<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyberattack &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malicious-cyber-actors/cyberattack/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Sun, 03 May 2026 21:10:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>cyberattack &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Trellix Confirms Source Code Repository Breach</title>
		<link>https://firsthackersnews.com/trellix-security-breach/</link>
					<comments>https://firsthackersnews.com/trellix-security-breach/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 03 May 2026 21:09:42 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[#BlueTeam]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityBreach]]></category>
		<category><![CDATA[#securityincident]]></category>
		<category><![CDATA[#SOC]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Trellix]]></category>
		<category><![CDATA[#XDR]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11686</guid>

					<description><![CDATA[<p>Cybersecurity firm Trellix has disclosed that attackers gained unauthorized access to a portion of its internal source code</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/trellix-security-breach/">Trellix Confirms Source Code Repository Breach</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity firm Trellix has disclosed that attackers gained unauthorized access to a portion of its internal source code repository. The company identified the activity and quickly initiated an incident response, bringing in external forensic experts and notifying law enforcement.</p>



<p>Source code environments are considered high-value targets because they reveal the inner workings of security products. Even limited access can give attackers insights into detection logic, configurations, or potential weaknesses that could be studied for future exploitation or used in supply chain-style attacks.</p>



<h2 class="wp-block-heading"><strong>Investigation Findings and Potential Risks</strong></h2>



<p>Trellix has stated that the breach appears contained and, at this stage, there is no evidence of direct impact on customers or product integrity.</p>



<p>Key findings so far include:</p>



<ul class="wp-block-list">
<li>No compromise of the build, release, or update pipeline</li>



<li>No signs of malicious code being inserted into products</li>



<li>No evidence of active exploitation using the accessed data</li>
</ul>



<p>However, the nature of source code exposure still raises concerns. Attackers could analyze the code offline to identify vulnerabilities, reverse-engineer protections, or develop evasion techniques against Trellix security tools.</p>



<p>The company is continuing a detailed forensic review to understand how the access occurred, what data was viewed or copied, and whether any long-term risks remain. Strengthening internal controls, access monitoring, and repository protections is likely part of the ongoing response.</p>



<p>This incident reflects a broader trend where attackers target software vendors instead of end users, aiming to gain leverage through trusted platforms. Similar breaches involving Microsoft, Okta, and LastPass show how valuable internal systems have become as entry points.</p>



<p>Trellix has committed to transparency and plans to release more technical details once the investigation is complete, helping the wider security community understand and defend against similar threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/trellix-security-breach/">Trellix Confirms Source Code Repository Breach</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/trellix-security-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Flags Axios npm Hack in Supply Chain Attack</title>
		<link>https://firsthackersnews.com/axios-npm-hack/</link>
					<comments>https://firsthackersnews.com/axios-npm-hack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 07:01:39 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#AxiosNpmHack]]></category>
		<category><![CDATA[#AxiosSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DevSecOps]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#JavaScriptSecurity]]></category>
		<category><![CDATA[#MalwareAttack]]></category>
		<category><![CDATA[#Nodejs]]></category>
		<category><![CDATA[#NpmSecurity]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SoftwareSecurity]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11617</guid>

					<description><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) has warned about a serious supply chain attack involving the popular</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/axios-npm-hack/">CISA Flags Axios npm Hack in Supply Chain Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity and Infrastructure Security Agency (CISA) has warned about a serious supply chain attack involving the popular Axios npm package, highlighting the potential for an axios npm hack.</p>



<p>Axios is a widely used JavaScript library that helps developers handle HTTP requests in both Node.js and browsers. Because it is used in so many projects, this axios npm hack can affect a large number of applications and development systems.</p>



<p>The attack took place on March 31, 2026, when hackers compromised two versions of Axios — 1.14.1 and 0.30.4. When developers installed these versions, a hidden malicious package called “plain-crypto-js” was automatically included without their knowledge, demonstrating the dangers of an axios npm hack.</p>



<p>This package acts as a loader. It connects to attacker-controlled servers and downloads additional malware. One of the main threats is a Remote Access Trojan (RAT), which allows attackers to gain control over infected machines.</p>



<p>If a developer’s system is affected, attackers can quietly steal sensitive data such as source code, environment variables, and credentials. They can also move deeper into company systems, including CI/CD pipelines, which increases the overall risk.</p>



<h2 class="wp-block-heading"><strong>What You Should Do Immediately</strong></h2>



<p>CISA recommends that organizations review their systems for any recent Axios updates. If the affected versions were installed, quick action is important.</p>



<p>Teams should downgrade to safe versions like 1.14.0 or 0.30.3 and remove the malicious “plain-crypto-js” package from their projects. It is also important to rotate all sensitive credentials, including API keys, SSH keys, and access tokens.</p>



<p>Monitoring network activity is another key step. Any unusual outbound connections should be investigated, and security scans should be run to ensure no hidden threats remain.</p>



<h2 class="wp-block-heading"><strong>How to Prevent Similar Attacks</strong></h2>



<p>This incident highlights how software supply chain attacks are becoming more advanced. Many of these attacks take advantage of default package manager settings that automatically install dependencies.</p>



<p>To reduce risk, organizations should strengthen their security practices. Enabling strong authentication for developer accounts can prevent unauthorized access. Disabling automatic script execution during installations can also block malicious behavior.</p>



