<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>malicious cyber actors &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malicious-cyber-actors/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Mon, 11 May 2026 21:11:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>malicious cyber actors &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DeepSeek Repositories Scam Spreads Malware</title>
		<link>https://firsthackersnews.com/fake-deepseek-malware-github/</link>
					<comments>https://firsthackersnews.com/fake-deepseek-malware-github/#comments</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 11 May 2026 21:11:29 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11690</guid>

					<description><![CDATA[<p>Hackers are again targeting developers and AI users by creating fake versions of popular tools on GitHub. This</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-deepseek-malware-github/">DeepSeek Repositories Scam Spreads Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hackers are again targeting developers and AI users by creating fake versions of popular tools on GitHub. This time, they are impersonating DeepSeek TUI, a real terminal-based tool that lets users interact with DeepSeek AI models from the command line. This rise in deceptive practices is a clear indication of the threat posed by Fake DeepSeek malware.</p>



<p>After the release of DeepSeek v4 and growing online attention, the tool quickly became a target for attackers. They took advantage of its popularity to trick users into downloading malicious files.</p>



<p>Users must remain vigilant against these threats, particularly the risks associated with downloading files that may contain Fake DeepSeek malware.</p>



<h2 class="wp-block-heading">Fake GitHub Repositories Spreading Malware</h2>



<p>Attackers created fake GitHub repositories that look very similar to the real project. These pages appear legitimate, making it hard for users to notice the difference.</p>



<p>Users who download files from these fake repos end up installing malware. In this case, the malicious file was hidden inside a 7z archive on the Releases page, just like a normal software download.</p>



<p>Researchers from QiAnXin Threat Intelligence Center discovered that this attack is linked to a previous campaign known as OpenClaw. Both attacks use similar techniques and infrastructure, suggesting the same threat actor is behind them.</p>



<p>The attackers also used fake installer names related to other AI tools like Claude, Grok, WormGPT, and FraudGPT to spread the malware further.</p>



<h2 class="wp-block-heading">Malware Behavior and Persistence Techniques</h2>



<p>The main malware file, named DeepSeek-TUI_x64.exe, first checks if it is running in a secure or virtual environment. If it detects analysis tools, it stops execution to avoid being detected.</p>



<p>If the system looks like a real user machine, the malware continues its attack. It disables key Windows Defender protections, modifies firewall settings, and connects to external servers to download more malicious components.</p>



<p>These components help the attacker stay in the system. Some create scheduled tasks, others add registry entries for persistence, and some run silently in memory to avoid detection.</p>



<p>The malware uses multiple techniques to remain active, making it difficult to remove once installed. It can survive reboots and continue running without the user noticing.</p>



