021&nbsp;</td></tr><tr><td>Global\Thu Aug 10 03:25:11 2023&nbsp;</td></tr><tr><td>Global\Thu Aug 12 02:07:58 2021&nbsp;</td></tr><tr><td>Global\Thu Feb 23 08:37:09 2023&nbsp;</td></tr><tr><td>Global\Thu Mar 25 02:03:14 2021&nbsp;</td></tr><tr><td>Global\Thu Mar 25 09:31:19 2021&nbsp;</td></tr><tr><td>Global\Thu Nov&nbsp; 2 08:21:56 2023&nbsp;</td></tr><tr><td>Global\Thu Nov&nbsp; 9 06:19:40 2023&nbsp;</td></tr><tr><td>Global\Tue Apr 25 08:32:05 2023&nbsp;</td></tr><tr><td>Global\Tue Mar 23 02:37:32 2021&nbsp;</td></tr><tr><td>Global\Tue Oct 10 08:07:11 2023&nbsp;</td></tr><tr><td>Global\Wed Aug 11 09:16:37 2021&nbsp;</td></tr><tr><td>Global\Wed Jan&nbsp; 5 09:15:56 2022&nbsp;</td></tr><tr><td>Global\Wed Jun&nbsp; 2 09:43:03 2021&nbsp;</td></tr><tr><td>Global\Wed Mar&nbsp; 1 01:29:48 2023&nbsp;</td></tr><tr><td>Global\Wed Mar 23 08:56:01 2022&nbsp;</td></tr><tr><td>Global\Wed Mar 23 09:06:36 2022&nbsp;</td></tr><tr><td>Global\Wed May 10 06:38:46 2023&nbsp;</td></tr><tr><td>Global1&nbsp;</td></tr><tr><td>GlobalMIVOD_V4&nbsp;</td></tr><tr><td>GMCM1&nbsp;</td></tr><tr><td>MIVOD_6&nbsp;</td></tr><tr><td>MTX_EX01&nbsp;</td></tr><tr><td>Mutex_ONLY_ME_V1&nbsp;</td></tr><tr><td>Mutex_ONLY_ME_V2&nbsp;</td></tr><tr><td>Mutex_ONLY_ME_V3&nbsp;</td></tr><tr><td>PROCESS_&nbsp;</td></tr><tr><td>SLDV014&nbsp;</td></tr><tr><td>SLDV02&nbsp;</td></tr><tr><td>SLDV024&nbsp;</td></tr><tr><td>SLDV04&nbsp;</td></tr><tr><td>SLDV10&nbsp;</td></tr><tr><td>SLDV11&nbsp;</td></tr><tr><td>SLDV13&nbsp;</td></tr><tr><td>SLDV15&nbsp;</td></tr><tr><td>SLDV17&nbsp;</td></tr><tr><td>SLDV22&nbsp;</td></tr><tr><td>SLDV26&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading"><strong>Stage 0 – Installation Process&nbsp;</strong></h3>



<figure class="wp-block-table"><table><tbody><tr><td><strong>IoC</strong>&nbsp;</td><td><strong>Note</strong>&nbsp;</td></tr><tr><td>http://update3[.]mwti[.]net/pub/update/updll3.dlz&nbsp;</td><td>&nbsp;</td></tr><tr><td>c3122448ae3b21ac2431d8fd523451ff25de7f6e399ff013d6fa6953a7998fa3&nbsp;</td><td>C:\Program Files\eScan\VERSION.DLL&nbsp;</td></tr><tr><td>7a1554fe1c504786402d97edecc10c3aa12bd6b7b7b101cfc7a009ae88dd99c6&nbsp;</td><td>updll65.dlz&nbsp;</td></tr></tbody></table></figure>