<p>It is also a good practice to avoid using newly published packages without proper verification. Monitoring systems for unusual activity, such as unexpected processes or unknown network connections, can help detect threats early.</p>



<p>By taking these precautions, organizations can better protect their development environments from future attacks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/axios-npm-hack/">CISA Flags Axios npm Hack in Supply Chain Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/axios-npm-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Malicious npm Package Impersonates Gemini to Steal AI Tokens</title>
		<link>https://firsthackersnews.com/fake-gemini-npm-package/</link>
					<comments>https://firsthackersnews.com/fake-gemini-npm-package/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 18:57:53 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#APITokenTheft]]></category>
		<category><![CDATA[#CodeSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#FakePackage]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MaliciousPackage]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Nodejs]]></category>
		<category><![CDATA[#NpmSecurity]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#SoftwareSupplyChain]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11574</guid>

					<description><![CDATA[<p>Attackers are actively targeting developers by distributing a malicious npm package disguised as a tool for validating AI</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-gemini-npm-package/">Malicious npm Package Impersonates Gemini to Steal AI Tokens</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are actively targeting developers by distributing a malicious npm package disguised as a tool for validating AI tokens. The package pretends to be مرتبط with Google Gemini but is designed to quietly steal sensitive data from systems using popular AI development tools.</p>



<h3 class="wp-block-heading">How the Malicious Package Operates</h3>



<p>The fake package was uploaded under a seemingly legitimate name and presented as a utility for checking AI tokens. However, several warning signs were overlooked. The documentation was copied from an unrelated project, indicating a lack of authenticity, and the package structure was crafted to appear credible at first glance.</p>



<p>Once installed, the package connects to a remote server hosted on Vercel to fetch additional hidden code. Instead of storing malicious files on disk, it executes payloads directly in memory, making detection significantly harder.</p>



<p>Key behaviors observed:</p>



<ul class="wp-block-list">
<li>Contacts a remote endpoint to download and execute hidden scripts</li>



<li>Uses obfuscation to hide command-and-control (C2) details</li>



<li>Executes payloads in memory to bypass traditional security tools</li>



<li>Disguises itself with legitimate-looking files and dependencies</li>
</ul>



<p>Even after the main package was removed, related packages from the same source remain active and continue to be downloaded.</p>



<h3 class="wp-block-heading">Multi-Stage Malware Capabilities</h3>



<p>Further analysis revealed that the payload is not a simple script but a modular backdoor with multiple capabilities running in parallel. Each module performs a specific malicious function, allowing attackers to maintain control and extract valuable data.</p>



<p>Core functionalities include:</p>



<ul class="wp-block-list">
<li>Remote access module enabling attackers to control the infected system</li>



<li>Credential theft targeting browsers and cryptocurrency wallets</li>



<li>File exfiltration scanning for sensitive documents and configuration files</li>



<li>Clipboard monitoring to capture copied data such as keys or passwords</li>
</ul>



<p>The malware uses advanced obfuscation techniques, making it difficult to analyze. Its structure and behavior closely resemble known backdoors, particularly those linked to sophisticated threat campaigns.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">Focus on AI Development Environments</h3>



<p>The malicious code actively searches for folders linked to widely used AI tools such as Cursor, Claude, Gemini CLI, Windsurf, PearAI, and Eigent. These directories often store API keys, authentication tokens, and even conversation histories.</p>



<p>By extracting this data, attackers can misuse paid AI services, access proprietary code, and potentially pivot deeper into enterprise systems using additional credentials like SSH keys or cloud access tokens.</p>



<p>Key risks include:</p>



<ul class="wp-block-list">
<li>Theft of API keys and AI service tokens</li>



<li>Exposure of sensitive prompts and development data</li>



<li>Unauthorized use of paid AI platforms</li>



<li>Increased risk of broader infrastructure compromise</li>
</ul>



<h3 class="wp-block-heading">Detection and Defensive Measures</h3>



<p>From a defensive standpoint, visibility into unusual outbound traffic is critical. Monitoring connections to external infrastructure, especially uncommon endpoints, can help identify suspicious package behavior early.</p>



<p>Security teams can also leverage threat hunting techniques to detect patterns associated with multi-process Node.js malware and unusual communication channels such as Socket.IO-based command-and-control traffic.</p>



<p>Recommended actions:</p>



<ul class="wp-block-list">
<li>Monitor and restrict unnecessary outbound network connections</li>



<li>Watch for abnormal Node.js process activity</li>



<li>Identify unusual file access in developer environments</li>



<li>Use threat hunting queries to detect similar attack patterns</li>
</ul>



<h3 class="wp-block-heading">Securing Developer Workflows</h3>



<p>This campaign reflects a broader trend of supply chain attacks targeting developer ecosystems, particularly those involving AI tools. As these tools become deeply integrated into workflows, they also become high-value targets.</p>



<p>Developers should treat AI-related directories with the same level of sensitivity as critical folders like .ssh or cloud configuration paths. Before installing any package, it is essential to verify its authenticity, review its dependencies, and examine any unusual installation behavior.</p>