<h2 class="wp-block-heading" id="indicators-of-compromise-iocs"><strong>Indicators of Compromise (IoCs):-</strong></h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th class="has-text-align-left" data-align="left">Type</th><th class="has-text-align-left" data-align="left">Indicator</th><th class="has-text-align-left" data-align="left">Description</th></tr></thead><tbody><tr><td>MD5</td><td>b96c0d609c1b7e74f8cb1442bf0b5418</td><td>DeepSeek-TUI_x64.exe (first-stage dropper)</td></tr><tr><td>MD5</td><td>7de2896e373342e0f3b765c855bf7396</td><td>bbg_free_x64.exe</td></tr><tr><td>MD5</td><td>78c11c45c00a9c22f537c59a472beca1</td><td>CatGatekeeper_x64.exe</td></tr><tr><td>MD5</td><td>df36a31148d2c6414bdafeab771ea728</td><td>CatGatekeeper_x64.exe</td></tr><tr><td>MD5</td><td>14920c9751d20452a1006d20b8e73234</td><td>CatGatekeeper_x64.exe</td></tr><tr><td>MD5</td><td>f6d328422e7ca22e70a6aa71315450f3</td><td>CatGatekeeper_x64.exe</td></tr><tr><td>MD5</td><td>86c7f2a3c307928daaca7c1df3ea5d72</td><td>CatGatekeeper_x64.exe</td></tr><tr><td>MD5</td><td>dbaa133fd3d1a834460206d83b480f80</td><td>ClaudeDesign-Optimized_x64.exe</td></tr><tr><td>MD5</td><td>22c0c7d441fd22432cfe7854b59ba82b</td><td>ClaudeDesign-Optimized_x64.exe</td></tr><tr><td>MD5</td><td>a224f44bdac16250d8093df68e05b512</td><td>DeepSeek-TUI_x64.exe</td></tr><tr><td>MD5</td><td>6861fa47889e0340ab7efaab448c56b6</td><td>DeepSeek-TUI_x64.exe</td></tr><tr><td>MD5</td><td>437e4bdb12d7fa8d1c9a9e9db84b8726</td><td>DeepSeek-TUI_x64.exe</td></tr><tr><td>MD5</td><td>fbfe7513685913e6f878647eec429d45</td><td>deepseek-v4-pro_x64.exe</td></tr><tr><td>MD5</td><td>562d48524313d414b5a419fed6ca10aa</td><td>DV4-MCP-Setup.exe</td></tr><tr><td>MD5</td><td>df8a2e7aa46af996bdf67d79601671c3</td><td>fraudGPT_x64.exe</td></tr><tr><td>MD5</td><td>f101a346502a324320f952d39e217064</td><td>fraudGPT_x64.exe</td></tr><tr><td>MD5</td><td>5d14461718b74b86fdd68c6aee801dc4</td><td>GLM5-Local_x64.exe</td></tr><tr><td>MD5</td><td>556b35236eeb111b0606d88a7aa3fd87</td><td>gpt-image-2-desktop.exe</td></tr><tr><td>MD5</td><td>ff371b43786cbb87dab325ce17cf8b7c</td><td>gpt-image-2-desktop.exe</td></tr><tr><td>MD5</td><td>1bd1df4f228ecd29a9b6fab48beaa366</td><td>GrokCLI_x64.exe</td></tr><tr><td>MD5</td><td>975bd8eb56716adbcadb5216592a17c7</td><td>Hermes-Agent_x64.exe</td></tr><tr><td>MD5</td><td>347980085c8926d5a1ff8e15a31fd812</td><td>Hermes-Agent_x64.exe</td></tr><tr><td>MD5</td><td>46917d8326d77e4e3c39cb843dbfc675</td><td>KawaiiGPT_x64.cpl.exe</td></tr><tr><td>MD5</td><td>b6f77b48223f57c67f00ccd8ab3d047e</td><td>KawaiiGPT_x64.exe</td></tr><tr><td>MD5</td><td>8dde7a417130ae78a3f2aeed1f5b8f58</td><td>Kimi-K2.6_x64.exe</td></tr><tr><td>MD5</td><td>4c7abc81b308fc874ec0de4f026db260</td><td>Kimi-K2.6_x64.exe</td></tr><tr><td>MD5</td><td>48dd212fae0086822d4ae7696cc61693</td><td>LTX-2.3_x64.exe</td></tr><tr><td>MD5</td><td>faa5f780fb0e0786dd1a2bd19af290ca</td><td>opus-4-7_x64.exe</td></tr><tr><td>MD5</td><td>6721f30d84f58532d877f2b31bfc9162</td><td>opus-4-7_x64.exe</td></tr><tr><td>MD5</td><td>a9d492ab22400257f756f0308e06f04c</td><td>worldmonitor_x64.exe</td></tr><tr><td>MD5</td><td>d0a92b090279894f4628bc3d627fbde0</td><td>WormGPT_x64.exe</td></tr><tr><td>MD5</td><td>397405106d895815a9bef8d84445af5a</td><td>OneSync.exe (two-stage component)</td></tr><tr><td>MD5</td><td>b7a76b82c2a5e16a3c346cc6aa145556</td><td>WinHealhCare.exe (two-stage component)</td></tr><tr><td>MD5</td><td>f01e96a80f92c414dd824aef5a1ac1e7</td><td>onedrive_sync.exe (two-stage component)</td></tr><tr><td>MD5</td><td>ecb3e753b60cc0f3d7de50fe7f133e49</td><td>svc_service.exe (two-stage component)</td></tr><tr><td>MD5</td><td>68ba5a1bafae7db35e2eee7ea3f11882</td><td>autodate.exe (two-stage component)</td></tr><tr><td>MD5</td><td>e102797eb4225a93eaeeaa6b9979716a</td><td>vicloud.exe (two-stage component)</td></tr><tr><td>Domain</td><td>mikolirentryifosttry.info</td><td>C2 command and control server</td></tr><tr><td>Domain</td><td>zkevopenanu.cfd</td><td>C2 command and control server</td></tr><tr><td>URL</td><td>hxxps://pastebin.com/raw/w6BVFFWQ</td><td>Primary payload staging link</td></tr><tr><td>URL</td><td>hxxps://pastebin.com/raw/5tmHDYrf</td><td>Secondary payload staging link</td></tr><tr><td>URL</td><td>hxxps://pastebin.com/raw/M6KthA5Z</td><td>Payload decompression password storage</td></tr><tr><td>URL</td><td>hxxps://snippet.host/beuskq/raw</td><td>Backup payload staging link</td></tr><tr><td>URL</td><td>hxxps://snippet.host/uikosx/raw</td><td>Backup payload password storage</td></tr><tr><td>URL</td><td>hxxps://hkdk.events/djbk1i9hp0sqoh</td><td>Telegram relay endpoint</td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fake-deepseek-malware-github/">DeepSeek Repositories Scam Spreads Malware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fake-deepseek-malware-github/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Trellix Confirms Source Code Repository Breach</title>
		<link>https://firsthackersnews.com/trellix-security-breach/</link>
					<comments>https://firsthackersnews.com/trellix-security-breach/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 03 May 2026 21:09:42 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[#BlueTeam]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityBreach]]></category>
		<category><![CDATA[#securityincident]]></category>
		<category><![CDATA[#SOC]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Trellix]]></category>
		<category><![CDATA[#XDR]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11686</guid>