<h3 class="wp-block-heading"><strong>Stage 1 – PNG Loader&nbsp;</strong></h3>



<figure class="wp-block-table"><table><tbody><tr><td><strong>IoC</strong>&nbsp;</td><td><strong>Note</strong>&nbsp;</td></tr><tr><td>ff884d4c01fccf08a916f1e7168080a2d740a62a774f18e64f377d23923b0297&nbsp;</td><td>&nbsp;</td></tr><tr><td>ext.peepzo[.]com&nbsp;</td><td>&nbsp;</td></tr><tr><td>crl.peepzo[.]com&nbsp;</td><td>&nbsp;</td></tr><tr><td>ns1.peepzo[.]com&nbsp;</td><td>&nbsp;</td></tr><tr><td>http://www.deanmiller[.]net/m/&nbsp;</td><td>&nbsp;</td></tr><tr><td>294b73d38b89ce66cfdefa04b1678edf1b74a9b7f50343d9036a5d549ade509a&nbsp;</td><td>&nbsp;</td></tr><tr><td>185.45.192[.]43/elimp/&nbsp;</td><td>&nbsp;</td></tr><tr><td>6305d66aac77098107e3aa6d85af1c2e3fc2bb1f639e4a9da619c8409104c414</td><td></td></tr><tr><td>SYSTEM\CurrentControlSet\Control\Arbiters\Class&nbsp;</td><td>Registry&nbsp;</td></tr><tr><td>SYSTEM\CurrentControlSet\Control\CMF\Class&nbsp;</td><td>Registry&nbsp;</td></tr><tr><td>SYSTEM\CurrentControlSet\Control\CMF\CORE&nbsp;</td><td>Registry&nbsp;</td></tr><tr><td>SYSTEM\CurrentControlSet\Control\CMF\DEF&nbsp;</td><td>Registry&nbsp;</td></tr><tr><td>SYSTEM\CurrentControlSet\Control\CMF\Els&nbsp;</td><td>Registry&nbsp;</td></tr><tr><td>SYSTEM\CurrentControlSet\Control\CMF\ASN&nbsp;</td><td>Registry&nbsp;</td></tr><tr><td>SYSTEM\CurrentControlSet\Control\MSDTC\BSR&nbsp;</td><td>Registry&nbsp;</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/guptiminer-exploits/">GuptiMiner Exploits eScan to Distribute Miners and Backdoors</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/guptiminer-exploits/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages</title>
		<link>https://firsthackersnews.com/tycoon-2fa-attacks/</link>
					<comments>https://firsthackersnews.com/tycoon-2fa-attacks/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 26 Mar 2024 16:54:03 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[2FA kits]]></category>
		<category><![CDATA[AiTM phishing kit]]></category>
		<category><![CDATA[Credentials]]></category>
		<category><![CDATA[phishing campaign]]></category>
		<category><![CDATA[phishing kits]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Tycoon]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7623</guid>

					<description><![CDATA[<p>Cybercriminals leverage 2FA (Two-Factor Authentication) phishing kits to bypass the added security layer provided by 2FA. These kits</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/tycoon-2fa-attacks/">Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybercriminals leverage 2FA (Two-Factor Authentication) phishing kits to bypass the added security layer provided by 2FA.</p>



<p>These kits typically replicate genuine login interfaces and prompt users to input their credentials alongside the one-time passcodes generated by their authenticator apps or sent via SMS.</p>



<p>In October 2023, through proactive threat detection, Sekoia analysts uncovered a newly pervasive Adversary-in-The-Middle (AiTM) phishing kit named Tycoon 2FA.</p>



<p>Since at least August 2023, this Phishing-as-a-Service (PhaaS) platform has been actively utilized by various threat actors to execute successful phishing campaigns.</p>



<h2 class="wp-block-heading"><strong>How do the Tycoon 2FA attacks work?</strong></h2>



<p><br>The utilization of QR codes for phishing surged in October 2023. Numerous AiTM phishing pages exhibited common traits, including:</p>



<ul class="wp-block-list"><li>Deobfuscated scripts</li><li>CloudFlare Turnstile employed for protection</li><li>Utilization of specific CSS resources</li><li>Employment of WebSocket for data exfiltration</li></ul>



<p>Using urlscan.io, researchers identified hundreds of similar phishing pages in October 2023 by searching for specific CSS filenames.</p>



<p>The pages sourced resources from codecrafterspro[.]com, indicating its centrality.</p>



<p>Related domains such as codecrafters[.]su and devcraftingsolutions[.]com hosted phishing materials featuring a login panel marked &#8220;Powered by TycoonGroup.&#8221;</p>



<p>The tycoongroup[.]ws domain endorsed Tycoon as the &#8220;premier 2FA bypass phishing platform,&#8221; establishing a link to the Tycoon 2FA phishing platform.</p>



<p>Researchers analyzed victim-facing interactions without accessing Tycoon&#8217;s source code. Tycoon employs AiTM, with an attacker server hosting the phishing page, relaying inputs to the legitimate service, prompting MFA, and capturing session cookies post successful MFA. </p>



<p>Stolen cookies permit MFA bypass via session replay, even if credentials are altered. Key operations of Tycoon are summarized below.</p>