<p>Early reporting of suspicious packages and increased awareness within the developer community can significantly reduce the impact of such threats.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><tbody><tr><td class="has-text-align-left" data-align="left">Type</td><td class="has-text-align-left" data-align="left">Value</td><td class="has-text-align-left" data-align="left">Purpose</td></tr><tr><td class="has-text-align-left" data-align="left">Download URL</td><td class="has-text-align-left" data-align="left">server-check-genimi.vercel[.]app/defy/v3</td><td class="has-text-align-left" data-align="left">Malicious domain serving OtterCookie</td></tr><tr><td class="has-text-align-left" data-align="left">Download Token</td><td class="has-text-align-left" data-align="left">logo</td><td class="has-text-align-left" data-align="left">HTTP bearer token</td></tr><tr><td class="has-text-align-left" data-align="left">C2 IP Address</td><td class="has-text-align-left" data-align="left">216.126.237[.]71:4891 (AS14956 – RouterHosting LLC)</td><td class="has-text-align-left" data-align="left">RAT/C2</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Port</td><td class="has-text-align-left" data-align="left">4896</td><td class="has-text-align-left" data-align="left">File exfiltration</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Port</td><td class="has-text-align-left" data-align="left">4899</td><td class="has-text-align-left" data-align="left">Credential Theft</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Endpoint</td><td class="has-text-align-left" data-align="left">/api/service/makelog</td><td class="has-text-align-left" data-align="left">Initial connection containing victim fingerprinting info</td></tr><tr><td class="has-text-align-left" data-align="left">C2 Endpoint</td><td class="has-text-align-left" data-align="left">/api/service/process</td><td class="has-text-align-left" data-align="left">C2 command output reporting</td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-gemini-npm-package/">Malicious npm Package Impersonates Gemini to Steal AI Tokens</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fake-gemini-npm-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NoVoice: A Silent Rootkit Campaign Targeting Android Users</title>
		<link>https://firsthackersnews.com/novoice-android-malware/</link>
					<comments>https://firsthackersnews.com/novoice-android-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 09:43:11 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#GooglePlay]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#NoVoice]]></category>
		<category><![CDATA[#ThreatIntel]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11546</guid>

					<description><![CDATA[<p>A newly discovered Android threat called NoVoice Android malware highlights how advanced malware can quietly spread through trusted</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/novoice-android-malware/">NoVoice: A Silent Rootkit Campaign Targeting Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly discovered Android threat called NoVoice Android malware highlights how advanced malware can quietly spread through trusted platforms like Google Play. This campaign was found hiding inside more than 50 apps that appeared completely normal, including utility tools, casual games, and gallery apps.</p>



<p>These applications worked as expected, which helped them avoid suspicion and gain user trust. Before they were removed, they reached over 2.3 million downloads, exposing a large number of users.</p>



<p>The campaign mainly targets older Android devices by exploiting 22 known vulnerabilities that were originally patched between 2016 and 2021. Devices running outdated versions, especially Android 7 and below, are at the highest risk because they no longer receive security updates.</p>



<h3 class="wp-block-heading">Stealthy Entry Through Legitimate Apps</h3>



<p>The attack begins when a user installs one of the infected apps and opens it. Everything appears normal, but hidden code is triggered in the background during the app’s startup process.</p>



<p>To remain undetected, these apps request minimal permissions and include common frameworks like Firebase, analytics tools, and social SDKs. This helps them blend in with legitimate applications.</p>



<p>The initial malicious payload is hidden inside what looks like a normal image file. In reality, the image contains encrypted data attached to it. Once executed, the app extracts and decrypts this payload directly in memory, leaving very little trace behind.</p>



<p>The malware then runs a series of checks to avoid detection. It looks for emulators, debugging tools, VPNs, proxies, and even uses geofencing to skip certain regions. Only after passing these checks does it connect to its command-and-control server.</p>



<h3 class="wp-block-heading">Modular Payload and Deep System Control</h3>



<p>After connecting to its server, the malware downloads additional components disguised as harmless files. These components are customized based on the infected device.</p>



<p>It collects detailed information such as device model, kernel version, installed apps, and security patch level. Based on this, it selects the most effective exploit to gain control.</p>



<p>Once successful, the attackers gain root access and disable important security protections like SELinux. The rootkit then embeds itself into the system by modifying critical libraries, allowing it to inject malicious code into every app running on the device.</p>



<p>On older devices, this level of access allows the malware to survive even after a factory reset.</p>



<h3 class="wp-block-heading">WhatsApp Session Hijacking</h3>



<p>One of the most serious capabilities of this campaign is targeting WhatsApp.</p>



<p>When WhatsApp is opened, the malware extracts sensitive data, including encrypted databases and key identifiers used by the app. It also collects information such as phone number, country code, and account details.</p>



<p>This data is sent to attacker-controlled servers using encrypted communication that mimics legitimate traffic. With this information, attackers can clone or hijack the victim’s WhatsApp session on another device.</p>



<h3 class="wp-block-heading">Infrastructure and Evasion Techniques</h3>



<p>NoVoice uses a segmented infrastructure where different servers handle different tasks like device tracking, payload delivery, exploit hosting, and command execution.</p>



<p>It also uses cloud services to host its payloads, allowing attackers to quickly change servers if any part of the operation is detected. This makes the campaign more resilient and harder to shut down completely.</p>



<p>The techniques used in this campaign show similarities with previously known Android malware, especially in how it injects code into system processes and maintains persistence.</p>



<h3 class="wp-block-heading">Who Is Most at Risk</h3>



<p>Devices running newer Android versions with updated security patches are not affected by the specific exploits used in this campaign. However, they may still be exposed to other malicious components.</p>