					<description><![CDATA[<p>Cybersecurity firm Trellix has disclosed that attackers gained unauthorized access to a portion of its internal source code</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/trellix-security-breach/">Trellix Confirms Source Code Repository Breach</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity firm Trellix has disclosed that attackers gained unauthorized access to a portion of its internal source code repository. The company identified the activity and quickly initiated an incident response, bringing in external forensic experts and notifying law enforcement.</p>



<p>Source code environments are considered high-value targets because they reveal the inner workings of security products. Even limited access can give attackers insights into detection logic, configurations, or potential weaknesses that could be studied for future exploitation or used in supply chain-style attacks.</p>



<h2 class="wp-block-heading"><strong>Investigation Findings and Potential Risks</strong></h2>



<p>Trellix has stated that the breach appears contained and, at this stage, there is no evidence of direct impact on customers or product integrity.</p>



<p>Key findings so far include:</p>



<ul class="wp-block-list">
<li>No compromise of the build, release, or update pipeline</li>



<li>No signs of malicious code being inserted into products</li>



<li>No evidence of active exploitation using the accessed data</li>
</ul>



<p>However, the nature of source code exposure still raises concerns. Attackers could analyze the code offline to identify vulnerabilities, reverse-engineer protections, or develop evasion techniques against Trellix security tools.</p>



<p>The company is continuing a detailed forensic review to understand how the access occurred, what data was viewed or copied, and whether any long-term risks remain. Strengthening internal controls, access monitoring, and repository protections is likely part of the ongoing response.</p>



<p>This incident reflects a broader trend where attackers target software vendors instead of end users, aiming to gain leverage through trusted platforms. Similar breaches involving Microsoft, Okta, and LastPass show how valuable internal systems have become as entry points.</p>



<p>Trellix has committed to transparency and plans to release more technical details once the investigation is complete, helping the wider security community understand and defend against similar threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/trellix-security-breach/">Trellix Confirms Source Code Repository Breach</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/trellix-security-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Facebook Phishing Campaign Targets Business Accounts</title>
		<link>https://firsthackersnews.com/facebook-phishing-campaign/</link>
					<comments>https://firsthackersnews.com/facebook-phishing-campaign/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 03 May 2026 20:54:12 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#AppSheet]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#FacebookPhishing]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Netlify]]></category>
		<category><![CDATA[#OnlineSafety]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#Telegram]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11680</guid>

					<description><![CDATA[<p>Researchers at Guardio Labs have uncovered a large and highly organized phishing operation known as AccountDumpling, which has</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/facebook-phishing-campaign/">Facebook Phishing Campaign Targets Business Accounts</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Researchers at Guardio Labs have uncovered a large and highly organized phishing operation known as <strong>AccountDumpling</strong>, which has already compromised more than 30,000 Facebook accounts worldwide. What makes this campaign stand out is not just its scale, but the way it abuses legitimate platforms to make phishing emails appear completely authentic.</p>



<p>Instead of relying on fake domains or compromised mail servers, attackers use Google AppSheet to send emails through Google’s own infrastructure. These messages are generated as part of automated workflows, meaning they pass authentication checks like SPF, DKIM, and DMARC without raising suspicion. </p>



<p>As a result, security tools and spam filters see them as trusted communications, allowing phishing messages to land directly in inboxes of targeted users—often business account owners managing Facebook pages.</p>



<h2 class="wp-block-heading">Multi-Layered Attack Strategy</h2>



<p>The campaign is not a single phishing page but a structured, multi-stage system designed to increase success rates. Victims are first directed to pages hosted on Netlify, where attackers replicate the Facebook Help Center with high accuracy. These pages are customized per victim using unique subdomains, making them difficult to block using traditional security measures.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="1024" height="766" src="https://firsthackersnews.com/wp-content/uploads/2026/05/image.png" alt="" class="wp-image-11681" srcset="https://firsthackersnews.com/wp-content/uploads/2026/05/image-300x224.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-768x575.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/05/image.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Email phishing (Source: Guard Labs)</figcaption></figure>



<p>From there, users are guided through a series of steps that collect not only login credentials but also deeper identity information such as date of birth and even government-issued ID images. In some cases, the attackers shift tactics by offering fake incentives, like verification badges, hosted on platforms such as Vercel. These pages are designed to look dynamic and legitimate, while quietly bypassing detection systems using techniques like hidden Unicode characters.</p>



<p>The operation becomes more advanced in later stages. Attackers host phishing documents on Google Drive, presenting them as official Meta notifications. These documents, often designed using Canva, contain embedded links that redirect victims into interactive phishing environments. These environments are powered by real-time communication frameworks, allowing attackers to actively engage with victims during the login process.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="1024" height="809" src="https://firsthackersnews.com/wp-content/uploads/2026/05/image-1.png" alt="" class="wp-image-11682" srcset="https://firsthackersnews.com/wp-content/uploads/2026/05/image-1-300x237.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-1-768x607.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-1.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Account Dumpling (Source: Guard Labs)</figcaption></figure>



<p>This live interaction is a critical aspect of the campaign. Instead of passively collecting credentials, attackers can request one-time passwords, monitor user actions, and even capture browser sessions as they happen. This significantly increases the likelihood of successful account takeover, even when multi-factor authentication is enabled.</p>