<p>There are a total 7 stages and here below we have mentioned them:-</p>



<ul class="wp-block-list"><li><strong>Stage 0 –</strong>&nbsp;Spreading phishing pages</li><li><strong>Stage 1 –</strong>&nbsp;Cloudflare Turnstile challenge</li><li><strong>Stage 2 –</strong>&nbsp;Email extractor</li><li><strong>Stage 3 –</strong>&nbsp;Redirection page</li><li><strong>Stage 4 –</strong>&nbsp;Fake Microsoft authentication login page and sockets</li><li><strong>Stage 5 –</strong>&nbsp;2FA relaying</li><li><strong>Stage 6 –</strong>&nbsp;Final redirection</li></ul>



<p>The Tycoon 2FA phishing kit gathers credentials through counterfeit Microsoft pages, with a C2 server gathering data via WebSockets. </p>



<p>Recent updates incorporate stealth measures like requiring resolution of a CloudFlare challenge before providing malicious resources, employing randomized URLs, and filtering traffic to elude analysis. Unlike earlier versions, which utilized identifiable filenames, these alterations render tracking more challenging.</p>



<p>However, Sekoia discovered heuristics linking authentic resource names, C2 response data size, and resource lengths to persistently monitor the evolving Tycoon 2FA infrastructure. Despite its widespread adoption, the developer has bolstered the kit&#8217;s stealth capabilities in the latest iteration. </p>



<p>Due to its affordability and user-friendly interface, Tycoon 2FA has gained traction among threat actors. </p>



<p>Sekoia has identified over 1,200 associated domain names since August 2023, indicating the profitability of Tycoon Group operations. They anticipate Tycoon 2FA to remain a significant threat in the AiTM phishing market throughout 2024.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IoCs</strong></h2>



<ul class="wp-block-list"><li>0q5e0.nemen9[.]com</li><li>25rw2.canweal[.]com</li><li>35fu2.ouchar[.]ru</li><li>4343w.jgu0[.]com</li><li>43rw98nop8.m1p8z[.]com</li><li>4m2swl.7e2r[.]com</li><li>Cybersecurity Threats5me78.methw[.]ru</li><li>6j312.rchan0[.]com</li><li>77p3e.rimesh3[.]com</li><li>8000n.uqin[.]ru</li><li>8uecv.gnornamb[.]com</li><li>98q5e.ructin[.]com</li><li>9c43r.theq0[.]com</li><li>9oc0y2isa27.demur3[.]com</li><li>beacon.diremsto[.]com</li><li>bloggcenter[.]com</li><li>buneji.fiernmar[.]com</li><li>e85t8.nechsha[.]com</li><li>ex1uo.rhknt[.]ru</li><li>explore.atlester[.]ru</li><li>fiq75d.rexj[.]ru</li><li>fisaca.trodeckh[.]com</li><li>galume.aricente[.]com</li><li>gz238.uatimin[.]com</li><li>horizon.sologerg[.]com</li><li>jp1y36.it2ua[.]com</li><li>k348d.venti71[.]com</li><li>kjlvo.ningeona[.]com</li><li>kjsdflwe.nitertym[.]ru</li><li>l846d.ferver8[.]com</li><li>libudi.oreversa[.]com</li><li>n29k4.ilert[.]ru</li><li>n9zph.lw8opi[.]com</li><li>o6t94g.3tdx2r[.]com</li><li>oo99v.coqqwx[.]ru</li><li>p1v12.17nor[.]com</li><li>pmd8ot6xhw.3qjpc[.]com</li><li>q908q.refec7[.]com</li><li>r298y.sem01[.]com</li><li>rlpq.tk9u[.]com</li><li>roriku.orankfix[.]com</li><li>tlger-surveillance[.]com</li><li>tnyr.moporins[.]com</li><li>wasogo.shantowd[.]com</li><li>x12y.restrice[.]ru</li><li>xrs.chenebystie[.]com</li><li>xva.tjlpkcia[.]com</li><li>zaqaxu.dthiterp[.]ru</li><li>zekal6.tnjxb[.]com</li><li>zemj4f.ymarir[.]ru</li></ul>



<h2 class="wp-block-heading" id="h-cryptocurrency-wallet-address"><strong>Cryptocurrency Wallet Address</strong></h2>



<ul class="wp-block-list"><li>19NReVFKJsYYCCFLq1uNKYrUqQE2bB4Jwx used by Saad Tycoon Group</li></ul>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/tycoon-2fa-attacks/">Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/tycoon-2fa-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Sysrv Botnet Abuses Google Subdomain to Spread XMRig Miner</title>
		<link>https://firsthackersnews.com/sysrv-botnet/</link>
					<comments>https://firsthackersnews.com/sysrv-botnet/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 25 Mar 2024 16:15:08 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Google subdomain]]></category>
		<category><![CDATA[Miner]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Sysrv]]></category>
		<category><![CDATA[XMRig]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7608</guid>