<p>Older and unsupported devices remain the most vulnerable. Since they no longer receive updates, they continue to be exposed to known security flaws that attackers can exploit.</p>



<h3 class="wp-block-heading">Final Thoughts</h3>



<p>The NoVoice campaign is a strong reminder that even official app stores are not completely safe from advanced threats.</p>



<p>It also highlights the risks of using outdated devices. Keeping systems updated, being cautious with app installations, and using mobile security tools are essential steps to reduce exposure to such attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/novoice-android-malware/">NoVoice: A Silent Rootkit Campaign Targeting Android Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/novoice-android-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>VoidStealer Uses a Smarter Trick to Bypass Chrome Protection</title>
		<link>https://firsthackersnews.com/voidstealer-chrome-abe-bypass/</link>
					<comments>https://firsthackersnews.com/voidstealer-chrome-abe-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 23 Mar 2026 10:34:26 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BrowserSecurity]]></category>
		<category><![CDATA[#ChromeABEBypass]]></category>
		<category><![CDATA[#ChromeSecurity]]></category>
		<category><![CDATA[#CookieTheft]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberResilience]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MalwareTrends]]></category>
		<category><![CDATA[#SecurityOperations]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#ThreatIntel]]></category>
		<category><![CDATA[#VoidStealer]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11490</guid>

					<description><![CDATA[<p>A newer version of VoidStealer is getting attention for using a quieter way to steal protected data from</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/voidstealer-chrome-abe-bypass/">VoidStealer Uses a Smarter Trick to Bypass Chrome Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newer version of <strong>VoidStealer</strong> is getting attention for using a quieter way to steal protected data from Google Chrome. </p>



<p>Instead of depending on code injection or high-level privileges, it uses a debugger-based method to capture Chrome’s <strong>v20_master_key</strong> directly from memory during normal browser activity, making it a significant concern related to the <strong>VoidStealer Chrome ABE bypass</strong>.</p>



<p>This makes the technique especially concerning because attackers can access protected cookies and credentials while avoiding some of the louder behaviors that security tools usually look for.</p>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>Google introduced <strong>Application-Bound Encryption (ABE)</strong> in Chrome 127 to better protect browser secrets such as cookies and saved credentials. The idea was to make theft attempts harder and easier to detect by tying decryption to Chrome and its privileged elevation service.</p>



<p>Older malware often used noisy methods to get around this. Some strains tried to run with <strong>SYSTEM-level privileges</strong> and copy the service logic. Others injected code into the browser process to trigger decryption from inside Chrome. Both methods usually create strong detection signals in endpoint telemetry.</p>



<p>The <strong>VoidStealer Chrome ABE bypass</strong> technique poses a serious risk, further complicating the protection landscape for users and organizations alike.</p>



<p>As cyber threats evolve, understanding the implications of methods like the VoidStealer Chrome ABE bypass becomes essential for users and security professionals alike.</p>



<p>VoidStealer’s newer approach is different because it avoids both of those steps while still reaching the same goal.</p>



<h2 class="wp-block-heading"><strong>How Chrome ABE Protects Browser Secrets</strong></h2>



<p>Chrome stores protected data like cookies, and in some cases passwords, as <strong>v20-prefixed encrypted values</strong>. These values are encrypted using a special application key called the <strong>v20_master_key</strong>.</p>



<p>That key is protected using Windows security mechanisms and is only decrypted briefly when Chrome needs to access protected data through its elevation service.</p>



<p>In simple terms, the key is normally locked away and appears in plaintext only for a short moment during legitimate browser operations. VoidStealer abuses that exact moment.</p>



<h2 class="wp-block-heading"><strong>What Makes VoidStealer Different</strong></h2>



<p>The most notable feature in <strong>VoidStealer v2.0</strong> is its <strong>debugger-driven bypass</strong>. Instead of forcing decryption through escalation or injection, the malware waits until Chrome decrypts the key naturally and then steals it from memory.</p>



<p>That gives attackers a stealthier path to the same result.</p>



<h3 class="wp-block-heading"><strong>Why attackers may like this method</strong></h3>



<ul class="wp-block-list">
<li>No SYSTEM privilege escalation</li>



<li>No browser code injection</li>



<li>Lower detection footprint</li>



<li>Access to ABE-protected cookies and credentials</li>
</ul>



<p>This makes the attack more attractive for threat actors trying to stay under the radar.</p>



<h2 class="wp-block-heading"><strong>How the Debugger-Based Bypass Works</strong></h2>



<p>The technique closely follows ideas from the open-source <strong>ElevationKatz</strong> project. VoidStealer launches a hidden browser instance, starts it in a suspended state, resumes it, and quickly attaches as a debugger.</p>



<p>This timing matters because browsers often load and decrypt cookies during startup.</p>



<p>After attaching, the malware monitors module load events and identifies <strong>chrome.dll</strong> or <strong>msedge.dll</strong>. It then scans memory to locate a known string linked to the ABE decryption path.</p>



<p>When the browser reaches that point, current builds of Chrome and Edge temporarily hold a pointer to the decrypted <strong>v20_master_key</strong> in a processor register. VoidStealer reads that pointer and extracts the key from memory.</p>