<h2 class="wp-block-heading">Real-Time Data Exfiltration and Attribution</h2>



<p>Once credentials are captured, they are immediately transmitted through a centralized system built around Telegram bots. This allows operators to monitor incoming data in real time and quickly take control of compromised accounts before victims notice suspicious activity.</p>



<p>Analysis of the infrastructure shows a strong operational scale, with thousands of records flowing into attacker-controlled channels. Most victims are concentrated in regions like the United States and Europe, indicating a focus on high-value targets such as businesses and influencers.</p>



<p>Investigators were also able to trace elements of the campaign back to Vietnamese actors. This attribution is supported by metadata found in phishing documents and developer comments embedded within the malicious code, providing insight into the origin of the operation.</p>



<h2 class="wp-block-heading">A Shift Toward Industrialized Phishing</h2>



<p>AccountDumpling reflects a broader shift in cybercrime, where phishing is no longer a simple tactic but part of a larger, industrialized ecosystem. Attackers are combining trusted services, automation, and real-time interaction to create highly effective campaigns that are difficult to detect and disrupt.</p>



<p>Compromised accounts are rarely the end goal. They are often reused for further scams, advertising fraud, or additional phishing attacks, creating a cycle that sustains and expands the operation. This approach shows how modern threat actors are leveraging legitimate platforms at scale, turning them into tools for widespread abuse while staying under the radar.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/facebook-phishing-campaign/">Facebook Phishing Campaign Targets Business Accounts</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/facebook-phishing-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Multi Stage Malware Attack Uses Obfuscation to Evade Detection</title>
		<link>https://firsthackersnews.com/multi-stage-malware-attack/</link>
					<comments>https://firsthackersnews.com/multi-stage-malware-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 15:30:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11647</guid>

					<description><![CDATA[<p>Security researchers have identified a new malware campaign that uses advanced hiding techniques and multi-stage payloads to avoid</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/multi-stage-malware-attack/">Multi Stage Malware Attack Uses Obfuscation to Evade Detection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a new malware campaign that uses advanced hiding techniques and multi-stage payloads to avoid detection. Instead of launching a direct attack, the malware spreads in stages, making it harder for traditional security tools to detect and block it. This approach is characterized as a multi stage malware attack.</p>



<p>The attack starts with a targeted phishing email sent to specific organizations, particularly government-related entities. The email is designed to look legitimate, pretending to come from an internal consultant and referencing a real-looking project to gain trust.</p>



<p>To make the message more convincing, it is marked as urgent and includes a request for a read receipt. This increases the chances that the recipient will open the attachments without suspicion.</p>



<p>This multi stage malware attack poses serious threats to organizations, as its multi-layered nature complicates detection and remediation efforts.</p>



<p>The email contains two files with slightly misspelled names to appear like quick internal documents:</p>



<ul class="wp-block-list">
<li>A Word file pretending to be a report</li>



<li>A PDF file that looks like an official document</li>
</ul>



<p>These small tricks are used to make the attack look normal and believable.</p>



<h2 class="wp-block-heading">How the Multi-Stage Attack Works</h2>



<p>The infection process is carefully designed and happens in multiple steps. This layered approach helps the malware stay hidden during each stage.</p>



<p>When the Word file is opened, it asks the user to enable macros. If the user allows it, hidden code runs in the background and downloads a malicious file from an external server. This technique helps bypass basic security checks.</p>



<p>At the same time, the PDF file acts as another attack path. It shows a fake error message asking the user to update their PDF reader. If the user clicks the prompt, it downloads another malicious file disguised as a legitimate application.</p>



<p>Once installed, the malware:</p>



<ul class="wp-block-list">
<li>Connects to remote servers using trusted services</li>



<li>Uses tools like developer tunnels to maintain access</li>



<li>Sends stolen data through platforms like Discord</li>



<li>Executes commands on the infected system</li>
</ul>



<p>By using legitimate platforms, the malware blends in with normal network traffic, making it difficult to detect.</p>



<h2 class="wp-block-heading">Evasion Techniques and Why It’s Dangerous</h2>



<p>This malware uses several techniques to avoid being detected by security systems. It checks for analysis environments, hides its code, and uses trusted services to carry out its activities.</p>



<p>Some of its key evasion methods include:</p>



<ul class="wp-block-list">
<li>Hiding malicious code inside compiled scripts</li>



<li>Using trusted cloud services for communication</li>



<li>Disguising files with familiar names and branding</li>



<li>Delivering payloads in stages instead of all at once</li>
</ul>



<p>Because of these methods, the malware can remain active for a long time without being noticed. It can steal data, monitor systems, and give attackers remote access.</p>



<p>This attack shows a growing trend where cybercriminals rely on trusted platforms and multi-step infections to bypass traditional defenses. Organizations should focus on monitoring behavior, restricting macros, and educating users to recognize suspicious emails.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/multi-stage-malware-attack/">Multi Stage Malware Attack Uses Obfuscation to Evade Detection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/multi-stage-malware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Hide GoGra Backdoor in Outlook Mailboxes</title>
		<link>https://firsthackersnews.com/outlook-mailbox-malware/</link>
					<comments>https://firsthackersnews.com/outlook-mailbox-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 20:32:55 +0000</pubDate>
				<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Linux Malware]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#APT]]></category>
		<category><![CDATA[#Backdoor]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#GoGra]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MicrosoftSecurity]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#OutlookMalware]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11637</guid>