					<description><![CDATA[<p>First identified in 2020, the Sysrv botnet leverages a Golang worm to infect devices, deploying cryptominers through network</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sysrv-botnet/">New Sysrv Botnet Abuses Google Subdomain to Spread XMRig Miner</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>First identified in 2020, the Sysrv botnet leverages a Golang worm to infect devices, deploying cryptominers through network vulnerability exploits. </p>



<h2 class="wp-block-heading"><strong>New Sysrv Botnet Abuses Google Subdomain</strong></h2>



<p>Continuously updated by its operators, researchers have documented its evolution, exploring the latest variant&#8217;s infection chain, new methods, and Indicators of Compromise (IoCs).</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="897" height="520" src="https://firsthackersnews.com/wp-content/uploads/2024/03/image-6.png" alt="" class="wp-image-7609" srcset="https://firsthackersnews.com/wp-content/uploads/2024/03/image-6-200x116.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/03/image-6-300x174.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/03/image-6-400x232.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/03/image-6-600x348.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/03/image-6-768x445.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/03/image-6-800x464.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/03/image-6.png 897w" sizes="auto, (max-width: 897px) 100vw, 897px" /><figcaption>Flow chart representing the infection chain<br></figcaption></figure>



<p>In early March, Imperva Threat Research identified a botnet based on blocked HTTP requests hitting their proxies, displaying bot traffic characteristics. This botnet targeted a significant number of websites across multiple countries.</p>



<p>The requests exhibited common identifiers and targeted vulnerabilities in Apache Struts (CVE-2017-9805) and Atlassian Confluence (CVE-2023-22527 and CVE-2021-26084).</p>



<p>The analyzed dropper script, &#8220;ldr.sh,&#8221; resembles past Sysrv botnet iterations. It defines variables for the compromised site URL (&#8220;cc&#8221;) and a random string (&#8220;sys&#8221;) based on the MD5 hash of the date. Additionally, it includes a &#8220;get&#8221; function responsible for downloading files from provided URLs. This function is later utilized to download and execute the second-stage malware from the compromised site.</p>



<p>Before downloading, the script aggressively disrupts endpoint security by terminating processes and uninstalling programs associated with past cryptominer infections and existing anti-malware solutions. It then searches for SSH hosts and keys, attempting to spread the script laterally via SSH.</p>



<p>The latest Sysrv botnet variant includes additional functions to prepare various CPU architectures for upcoming cryptomining, showing significant improvements over previous versions. It remains a statically linked Golang binary packed with UPX, dropping multiple ELF files throughout the system and starting a listener for persistence, indicating enhancements in persistence mechanisms compared to earlier campaigns.</p>



<p>Imperva malware researchers observed obfuscation in a Golang binary, which prevented the use of GoReSym or Redress for analysis. Dynamic analysis revealed that the malware downloaded a second-stage binary from a Google subdomain (sites.google.com) disguised as a legitimate error page. </p>



<p>The decoded and unpacked binary is an XMRig miner connecting to the MoneroOcean mining pool (gulf.moneroocean.stream:10128, 109.123.233.251:443) for the wallet 483F2xjkCUegxPM7wAexam1Be67EqDRZpS7azk8hcGETSustmuxd1Agffa3XSHFyzeFprLyHKm37bTPShFUTKgctMSBVuuKThe wallet has 6 workers and generates around 57 XMR (roughly 6800 USD) per year.</p>



<p><br>Sysrv botnet actors are utilizing compromised legitimate domains to host malicious scripts (ldr.sh, cron) that download and execute XMRig cryptominer on infected devices. </p>



<p>These scripts connect to mining pools (gulf.moneroocean.stream, 109.123.233.251) to mine XMR cryptocurrency for the attackers. </p>



<p>Several indicators of compromise (IOCs) were identified, including URLs, file hashes (e.g., ldr.sh: 6fb9b4dced1cf53a), and a wallet address (483F2xjkCUegxPM7wAexam1Be67EqDRZpS7azk8hcGETSustmuxd1Agffa3XSHFyzeFprL yHKm37bTPShFUTKgctMSBVuuK), which can aid defenders in detecting and mitigating this malicious campaign.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sysrv-botnet/">New Sysrv Botnet Abuses Google Subdomain to Spread XMRig Miner</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/sysrv-botnet/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Androxgh0st exploits SMTP services to steal critical data</title>
		<link>https://firsthackersnews.com/androxgh0st-exploits-smtp/</link>
					<comments>https://firsthackersnews.com/androxgh0st-exploits-smtp/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 20 Mar 2024 17:41:00 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Androxgh0st]]></category>
		<category><![CDATA[Compromise]]></category>
		<category><![CDATA[Credential harvesting]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[SMTP services]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7590</guid>