<p>The malware does not need to call decryption APIs inside the victim browser process. It simply watches Chrome at the right moment and takes the key when it becomes available.</p>



<h2 class="wp-block-heading"><strong>What Attackers Gain</strong></h2>



<p>Once the <strong>v20_master_key</strong> is stolen, attackers can use it offline to decrypt <strong>v20-protected cookies and credentials</strong> stored in the browser’s SQLite databases.</p>



<p>That effectively removes the protection ABE was meant to provide for that browser profile. A stolen session cookie can be enough to hijack active logins and gain access to web services without needing the victim’s password again.</p>



<h2 class="wp-block-heading"><strong>Detection Opportunities for Defenders</strong></h2>



<p>Even though this method is quieter, it still creates useful detection signals that defenders can monitor.</p>



<h3 class="wp-block-heading"><strong>Key indicators to watch</strong></h3>



<ul class="wp-block-list">
<li>Debugger attachment to <strong>chrome.exe</strong> or <strong>msedge.exe</strong></li>



<li>Use of <strong>DebugActiveProcess</strong> involving browser processes</li>



<li>Suspicious <strong>ReadProcessMemory</strong> activity against browsers</li>



<li>Hidden or non-interactive browser sessions launched by unknown parent processes</li>



<li>Unsigned or untrusted binaries reading browser memory</li>
</ul>



<p>These signals become much stronger when they appear together.</p>



<h2 class="wp-block-heading"><strong>Why This Matters for Security Teams</strong></h2>



<p>VoidStealer shows that infostealers are evolving beyond older, noisy bypass techniques. Instead of relying on privilege escalation or injection, attackers are moving toward quieter methods that abuse normal runtime behavior.</p>



<p>For defenders, this means detection strategies need to expand. Monitoring should not focus only on classic red flags like code injection. It also needs to cover <strong>debugger abuse, hidden browser launches, and unusual memory access patterns</strong>.</p>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>VoidStealer’s latest technique highlights a clear shift in browser-focused malware. By stealing Chrome’s decryption key at the brief moment it appears in memory, attackers can bypass ABE protections in a more subtle way.</p>



<p>Chrome’s ABE still raises the barrier for browser data theft, but this case shows that determined threat actors continue to adapt. Security teams need to respond in the same way by strengthening behavioral detection and improving visibility into suspicious browser-related activity.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/voidstealer-chrome-abe-bypass/">VoidStealer Uses a Smarter Trick to Bypass Chrome Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/voidstealer-chrome-abe-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Iranian Cyber Operations Expand with Stealth and Surveillance Tactics</title>
		<link>https://firsthackersnews.com/iranian-cyber-operations-stealth-surveillance/</link>
					<comments>https://firsthackersnews.com/iranian-cyber-operations-stealth-surveillance/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 18:16:01 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#APTThreats]]></category>
		<category><![CDATA[#CompromisedCameras]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberEspionage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberWarfare]]></category>
		<category><![CDATA[#Dahua]]></category>
		<category><![CDATA[#DataExfiltration]]></category>
		<category><![CDATA[#Handala]]></category>
		<category><![CDATA[#Hikvision]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#IoTSecurity]]></category>
		<category><![CDATA[#IranianCyberOperations]]></category>
		<category><![CDATA[#IranianHackers]]></category>
		<category><![CDATA[#MuddyWater]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SurveillanceAttacks]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11471</guid>

					<description><![CDATA[<p>Iran-linked cyber groups are steadily expanding their operations, targeting organizations in the US and Canada while also leveraging</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/iranian-cyber-operations-stealth-surveillance/">Iranian Cyber Operations Expand with Stealth and Surveillance Tactics</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Iran-linked cyber groups are steadily expanding their operations, targeting organizations in the US and Canada while also leveraging internet-connected devices across the Middle East for surveillance. Rather than launching large, disruptive attacks, the focus has shifted toward maintaining long-term access, quietly collecting intelligence, and acting only when necessary.</p>



<p>Groups like MuddyWater have been observed operating across sectors such as banking, aviation, non-profits, and defense-related environments. </p>



<p>They are using tools like Dindoor and Fakeset to maintain persistence within compromised systems, allowing them to execute commands and move laterally without drawing attention. This approach highlights a clear emphasis on remaining undetected for extended periods rather than triggering immediate alerts.</p>



<p>Data exfiltration plays a key role in these campaigns. Attackers are increasingly using legitimate tools and cloud services to move stolen information, blending their activity with normal network behavior. This makes detection more challenging and allows them to extract valuable intelligence over time without raising suspicion.</p>



<h3 class="wp-block-heading">Surveillance and Selective Disruption</h3>



<p>At the same time, Iran-linked actors are exploiting vulnerabilities in internet-connected cameras from vendors such as Hikvision and Dahua. Many of these devices remain exposed due to delayed patching or poor security configurations. Once compromised, they provide real-time visibility into sensitive locations, enabling monitoring of activities, tracking of responses during incidents, and improved situational awareness. These cameras effectively become low-cost surveillance nodes supporting broader intelligence operations.</p>



<p>On the more disruptive side, the group Handala has demonstrated how operations can shift from stealth to impact. In a claimed attack involving Stryker, attackers reportedly used device management systems to remotely wipe systems at scale instead of deploying traditional malware. </p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>This approach shows how existing enterprise tools can be weaponized to create significant disruption.</p>