					<description><![CDATA[<p>A nation-state–linked threat group known as Harvester has developed a more advanced way to hide its malicious activity</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/outlook-mailbox-malware/">Hackers Hide GoGra Backdoor in Outlook Mailboxes</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A nation-state–linked threat group known as Harvester has developed a more advanced way to hide its malicious activity by using Microsoft Outlook as part of its attack infrastructure. Instead of relying on traditional command-and-control servers, the attackers are now sending instructions through real Outlook mailboxes, making the activity appear legitimate and much harder to detect.</p>



<p>This campaign involves a Linux version of the GoGra backdoor, showing that the group is expanding beyond its earlier Windows-based operations. By using trusted cloud services, the malware blends into normal network traffic, allowing it to bypass many standard security tools that typically look for suspicious external connections.</p>



<p>The attack appears to focus on espionage rather than financial gain. Evidence suggests that targets are mainly located in South Asia, with attackers using region-specific document names to make their phishing attempts more convincing. This level of targeting shows a carefully planned and strategic operation.</p>



<h2 class="wp-block-heading">Outlook Mailbox Malware Explained</h2>



<p>The attackers gain access through social engineering, tricking users into opening files that appear harmless. These files are often disguised as official documents, but they actually contain hidden malicious code.</p>



<p>Once the file is opened, the malware quietly installs itself in the background. It avoids drawing attention while setting up persistence, ensuring it can continue running even after the system is restarted.</p>



<p>Some key characteristics of the infection process include:</p>



<ul class="wp-block-list">
<li>Disguised files that look like PDFs or official documents</li>



<li>Malware hidden inside Linux executable files</li>



<li>Silent installation without visible signs</li>



<li>Persistence mechanisms that allow it to survive reboots</li>
</ul>



<p>This approach makes it difficult for users to realize they have been infected until much later.</p>



<h2 class="wp-block-heading">How the Backdoor Uses Microsoft Infrastructure</h2>



<p>What makes this attack particularly sophisticated is how it uses Microsoft’s own services as a communication channel. Instead of connecting to suspicious servers, the malware interacts with legitimate cloud infrastructure, which helps it stay hidden.</p>



<p>After installation, the backdoor uses Microsoft APIs to communicate with a real Outlook mailbox. It regularly checks for new messages that contain instructions from the attacker. These commands are processed on the infected system, and the results are sent back through email responses.</p>



<p>The malware is designed to clean up after itself, deleting messages once they are used. This reduces traces of the attack and makes forensic investigation more difficult.</p>



<p>The main capabilities of the backdoor include:</p>



<ul class="wp-block-list">
<li>Receiving commands through Outlook mailbox messages</li>



<li>Executing those commands on the infected machine</li>



<li>Sending results back via email</li>



<li>Removing evidence after communication</li>
</ul>



<p>Because all of this happens through trusted services, the activity can easily go unnoticed in normal network monitoring.</p>



<h2 class="wp-block-heading">Why This Attack Is Concerning</h2>



<p>This campaign highlights a growing trend where attackers abuse legitimate platforms to hide their operations. By using trusted services like Microsoft’s cloud, they can bypass many traditional defenses that rely on detecting suspicious traffic.</p>



<p>The impact of such an attack can be serious. Attackers may gain long-term access to systems, collect sensitive data, and monitor user activity without being detected. Since the malware operates quietly and removes traces of its actions, it can remain active for extended periods.</p>



<p>This also shows how threat actors are evolving their techniques, moving toward more stealthy and persistent methods. Organizations can no longer rely only on basic perimeter defenses and must adopt more advanced monitoring strategies.</p>



<p>To reduce risk, security teams should pay close attention to unusual system behavior, unexpected background services, and abnormal use of cloud APIs. Monitoring activity from endpoints that do not typically interact with such services can help identify potential threats early.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/outlook-mailbox-malware/">Hackers Hide GoGra Backdoor in Outlook Mailboxes</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/outlook-mailbox-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Flags Axios npm Hack in Supply Chain Attack</title>
		<link>https://firsthackersnews.com/axios-npm-hack/</link>
					<comments>https://firsthackersnews.com/axios-npm-hack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 21 Apr 2026 07:01:39 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#AxiosNpmHack]]></category>
		<category><![CDATA[#AxiosSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DevSecOps]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#JavaScriptSecurity]]></category>
		<category><![CDATA[#MalwareAttack]]></category>
		<category><![CDATA[#Nodejs]]></category>
		<category><![CDATA[#NpmSecurity]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SoftwareSecurity]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11617</guid>

					<description><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) has warned about a serious supply chain attack involving the popular</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/axios-npm-hack/">CISA Flags Axios npm Hack in Supply Chain Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity and Infrastructure Security Agency (CISA) has warned about a serious supply chain attack involving the popular Axios npm package, highlighting the potential for an axios npm hack.</p>