					<description><![CDATA[<p>AndroxGh0st targets Laravel applications, scanning and extracting login credentials for AWS and Twilio from .env files. AndroxGh0st, previously</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/androxgh0st-exploits-smtp/">Androxgh0st exploits SMTP services to steal critical data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>AndroxGh0st targets Laravel applications, scanning and extracting login credentials for AWS and Twilio from .env files.</p>



<p>AndroxGh0st, previously identified as an SMTP cracker, utilizes multiple strategies including credential exploitation, web shell deployment, and vulnerability scanning. However, its primary objective is to compromise hosts and extract critical data from Laravel applications, showcasing adaptive capabilities.</p>



<h2 class="wp-block-heading"><strong>Androxgh0st Exploits SMTP</strong></h2>



<p>According to Juniper&#8217;s reports, the malware boasts menu options that showcase its full range of functionalities and features.</p>



<p>These options include &#8220;awslimitcheck,&#8221; &#8220;sendgridcheck,&#8221; &#8220;twilio_sender,&#8221; &#8220;exploit,&#8221; and many others, each with distinct usages and capabilities.</p>



<p><br>The &#8220;awslimitcheck&#8221; option is utilized to verify AWS account limits and gather information on email-sending quotas.</p>



<p>Similarly, the &#8220;sendgridcheck&#8221; option is tailored to inspect and report crucial details regarding a SendGrid API key, including total email credits, used credits, and the &#8216;Mail from&#8217; address linked with the SendGrid account.</p>



<p>The &#8220;Twilio_sender&#8221; function facilitates sending SMS messages through the Twilio API, as well as verifying the Twilio account status and balance, and conducting a test SMS to a predefined number.</p>



<p>Meanwhile, the &#8220;exploit&#8221; function targets the PHP unit testing framework, enabling the execution of arbitrary PHP code by sending a crafted POST request to a specific URI.</p>



<p>Furthermore, the malware exploits three critical vulnerabilities found in Laravel web applications, identified by the CVEs CVE-2017-9841, CVE-2018-15133, and CVE-2021-41773.</p>



<p><br>The attack chain begins by gaining access to the vulnerable system through CVE-2021-41773, which exploits a weakness in Apache.</p>



<p>Subsequently, the malware leverages CVE-2017-9841 and CVE-2018-15133 to execute code and establish persistent control over the targeted system.</p>



<p>While AndroxGh0st offers diverse functions for various purposes, executing these actions on targeted systems poses several challenges for threat actors.</p>



<p>The awslimitcheck function demands valid AWS credentials, the Boto3 library, and proper AWS SES (Simple Email Service) configuration.</p>



<p>For the sendgridcheck function, a valid SendGrid API key with necessary permissions is essential to retrieve required information.</p>



<p>The twilio_sender option necessitates a valid Twilio account, Auth token, and Twilio phone number with sufficient balance for data extraction and SMS sending.</p>



<p>Lastly, the exploit option relies on the presence of the PHPUnit vulnerability in the target system for successful exploitation.</p>



<p><br>Furthermore, the threat actor needs knowledge of the vulnerable URI and must craft a payload to bypass any existing security measures.</p>



<p>Additionally, validating successful exploitation requires access to server logs and other monitoring mechanisms.</p>



<p>Should the malware successfully exploit CVE-2017-9841, CVE-2018-15133, and CVE-2021-41773, the potential consequences include data breaches and network disruptions.</p>



<h2 class="wp-block-heading"><strong>Indicators Of Compromise</strong></h2>



<h3 class="wp-block-heading"><strong>File Samples</strong></h3>



<ul class="wp-block-list"><li>f6f240dc2d32bfd83b49025382dc0a1cf86dba587018de4cd96df16197f05d88 – AndroxGhost python sample</li><li>3b04f3ae4796d77e5a458fe702612228b773bbdefbb64f20d52c574790b5c81a – AndroxGhost python sample</li></ul>



<h3 class="wp-block-heading"><strong>Linux Miners</strong></h3>



<ul class="wp-block-list"><li>23fc51fde90d98daee27499a7ff94065f7ed4ac09c22867ebd9199e025dee066 – Linux Miner dropped</li><li>6b5846f32d8009e6b54743d6f817f0c3519be6f370a0917bf455d3d114820bbc – Linux Miner dropped</li><li>bb7070cbede294963328119d1145546c2e26709c5cea1d876d234b991682c0b7 – Linux miner dropped</li></ul>