<p>Overall, Iran’s cyber strategy reflects a balance between persistence and opportunistic disruption. Instead of coordinated, high-volume attacks, the emphasis is on maintaining access, exploiting exposed systems, and using proxy groups when needed. </p>



<p>For organizations, this reinforces the importance of continuous monitoring, timely patching, and securing internet-facing assets, as the threat is ongoing, adaptive, and often designed to remain unnoticed.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/iranian-cyber-operations-stealth-surveillance/">Iranian Cyber Operations Expand with Stealth and Surveillance Tactics</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/iranian-cyber-operations-stealth-surveillance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Starbucks Data Breach Exposes User Information</title>
		<link>https://firsthackersnews.com/starbucks-data-breach-employee-data-exposed/</link>
					<comments>https://firsthackersnews.com/starbucks-data-breach-employee-data-exposed/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 06:39:55 +0000</pubDate>
				<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#corporatesecurity]]></category>
		<category><![CDATA[#credentialharvesting]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#identitytheftrisk]]></category>
		<category><![CDATA[#InformationSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SecurityBreach]]></category>
		<category><![CDATA[#securityincident]]></category>
		<category><![CDATA[#starbucksdatabreach]]></category>
		<category><![CDATA[#starbuckssecuritybreach]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11461</guid>

					<description><![CDATA[<p>Starbucks Data Breach has exposed the personal and financial information of 889 individuals after attackers gained unauthorized access</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/starbucks-data-breach-employee-data-exposed/">Starbucks Data Breach Exposes User Information</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Starbucks Data Breach has exposed the personal and financial information of 889 individuals after attackers gained unauthorized access to the company’s internal employee platform.</p>



<p>Although the number of affected individuals is small compared to Starbucks’ global workforce, the type of information involved makes the incident serious. Exposure of employment and financial records could increase the risk of identity theft for those impacted.</p>



<h2 class="wp-block-heading"><strong>Attack Timeline and Investigation</strong></h2>



<p>According to a breach notification filed with the Office of the Maine Attorney General on March 10, 2026, the incident involved accounts connected to the Starbucks Partner Central system. This platform allows employees to access payroll details, benefits information, and other work-related records.</p>



<p>Investigations showed that attackers first gained access on January 19, 2026. Suspicious activity was detected on February 6, and the company fully removed the attackers from its systems by February 11.</p>



<p>Security experts later determined that the attackers used credential harvesting techniques. Employees were directed to fake websites that closely resembled the official Starbucks Partner Central login page. When users entered their credentials on these phishing pages, the attackers captured the login information and used it to access employee accounts.</p>



<p>Because these accounts contained payroll and employment records, the attackers were able to view several types of sensitive personal data, including</p>



<ul class="wp-block-list">
<li>Full names and dates of birth</li>



<li>Social Security numbers</li>



<li>Bank account and routing numbers linked to direct deposits</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener">&nbsp;Instagram</a>,&nbsp;<a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong>&nbsp;to get the latest security news!</strong></p>
</blockquote>



<p>After discovering the breach, Starbucks immediately blocked unauthorized access, notified law enforcement authorities, and strengthened security measures for the employee portal.</p>



<p>The company is also offering 24 months of identity theft protection and credit monitoring services through Experian to help protect the affected individuals.</p>



<p>This incident follows previous cybersecurity challenges faced by the company. In November 2024, Starbucks experienced operational disruptions after a ransomware attack targeted Blue Yonder, a third-party provider used for supply chain and scheduling systems.</p>



<p>Earlier in September 2022, Starbucks’ Singapore operations experienced a major breach that exposed the personal information of more than 219,000 customers after a vendor’s system was compromised.</p>



<p>The latest incident highlights how phishing attacks and stolen credentials continue to be a common method used by cybercriminals to gain access to corporate system</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/starbucks-data-breach-employee-data-exposed/">Starbucks Data Breach Exposes User Information</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/starbucks-data-breach-employee-data-exposed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake LastPass Support Scam Targets Password Vaults</title>
		<link>https://firsthackersnews.com/lastpass-support-phishing-attack/</link>
					<comments>https://firsthackersnews.com/lastpass-support-phishing-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 06:05:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#AccountSecurity]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#LastPass]]></category>
		<category><![CDATA[#LastPassPhishing]]></category>
		<category><![CDATA[#PasswordManager]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11335</guid>

					<description><![CDATA[<p>A new phishing campaign is pretending to be LastPass support emails to trick users into revealing their vault</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lastpass-support-phishing-attack/">Fake LastPass Support Scam Targets Password Vaults</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>A new phishing campaign is pretending to be <strong>LastPass support emails</strong> to trick users into revealing their vault passwords and account credentials.</p>



<p>Attackers send emails that look like internal support conversations about suspicious activity on a user’s account.</p>



<p>These messages claim that someone is attempting actions such as:</p>



<ul class="wp-block-list">
<li>Exporting vault data</li>



<li>Recovering the account</li>



<li>Registering a new trusted device</li>
</ul>



<p>The goal is to scare users into reacting quickly.</p>



<h2 class="wp-block-heading">How the Phishing Attack Works</h2>



<p>Hackers use a method called <strong>display name spoofing</strong>. The sender name appears as <em>LastPass Support</em>, but the actual email address comes from a different domain.</p>



<p>Many email apps, especially on mobile devices, show only the sender name. Because of this, users may not notice the fake address.</p>