<p>Axios is a widely used JavaScript library that helps developers handle HTTP requests in both Node.js and browsers. Because it is used in so many projects, this axios npm hack can affect a large number of applications and development systems.</p>



<p>The attack took place on March 31, 2026, when hackers compromised two versions of Axios — 1.14.1 and 0.30.4. When developers installed these versions, a hidden malicious package called “plain-crypto-js” was automatically included without their knowledge, demonstrating the dangers of an axios npm hack.</p>



<p>This package acts as a loader. It connects to attacker-controlled servers and downloads additional malware. One of the main threats is a Remote Access Trojan (RAT), which allows attackers to gain control over infected machines.</p>



<p>If a developer’s system is affected, attackers can quietly steal sensitive data such as source code, environment variables, and credentials. They can also move deeper into company systems, including CI/CD pipelines, which increases the overall risk.</p>



<h2 class="wp-block-heading"><strong>What You Should Do Immediately</strong></h2>



<p>CISA recommends that organizations review their systems for any recent Axios updates. If the affected versions were installed, quick action is important.</p>



<p>Teams should downgrade to safe versions like 1.14.0 or 0.30.3 and remove the malicious “plain-crypto-js” package from their projects. It is also important to rotate all sensitive credentials, including API keys, SSH keys, and access tokens.</p>



<p>Monitoring network activity is another key step. Any unusual outbound connections should be investigated, and security scans should be run to ensure no hidden threats remain.</p>



<h2 class="wp-block-heading"><strong>How to Prevent Similar Attacks</strong></h2>



<p>This incident highlights how software supply chain attacks are becoming more advanced. Many of these attacks take advantage of default package manager settings that automatically install dependencies.</p>



<p>To reduce risk, organizations should strengthen their security practices. Enabling strong authentication for developer accounts can prevent unauthorized access. Disabling automatic script execution during installations can also block malicious behavior.</p>



<p>It is also a good practice to avoid using newly published packages without proper verification. Monitoring systems for unusual activity, such as unexpected processes or unknown network connections, can help detect threats early.</p>



<p>By taking these precautions, organizations can better protect their development environments from future attacks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/axios-npm-hack/">CISA Flags Axios npm Hack in Supply Chain Attack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/axios-npm-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</title>
		<link>https://firsthackersnews.com/n8n-webhook-malware-attack/</link>
					<comments>https://firsthackersnews.com/n8n-webhook-malware-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 05:48:17 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AutomationSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#n8n]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#WebhookAttack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11602</guid>

					<description><![CDATA[<p>A new cyberattack campaign is exploiting trusted automation platforms like n8n to deliver malware and track users in</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/n8n-webhook-malware-attack/">n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new cyberattack campaign is exploiting trusted automation platforms like n8n to deliver malware and track users in a much more subtle way. Instead of relying on traditional malicious infrastructure, attackers are hiding their activity inside legitimate services—making detection far more difficult.</p>



<p>Between October 2025 and March 2026, security analysts observed a significant spike in phishing campaigns leveraging webhook functionality. These attacks take advantage of how automation tools are designed to connect apps and process real-time data, effectively turning a business productivity feature into a delivery channel for cyber threats.</p>



<h2 class="wp-block-heading">How the Attack Works</h2>



<p>Platforms like n8n and Zapier use webhooks to trigger workflows when a user interacts with a specific URL. Attackers are now embedding these webhook URLs into phishing emails, often disguising them as trusted services like file-sharing links.</p>



<p>When a victim clicks the link, the webhook triggers a workflow that dynamically serves content based on the user’s system or browser data. This makes the attack highly adaptive and harder to detect.</p>



<p>In many observed cases, users are redirected to fake pages that mimic services such as cloud storage platforms. These pages may include CAPTCHA-style verification to appear legitimate. Once the user interacts, a malicious file is downloaded—often disguised as a document or installer.</p>



<ul class="wp-block-list">
<li>Attackers use trusted webhook URLs to bypass security filters</li>



<li>Payloads are dynamically tailored based on victim device data</li>
</ul>



<h2 class="wp-block-heading">Advanced Techniques and Impact</h2>



<p>Research from Cisco Talos shows that attackers are not just delivering malware—they are also using these workflows to collect valuable data about their targets.</p>



<p>Some campaigns install remote monitoring tools that give attackers persistent access to infected systems. Others use tracking techniques, such as invisible pixels in emails, to monitor when messages are opened and gather device-level information.</p>



<p>Because the traffic originates from legitimate platforms, it blends into normal network activity. This makes it much harder for traditional security tools to flag or block the attack.</p>



<p>This campaign highlights a major shift in cyber threats. Instead of breaking into systems directly, attackers are abusing trusted tools that organizations rely on every day. As automation and AI-driven workflows become more common, they also introduce new risks that defenders must account for.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/n8n-webhook-malware-attack/">n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/n8n-webhook-malware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>W3LL Phishing Kit Takedown Disrupts MFA Bypass Campaign</title>
		<link>https://firsthackersnews.com/w3ll-phishing-kit/</link>
					<comments>https://firsthackersnews.com/w3ll-phishing-kit/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 10:25:18 +0000</pubDate>
				<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[#AccountTakeover]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#FBI]]></category>
		<category><![CDATA[#FraudPrevention]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MFABypass]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#PhishingToolkit]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityBreach]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#W3LL]]></category>
		<category><![CDATA[#W3LLPhishingKit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11592</guid>