<h3 class="wp-block-heading"><strong>PHP Webshell</strong></h3>



<ul class="wp-block-list"><li>ca45a14d0e88e4aa408a6ac2ee3012bf9994b16b74e3c66b588c7eabaaec4d72 – PHP Webshell</li><li>0df17ad20bf796ed549c240856ac2bf9ceb19f21a8cae2dbd7d99369ecd317ef – PHP Webshell</li></ul>



<h3 class="wp-block-heading"><strong>TOP IP – Attack Originated From</strong></h3>



<ul class="wp-block-list"><li>103.121.39[.]54</li><li>185.16.39[.]37</li><li>155.138.245[.]246</li><li>149.50.102[.]48</li><li>45.143.200[.]14</li><li>45.135.232[.]19</li><li>45.129.14[.]224</li><li>91.92.245[.]67</li><li>64.225.6[.]114</li><li>122.189.200[.]188</li><li>66.135.11[.]147</li><li>155.248.212[.]175</li><li>118.31.17[.]168</li><li>45.135.232[.]28</li><li>77.90.185[.]106</li><li>194.26.135[.]68</li><li>218.107.208[.]71</li><li>172.98.33[.]153</li><li>5.255.115[.]40</li><li>45.134.26[.]85</li><li>180.101.88[.]225</li><li>180.101.88[.]237</li><li>80.66.76[.]80</li><li>83.97.73[.]76</li><li>91.240.118[.]221</li><li>91.240.118[.]228</li><li>109.123.229[.]56</li><li>213.109.202[.]210</li><li>213.109.202[.]145</li><li>180.101.88[.]230</li><li>180.101.88[.]220</li><li>103.96.40[.]38</li><li>128.199.237[.]61</li><li>173.199.117[.]55</li><li>62.20441[.]80</li><li>77.83.36[.]40</li><li>103.255.191[.]43</li><li>213.109[.]202.167</li><li>141[.]98.11.107</li><li>162.0[.]234.118</li><li>91.240.118[.]224</li><li>185.248[.]2476</li><li>185.161.248[.]148</li><li>38.175.192[.]78</li><li>176.113.115[.]220</li><li>77.90.185[.]102</li><li>80.66.66[.]225</li><li>200.54.189[.]98</li><li>185.234.216[.]125</li><li>176.113.115[.]184&nbsp;</li></ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/androxgh0st-exploits-smtp/">Androxgh0st exploits SMTP services to steal critical data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/androxgh0st-exploits-smtp/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Exploit SVG Image Files for GUloader Malware Distribution</title>
		<link>https://firsthackersnews.com/guloader-malware-distribution/</link>
					<comments>https://firsthackersnews.com/guloader-malware-distribution/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 29 Feb 2024 17:17:29 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[GuLoader]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Stealthy malware]]></category>
		<category><![CDATA[SVG files]]></category>
		<category><![CDATA[SVG image files]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7473</guid>

					<description><![CDATA[<p>Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of the GUloader malware.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/guloader-malware-distribution/">Hackers Exploit SVG Image Files for GUloader Malware Distribution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of the GUloader malware.</p>



<h2 class="wp-block-heading"><strong>Hackers Exploit SVG Image Files for GUloader Malware</strong></h2>



<p>GuLoader is notorious for its stealth capabilities and capacity to circumvent conventional security measures by employing polymorphic code and encryption. </p>



<p>These features enable it to constantly alter its structure, posing challenges for antivirus software and intrusion detection systems in detecting its presence. SpiderLabs&#8217; observations indicate a significant surge in the utilization of GuLoader.</p>



<p>McAfee Labs has recently detected a campaign involving the distribution of GUloader through malicious SVG files delivered via email.</p>



<p>SVG stands for Scalable Vector Graphics. Furthermore, it is a widely used file format for vector graphics that describes two-dimensional graphics in XML format. Moreover, SVG files are used for various purposes, including web design, icons, logos, illustrations, and interactive graphics.</p>



<p>One of the main advantages of SVG files is that they can be scaled to any size without losing quality, making them ideal for responsive web design and high-resolution displays. Additionally, SVG files can be edited with text editors or graphic design software. Moreover, they support features like animations and interactivity through JavaScript.</p>



<p>The infection process initiates when a user opens an SVG file attached to an email. This action prompts the browser to download a ZIP file that contains a Windows Script File (WSF).</p>