<p>The email then asks users to secure or verify their account by clicking a link.</p>



<p>However, the link leads to a malicious website such as:</p>



<p>verify-lastpass[.]com</p>



<p>This site hosts a fake <strong>LastPass login page</strong> designed to look identical to the official one. If users enter their credentials, attackers can capture their master password and access their stored vault data.</p>



<h2 class="wp-block-heading">Common Phishing Email Signs</h2>



<p>The phishing emails often include LastPass branding and fake message threads to appear legitimate.</p>



<p>Some of the subject lines used include:</p>



<ul class="wp-block-list">
<li>“Account recovery verification request”</li>



<li>“Unauthorized vault export attempt detected”</li>



<li>“New trusted device registered to your account”</li>
</ul>



<p>These messages create urgency so users click before verifying the source.</p>



<h2 class="wp-block-heading">Security Advice for LastPass Users</h2>



<p>LastPass has warned that it will <strong>never ask for a user’s master password</strong> through email.</p>



<p>Users should take the following precautions:</p>



<ul class="wp-block-list">
<li>Check the full sender email address carefully</li>



<li>Avoid clicking links inside emails</li>



<li>Access LastPass directly through the official website or app</li>



<li>Enable multi-factor authentication (MFA)</li>



<li>Report suspicious emails to <strong><a>abuse@lastpass.com</a></strong></li>
</ul>



<h2 class="wp-block-heading">Why This Attack Matters</h2>



<p>Phishing attacks are becoming more realistic and harder to detect.</p>



<p>Since password managers store sensitive data, they are a high-value target for cybercriminals. Users should always verify security alerts and avoid rushing to click links, even when the message appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lastpass-support-phishing-attack/">Fake LastPass Support Scam Targets Password Vaults</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/lastpass-support-phishing-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GTFire Phishing Attack Hides Behind Google Services</title>
		<link>https://firsthackersnews.com/gtfire-google-phishing-campaign/</link>
					<comments>https://firsthackersnews.com/gtfire-google-phishing-campaign/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 21:45:10 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#BrandImpersonation]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#GoogleAbuse]]></category>
		<category><![CDATA[#GTFire]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#PhishingCampaign]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11311</guid>

					<description><![CDATA[<p>GTFire is a newly identified phishing campaign that misuses trusted Google services, including Firebase and Google Translate, to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gtfire-google-phishing-campaign/">GTFire Phishing Attack Hides Behind Google Services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>GTFire is a newly identified phishing campaign that misuses trusted Google services, including Firebase and Google Translate, to steal user credentials.</p>



<p>By hosting phishing content on legitimate Google-owned domains, the attackers are able to bypass many email security filters and web gateways. Because the links appear trustworthy, they are less likely to raise suspicion.</p>



<p>Victims are redirected to realistic login pages that imitate well-known brands. After entering their credentials, they are quietly sent to the real website, making the attack difficult to detect.</p>



<h2 class="wp-block-heading"><strong>Global Impact and Scale</strong></h2>



<p>The campaign is widespread. Investigators uncovered attacker-controlled servers containing thousands of stolen credentials linked to more than 1,000 organizations across 100+ countries and over 200 industries.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="608" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1024x608.png" alt="" class="wp-image-11312" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-300x178.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-768x456.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1024x608.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1536x912.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">GTFire phishing campaign (Source: Group-IB)<br></figcaption></figure>



<p>Mexico has the highest number of confirmed victims, particularly in manufacturing, education, and government sectors. The United States, Spain, India, and Argentina are also significantly affected.</p>



<p>The use of trusted cloud services makes this campaign especially effective and harder to block using traditional security controls.</p>



<p>Group-IB researchers describe GTFire as a structured, large-scale credential theft operation.</p>



<p>Attackers reuse the same phishing templates across multiple brands and store stolen data on centralized servers, organized by date, language, and targeted servic</p>



<p>More than 120 phishing domains were discovered, using similar naming patterns to quickly rotate infrastructure and avoid detection.</p>



<p>Attackers customize each fake login page to closely match real brands. After victims enter their credentials, they are redirected to the legitimate website, delaying suspicion.</p>



<p>Because the campaign uses trusted Google domains, traditional URL filtering and blocklists struggle to detect it — showing how easily legitimate infrastructure can be misused for phishing.</p>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The attack starts with a phishing email that contains a Google Translate link. This link quietly routes the victim through Google’s translation service before redirecting them to a fake login page hosted on Firebase.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="624" height="571" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-2.png" alt="" class="wp-image-11313" style="width:931px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-2-300x275.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-2.png 624w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption">Phishing pages display fake login error messages (Source: Group-IB)<br><br></figcaption></figure>



<p>Because the link uses a Google domain, many email filters and web gateways do not block it.</p>



<p>Attackers create many random *.web.app subdomains to host phishing pages and rotate them frequently to avoid detection. Each page is designed to look like a real brand login portal.</p>



<p>When victims enter their credentials, they are shown a fake “wrong password” message and asked to try again. Both login attempts are secretly captured and sent to attacker-controlled servers, along with basic details like location and browser language.</p>



<p>The stolen data is collected using simple, ready-made backend tools, making the campaign easy to scale.</p>