					<description><![CDATA[<p>The FBI Atlanta Field Office, in collaboration with Indonesian law enforcement, has taken down a large-scale global phishing</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/w3ll-phishing-kit/">W3LL Phishing Kit Takedown Disrupts MFA Bypass Campaign</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The FBI Atlanta Field Office, in collaboration with Indonesian law enforcement, has taken down a large-scale global phishing operation linked to the W3LL toolkit. This joint effort marks a major milestone, as it is the first coordinated action between the United States and Indonesia targeting a phishing kit developer.</p>



<p>The operation focused on the W3LL phishing kit, a tool widely used by cybercriminals to steal credentials and bypass multi-factor authentication. Attackers used this kit to carry out large-scale fraud attempts, with losses estimated to exceed $20 million.</p>



<h2 class="wp-block-heading">How the W3LL Phishing Kit Worked</h2>



<p>The W3LL toolkit was designed to make cybercrime easier, even for low-skilled attackers. It was sold as a service, allowing buyers to quickly launch phishing campaigns using ready-made fake login pages that closely mimicked legitimate websites.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>What made this tool especially dangerous was its ability to go beyond simple credential theft. Instead of just capturing usernames and passwords, it also collected session data and authentication tokens. This allowed attackers to bypass MFA protections and gain ongoing access to accounts without raising immediate alerts.</p>



<p>The ecosystem also included an underground marketplace called W3LLSTORE. This platform enabled criminals to buy and sell stolen credentials, corporate access, and remote connections, creating a full cybercrime supply chain.</p>



<ul class="wp-block-list">
<li>Over 25,000 compromised accounts were sold between 2019 and 2023</li>



<li>More than 17,000 victims were targeted globally in recent campaigns</li>



<li>Fraud attempts exceeded $20 million</li>



<li>Stolen access was often resold multiple times for profit</li>
</ul>



<h2 class="wp-block-heading">Law Enforcement Action and Impact</h2>



<p>Even after the original marketplace shut down, the operation continued through private channels. Investigators tracked its evolution and identified the key individuals behind it.</p>



<p>With support from U.S. authorities, the FBI seized critical infrastructure used to run the phishing service. At the same time, Indonesian police arrested the suspected developer and took control of domains linked to the operation.</p>



<p>Officials described the platform as more than just a phishing kit—it functioned as a complete cybercrime service. By shutting it down, authorities have disrupted a major tool that attackers relied on to breach organizations.</p>



<p>This takedown highlights how modern phishing has evolved into organized, scalable operations—and why international cooperation is essential to combat today’s cyber threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/w3ll-phishing-kit/">W3LL Phishing Kit Takedown Disrupts MFA Bypass Campaign</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/w3ll-phishing-kit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CISA Alerts on Active Fortinet SQL Injection Exploit</title>
		<link>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/</link>
					<comments>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 05:41:17 +0000</pubDate>
				<category><![CDATA[CISA]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CISA]]></category>
		<category><![CDATA[#CVE202621643]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EMS]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#Exploit]]></category>
		<category><![CDATA[#Fortinet]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#KEV]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#RiskManagement]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#SQLInjection]]></category>
		<category><![CDATA[#ThreatAlert]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11588</guid>

					<description><![CDATA[<p>The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority warning that demands immediate attention from security</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/">CISA Alerts on Active Fortinet SQL Injection Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority warning that demands immediate attention from security teams across industries. A critical vulnerability affecting Fortinet products is now being actively exploited in the wild, significantly increasing the risk to exposed enterprise environments.</p>



<p>On April 13, 2026, the vulnerability identified as CVE-2026-21643 was officially added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. This inclusion is not routine—it signals confirmed attacker activity and indicates that exploitation is no longer theoretical. Threat actors are already leveraging this weakness to target organizations, making immediate remediation critical.</p>



<h2 class="wp-block-heading"><strong>Understanding the Vulnerability</strong></h2>



<p>The flaw exists in FortiClient Enterprise Management Server (EMS), a centralized platform used by organizations to manage endpoint security, enforce policies, and monitor device compliance. Because EMS sits at the core of endpoint control, any compromise can have far-reaching consequences across the entire network.</p>



<p>Technically, this issue is classified as a SQL injection vulnerability (CWE-89). It arises when user-supplied input is not properly validated before being processed by the backend database. Attackers can exploit this weakness by sending specially crafted HTTP requests that manipulate database queries and execute unintended commands.</p>



<p>What elevates the severity of this vulnerability is its unauthenticated nature. An attacker does not need valid credentials or prior access to the environment. If the EMS instance is exposed to the internet, it becomes a direct target. By simply interacting with the vulnerable interface, an attacker can execute arbitrary commands on the system.</p>



<h2 class="wp-block-heading"><strong>Real-World Risk and Exploitation Impact</strong></h2>