<p>The WSF file then executes, utilizing wscript to invoke a PowerShell command that establishes a connection to a malicious domain. Consequently, it executes hosted content, including shellcode injected into the MSBuild application.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="932" height="227" src="https://firsthackersnews.com/wp-content/uploads/2024/02/image.png" alt="" class="wp-image-7474" srcset="https://firsthackersnews.com/wp-content/uploads/2024/02/image-200x49.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-300x73.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-400x97.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-600x146.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-768x187.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-800x195.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/02/image.png 932w" sizes="auto, (max-width: 932px) 100vw, 932px" /></figure>



<h2 class="wp-block-heading"><strong>More details</strong></h2>



<p>The attack begins with a spam email containing an SVG file named “dhgle-Skljdf.svg”. Embedded JavaScript within the SVG file triggers the creation of a malicious ZIP archive upon opening.</p>



<p>Once extracted, the ZIP file reveals an obfuscated WSF script, thereby complicating analysis.</p>



<p>This script employs PowerShell to establish a connection to a malicious domain and execute the retrieved content. Additionally, this content includes base64-encoded shellcode and a PowerShell script.</p>



<p><br>The PowerShell script endeavors to inject the shellcode into the legitimate MSBuild process through the Process Hollowing technique.</p>



<p>Following injection, the shellcode conducts an anti-analysis check and alters the Registry run key to establish persistence.</p>



<p>In the last stage, the process entails downloading and executing the final malicious executable, GUloader, or its variants.</p>



<p><br>The utilization of SVG files to distribute malware such as GUloader represents a worrisome advancement in the cybersecurity realm.</p>



<p>It&#8217;s imperative for organizations and individuals to exercise caution when encountering unexpected email attachments, particularly those containing SVG files. </p>



<p>Additionally, security professionals should prioritize updating their detection systems to effectively mitigate this evolving threat.</p>



<h2 class="wp-block-heading"><strong>IOCs</strong></h2>



<figure class="wp-block-table is-style-stripes"><table><tbody><tr><td><strong>File</strong></td><td><strong>SHA256/URL</strong></td></tr><tr><td>Email</td><td>66b04a8aaa06695fd718a7d1baa19386922b58e797634d5ac4ff96e79584f5c1</td></tr><tr><td>SVG</td><td>b20ea4faca043274bfbb1f52895c02a15cd0c81a333c40de32ed7ddd2b9b60c0</td></tr><tr><td>WSF</td><td>0a196171571adc8eb9edb164b44b7918f83a8425ec3328d9ebbec14d7e9e5d93</td></tr><tr><td>URL</td><td>hxxps://winderswonders[.]com/JK/Equitably[.]mix</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/guloader-malware-distribution/">Hackers Exploit SVG Image Files for GUloader Malware Distribution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/guloader-malware-distribution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Compromised PyPI Package Deploys NovaSentinel Stealer on Windows</title>
		<link>https://firsthackersnews.com/compromised-pypi-package/</link>
					<comments>https://firsthackersnews.com/compromised-pypi-package/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 26 Feb 2024 03:06:22 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[compromise attack]]></category>
		<category><![CDATA[Novasentinel]]></category>
		<category><![CDATA[PyPI]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security recommendation]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[stealer]]></category>
		<category><![CDATA[stealermalware]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7447</guid>

					<description><![CDATA[<p>Researchers uncovered an advanced cyberattack involving a dormant Python Package Index (PyPI) package called Django-log-tracker, which was unexpectedly</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/compromised-pypi-package/">Compromised PyPI Package Deploys NovaSentinel Stealer on Windows</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Researchers uncovered an advanced cyberattack involving a dormant Python Package Index (PyPI) package called Django-log-tracker, which was unexpectedly updated to distribute the NovaSentinel stealer malware.</p>



<p>This finding underscores a substantial threat to the software supply chain, underscoring the imperative for developers and organizations to bolster their security measures.</p>



<h2 class="wp-block-heading"><strong>Compromised PyPI Package Deploys NovaSentinel Stealer</strong></h2>



<p>The django-log-tracker package, initially published in April 2022, remained inactive until a suspicious update on February 21, 2024, caught Phylum’s attention.</p>



<p>The deviation of the update from the GitHub repository&#8217;s activity indicated a potential compromise of the developer&#8217;s PyPI account. This incident underscores a worrying pattern of attackers exploiting inactive packages to carry out supply chain attacks.</p>



<p>The malevolent update stripped the package down to its core components, retaining only an <strong>init</strong>.py and example.py file, both housing identical malicious code.</p>