<h2 class="wp-block-heading"><strong>Mitigation Measures</strong></h2>



<p>Organizations should:</p>



<ul class="wp-block-list">
<li>Enforce phishing-resistant multi-factor authentication (MFA)</li>



<li>Train employees to recognize suspicious Google-based links</li>



<li>Monitor for unusual use of translate.goog and *.web.app domains</li>



<li>Watch for brand impersonation hosted on trusted cloud platforms</li>



<li>Share indicators of compromise with security communities and CERT teams</li>
</ul>



<p>Trusted services can be misused, so detection strategies must go beyond basic domain reputation check</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gtfire-google-phishing-campaign/">GTFire Phishing Attack Hides Behind Google Services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gtfire-google-phishing-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Massive Scanning Campaign Targets SonicWall Firewalls</title>
		<link>https://firsthackersnews.com/sonicwall-vpn-scanning-campaign/</link>
					<comments>https://firsthackersnews.com/sonicwall-vpn-scanning-campaign/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 09:49:41 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AttackSurface]]></category>
		<category><![CDATA[#CredentialStuffing]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#FirewallSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#RansomwareThreat]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SonicWall]]></category>
		<category><![CDATA[#SSLVPN]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VPNAttack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11295</guid>

					<description><![CDATA[<p>Hackers are actively mapping SonicWall firewalls worldwide. In just four days, over 84,000 SonicOS scanning sessions were launched</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sonicwall-vpn-scanning-campaign/">Massive Scanning Campaign Targets SonicWall Firewalls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hackers are actively mapping SonicWall firewalls worldwide. In just four days, over 84,000 SonicOS scanning sessions were launched from more than 4,300 unique IP addresses to identify devices with SSL VPN enabled.</p>



<p>Most of the traffic (92%) targeted a single SonicOS REST API endpoint used to check SSL VPN status. The activity was coordinated across three infrastructure clusters, with a commercial proxy network rotating over 4,000 IP addresses in short bursts to evade detection.</p>



<p>While this campaign focused mainly on reconnaissance, several critical SonicWall vulnerabilities remain high-risk targets:</p>



<ul class="wp-block-list">
<li><strong>CVE-2024-53704</strong> (CVSS 9.8, CISA KEV, ransomware-linked)</li>



<li><strong>CVE-2024-40766</strong> (CVSS 9.8, used by Akira and Fog ransomware)</li>



<li><strong>CVE-2021-20028</strong> (CVSS 9.8, CISA KEV listed)</li>



<li><strong>CVE-2024-38475</strong> (CVSS 9.1)</li>



<li><strong>CVE-2019-7481</strong> (CVSS 7.5, ransomware-linked)</li>



<li><strong>CVE-2022-22274</strong> (CVSS 9.8)</li>



<li><strong>CVE-2023-0656</strong> (CVSS 7.5)</li>
</ul>



<p>Security researchers assess this activity as pre-exploitation reconnaissance. Attackers appear to be building a high-value list of exposed SSL VPN endpoints for future credential stuffing and vulnerability exploitation.</p>



<h2 class="wp-block-heading"><strong>VPN Access Is the Fastest Way In</strong></h2>



<p>SonicWall SSL VPN has become a common entry point for ransomware groups, especially Akira. Researchers have shown that once attackers gain VPN access, they can move to full network encryption in under four hours — sometimes in less than one.</p>



<p>Recent scanning shows attackers are heavily targeting the API endpoint that reveals whether SSL VPN is enabled. This indicates they are building a target list of exposed devices before launching credential stuffing or vulnerability-based attacks.</p>



<p>Since March 2023, Akira has compromised hundreds of organizations and generated hundreds of millions in ransom payments. Fog ransomware has also used SonicWall VPN access as an initial foothold.</p>



<p>Several high-risk vulnerabilities make this worse. Five of the seven key SonicWall CVEs tied to this attack surface are listed in CISA’s Known Exploited Vulnerabilities catalog. One of the most critical is CVE-2024-53704 (CVSS 9.8), an authentication bypass flaw in SonicOS and NSv appliances that is already being exploited in the wild.</p>



<p>With over 430,000 SonicWall firewalls exposed to the internet — many running outdated firmware — attackers have a large and accessible attack surface.</p>



<h2 class="wp-block-heading"><strong>Organized Scanning Infrastructure</strong></h2>



<p>GreyNoise identified four coordinated clusters behind the February 2026 scans, all focused on VPN discovery and credential testing.</p>



<p>Attackers used proxy networks, rotating IPs, ports, and browser fingerprints to evade detection, with nearly 70% of traffic sharing the same automated Chrome-on-Linux HTTP/1.0 signature.</p>



<h2 class="wp-block-heading">Reconnaissance Before the Real Attack</h2>



<p>This pattern closely resembles earlier campaigns where large-scale VPN scanning was followed by credential-based intrusions.</p>



<p>The current activity appears to be reconnaissance — mapping exposed SSL VPN services and identifying weak targets. History shows that exploitation typically follows this phase.</p>



<p>Organizations should immediately restrict VPN management access, enforce multi-factor authentication for all SSL VPN users, and urgently patch CVE-2024-53704 and other SonicOS vulnerabilities. Without action, this scanning phase could quickly evolve into widespread ransomware incidents.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sonicwall-vpn-scanning-campaign/">Massive Scanning Campaign Targets SonicWall Firewalls</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/sonicwall-vpn-scanning-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