<p>The ability to execute code remotely without authentication places this vulnerability in the highest risk category. Once exploited, attackers can gain control over the EMS server, which often acts as a central authority for endpoint devices within an organization.</p>



<p>This level of access can enable attackers to move laterally across the network, deploy malicious payloads, manipulate endpoint configurations, or establish persistent backdoors. In many environments, EMS servers are trusted systems, which makes them an ideal pivot point for deeper compromise.</p>



<p>Although there is no confirmed evidence yet linking this vulnerability to ransomware campaigns, the attack pattern aligns closely with how ransomware operators typically gain initial access. Vulnerabilities that allow remote execution without authentication are frequently weaponized early in attack chains.</p>



<h2 class="wp-block-heading"><strong>Why Immediate Action Is Critical</strong></h2>



<p>CISA’s KEV listing is a clear indicator that organizations cannot afford delays. The window between public disclosure and widespread exploitation is often extremely short, and in this case, that window has already closed.</p>



<p>Organizations should treat this as an active incident risk rather than a routine patching task. Security teams are strongly advised to prioritize this vulnerability above regular update cycles and respond with urgency.</p>



<ul class="wp-block-list">
<li>Apply the latest Fortinet security patches immediately</li>



<li>Review system and application logs for unusual or malformed HTTP requests</li>



<li>Monitor for signs of unauthorized access or unexpected command execution</li>



<li>Follow all mitigation guidance provided by Fortinet</li>



<li>Disable or isolate affected systems if patching cannot be completed right away</li>
</ul>



<p>Under Binding Operational Directive 22-01, U.S. federal agencies are required to remediate this vulnerability by April 16, 2026. This aggressive timeline reflects the severity of the threat and should serve as a benchmark for private organizations as well.</p>



<h2 class="wp-block-heading"><strong>Final Thoughts</strong></h2>



<p>This vulnerability highlights a recurring issue in modern enterprise security—critical systems exposed to the internet without sufficient protection layers. When combined with an unauthenticated exploit, even a single overlooked patch can lead to full-scale compromise.</p>



<p>Organizations that rely on Fortinet EMS must act immediately, not only to patch the vulnerability but also to validate that their systems have not already been targeted. Proactive monitoring, rapid patching, and strict access controls remain essential in defending against threats of this nature.</p>



<p>In the current threat landscape, speed is not just an advantage—it is a necessity.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/">CISA Alerts on Active Fortinet SQL Injection Exploit</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/fortinet-sql-injection-cisa-warning/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Messaging Apps Used to Deliver ProSpy Spyware</title>
		<link>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/</link>
					<comments>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 09:35:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11582</guid>

					<description><![CDATA[<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as <strong>ProSpy</strong>, aimed primarily at journalists, activists, and political figures.</p>



<h2 class="wp-block-heading"><strong>Social Engineering and Delivery Tactics</strong></h2>



<p>The attack typically begins with direct contact. Victims are approached through platforms like LinkedIn, email, or messaging apps by accounts posing as journalists, support staff, or known contacts. These interactions are carefully crafted to build trust before introducing a malicious link.</p>



<p>The link is usually presented as something urgent or relevant, such as a video call request, shared document, or account alert. Once clicked, victims are redirected either to fake login pages or download portals.</p>



<p>Common tactics used:</p>



<ul class="wp-block-list">
<li>Impersonation of trusted individuals or organizations</li>



<li>Spearphishing messages tailored to the target</li>



<li>Fake login pages mimicking services like email or cloud platforms</li>



<li>Malicious download links disguised as secure communication tools</li>
</ul>



<p>This approach relies heavily on human trust rather than technical exploitation, making it highly effective even against cautious users.</p>



<h2 class="wp-block-heading"><strong>Fake Apps and Spyware Capabilities</strong></h2>



<p>The core of the campaign is the use of fake Android applications that appear to be secure messaging tools. These apps are distributed through convincing websites that mimic official sources and offer “enhanced” or “pro” versions of popular platforms.</p>



<p>Once installed, the spyware operates silently in the background, collecting and transmitting sensitive data to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="472" height="325" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png" alt="" class="wp-image-11583" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2-300x207.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png 472w" sizes="(max-width: 472px) 100vw, 472px" /><figcaption class="wp-element-caption">ProSpy searches for backup files from third-party applications and exfiltrates them (Source: Lookout).<br></figcaption></figure>



<p>Key capabilities include:</p>



<ul class="wp-block-list">
<li>Access to contacts, messages, and call-related data</li>



<li>Collection of device information and stored files</li>



<li>Extraction of documents, media, and backup data</li>



<li>Continuous communication with remote command servers</li>
</ul>



<p>The malware is designed to blend in as a legitimate app, making detection difficult for users who install it outside official app stores.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>Broader Implications</strong></h2>



<p>This campaign highlights a growing trend where attackers combine social engineering with mobile spyware to conduct surveillance operations. The targeting of civil society groups suggests a shift toward more personalized and contract-driven espionage activities.</p>



<p>It also reinforces a critical point: even advanced threats often rely on simple entry points — convincing a user to trust and install something that appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