<p>Four sites on VirusTotal flagged the executable as hazardous. Upon closer examination, it appears to be an NSIS launcher, facilitating easy extraction of the binary&#8217;s data. Further inspection reveals the presence of an Electron application within.</p>



<figure class="wp-block-image"><img decoding="async" src="https://blog.phylum.io/content/images/2024/02/Screenshot-2024-02-21-at-10.56.12-PM.png" alt=""/></figure>



<p>Upon execution, this code initiates the download and execution of an executable titled &#8220;Updater_1.4.4_x64.exe&#8221; from a remote server. This executable harbors the NovaSentinel stealer malware on Windows, renowned for its capacity to extract sensitive information from compromised systems.</p>



<p>NovaSentinel, initially documented by Sekoia in November 2023, has been disseminated via counterfeit Electron applications on websites providing video game downloads. This recent compromise of a PyPI package signifies an endeavor at a supply chain attack, exploiting the trust inherent within the developer community to propagate malware.</p>



<p>The django-log-tracker package had garnered 3,866 downloads, while the rogue version 1.0.4 was downloaded 107 times on the day of its release. Phylum&#8217;s swift detection and reporting prompted the removal of the package from PyPI, halting further downloads and mitigating the risk of potential infections.</p>



<p>Phylum’s discovery emphasizes the critical need for vigilance and the adoption of strong security measures when interacting with third-party packages. Developers and organizations are urged to thoroughly review package updates, particularly those from inactive projects, and to utilize automated security tools capable of identifying abnormal behaviors.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/compromised-pypi-package/">Compromised PyPI Package Deploys NovaSentinel Stealer on Windows</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/compromised-pypi-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Mastodon Security Flaw Enables Account Takeover</title>
		<link>https://firsthackersnews.com/mastodon-account-vulnerability/</link>
					<comments>https://firsthackersnews.com/mastodon-account-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 20 Feb 2024 15:52:15 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Mastodon]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7416</guid>

					<description><![CDATA[<p>Cybersecurity experts have uncovered a critical vulnerability in the decentralized social network Mastodon, potentially enabling unauthorized access and</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mastodon-account-vulnerability/">Mastodon Security Flaw Enables Account Takeover</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity experts have uncovered a critical vulnerability in the decentralized social network Mastodon, potentially enabling unauthorized access and account takeover. Fortunately, a fix is already available for this flaw.</p>



<h2 class="wp-block-heading"><strong>MASTODON ACCOUNT TAKEOVER VULNERABILITY PUBLISHED</strong></h2>



<p>CVE-2024-23832 has been assigned a critical severity rating of 9.4 out of 10 due to its potential impact and ease of exploitation. At the core of this vulnerability is a flaw in how Mastodon handles user authentication, particularly in the processing of session tokens. Attackers can exploit this flaw to impersonate legitimate users. Versions affected include Mastodon 3.1.2 through 3.3.0, as well as 4.0.x versions prior to 4.0.13, 4.1.x versions prior to 4.1.13, and 4.2.x versions.</p>



<p>Exploiting this flaw involves sending a malicious request to the affected application. Successful exploitation could result in unauthorized code execution on the server, providing attackers with the ability to manipulate or access sensitive data. </p>



<p>The potential impact of this vulnerability is extensive. Attackers could use it to carry out various unauthorized actions, such as posting content, accessing private messages, and altering account settings without the user&#8217;s knowledge or consent.</p>



<h2 class="wp-block-heading"><strong>PATCH DEPLOYMENT</strong></h2>



<p>The patch has been incorporated into a recent Mastodon release, accessible for administrators of Mastodon instances to download and install. Detailed installation instructions and support are provided to facilitate a seamless update process. The vulnerability has been addressed in versions 3.3.1 and beyond. Users of impacted instances are advised to upgrade to this version or a later one.</p>



<p>Mastodon intends to withhold further technical details about the vulnerability until February 15, 2024. This delay aims to provide server admins with ample time to update their instances and mitigate the risk of exploitation. Additionally, the Mastodon team pledges to monitor the network continuously for any abnormal activity, promptly addressing any potential exploitation of the vulnerability.</p>



<h2 class="wp-block-heading"><strong>SECURITY TIPS</strong></h2>



<p>Upon discovery, the Mastodon development team promptly responded, recognizing the severity of the issue and taking immediate steps to mitigate the risk. Therefore, it is crucial to heed their advice: install the update, and you will be protected. The recent surge of account hijackings on X/Twitter serves as a stark reminder of the chaos that a vulnerability of this nature can unleash.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mastodon-account-vulnerability/">Mastodon Security Flaw Enables Account Takeover</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/mastodon-account-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
