<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hackers &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malicious-cyber-actors/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Thu, 23 Oct 2025 04:53:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>hackers &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Iranian Hackers Target Over 100 Government Bodies with ‘Phoenix’ Backdoor</title>
		<link>https://firsthackersnews.com/iranian-hackers-phoenix-backdoor-cyberattack/</link>
					<comments>https://firsthackersnews.com/iranian-hackers-phoenix-backdoor-cyberattack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Oct 2025 04:53:45 +0000</pubDate>
				<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberEspionage]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#GroupIB]]></category>
		<category><![CDATA[#IranianHackers]]></category>
		<category><![CDATA[#MuddyWater]]></category>
		<category><![CDATA[#PhoenixBackdoor]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10543</guid>

					<description><![CDATA[<p>A new cyber espionage campaign has been launched by an Iranian state-sponsored hacking group known as MuddyWater, targeting</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/iranian-hackers-phoenix-backdoor-cyberattack/">Iranian Hackers Target Over 100 Government Bodies with ‘Phoenix’ Backdoor</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new cyber espionage campaign has been launched by an Iranian state-sponsored hacking group known as <strong>MuddyWater</strong>, targeting more than 100 government and diplomatic organisations. The campaign was uncovered by cybersecurity firm <strong>Group-IB</strong>, which linked the attacks to the group with high confidence.</p>



<p>The operation was said to have begun on <strong>August 19, 2025</strong>, when spear-phishing emails were sent using a compromised account accessed through the VPN service <strong>NordVPN</strong>. The messages were directed at government ministries, embassies, and consulates across the <strong>Middle East and North Africa</strong>.</p>



<p>By <strong>August 24</strong>, the hackers’ command-and-control (C2) infrastructure was taken down, suggesting a shift to another phase of the intrusion. The campaign’s main objective appeared to be long-term espionage and data theft from high-value government systems.</p>



<p>Malicious <strong>Microsoft Word documents</strong> carrying <strong>VBA macros</strong> were used in the phishing emails. When recipients enabled the content, a malware loader called <strong>FakeUpdate</strong> was installed. This loader then deployed the <strong>Phoenix backdoor (version 4)</strong> on infected systems.</p>



<p>It was also revealed that this latest version of Phoenix included a new <strong>COM-based persistence mechanism</strong>, allowing it to remain active even after system reboots.</p>



<p>According to Group-IB, the Phoenix malware was designed to execute commands remotely, upload and download files, open a shell for direct access, and adjust its sleep interval to evade detection.</p>



<p>Alongside Phoenix, a custom <strong>infostealer</strong> was also used to collect browser data from Chrome, Opera, Brave, and Edge. Stored credentials and encryption keys were extracted and sent to the attackers’ remote servers. Tools such as <strong>PDQ</strong> for software deployment and <strong>Action1</strong> for remote monitoring were also found in use, both previously linked to Iranian cyber operations.</p>



<p>The hacking activity showed clear similarities to previous <strong>MuddyWater</strong> campaigns. The use of identical code structures, malware families, and operational methods supported the attribution made by researchers.</p>



<p>Experts have warned that the campaign demonstrates how <strong>nation-state hackers</strong> continue to exploit phishing and remote tools to compromise sensitive networks. Organisations have been advised to disable macros by default, monitor Windows Registry changes, and review the use of remote management tools for suspicious behaviour.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/iranian-hackers-phoenix-backdoor-cyberattack/">Iranian Hackers Target Over 100 Government Bodies with ‘Phoenix’ Backdoor</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/iranian-hackers-phoenix-backdoor-cyberattack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</title>
		<link>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 22 Oct 2025 08:37:30 +0000</pubDate>
				<category><![CDATA[hackers]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hackers]]></category>
		<category><![CDATA[#Pwn2Own]]></category>
		<category><![CDATA[#Pwn2Own2025]]></category>
		<category><![CDATA[#SmartHomeSecurity]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10539</guid>

					<description><![CDATA[<p>Record-Breaking Day for Security Researchers Day One of Pwn2Own Ireland 2025 concluded with an extraordinary showcase of cybersecurity</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/">Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"><strong>Record-Breaking Day for Security Researchers</strong></h2>



<p>Day One of Pwn2Own Ireland 2025 concluded with an extraordinary showcase of cybersecurity talent, as researchers demonstrated 34 unique zero-day vulnerabilities across a wide range of consumer devices.<br>The exploits earned participants a combined payout of $522,500, marking one of the most successful opening days in the competition’s history.</p>



<p>Hosted by Trend Micro’s <strong>Zero Day Initiative (ZDI)</strong>, Pwn2Own is renowned for uncovering security flaws in real-world products. This year’s event stood out for its <strong>100% success rate</strong>, with every single exploit attempt succeeding on the first day — a rare achievement in competitive hacking.</p>



<h2 class="wp-block-heading"><strong>Teams Dominate Smart Home and NAS Devices</strong></h2>



<p>The first day featured 17 exploitation attempts targeting various connected devices including printers, routers, smart home systems, and NAS (Network-Attached Storage) units from major global manufacturers.</p>



<p>Team DDOS, made up of Bongeun Koo and Evangelos Daravigkas, took an early lead by chaining together eight vulnerabilities to compromise both a QNAP Qhora-322 router and a QNAP TS-453E NAS device.<br>Their impressive “SOHO Smashup” demonstration earned them $100,000 in prize money and 10 Master of Pwn points, placing them among the top contenders early in the event.</p>



<h2 class="wp-block-heading"><strong>Smart Home Devices Fall to Expert Exploits</strong></h2>



<p>Several popular smart home products were also successfully compromised, including the Philips Hue Bridge, Synology ActiveProtect DP320, and Home Assistant Green.</p>



<p>Sina Kheirkhah from the Summoning Team stood out for participating in multiple successful exploits, including a powerful attack against the Synology ActiveProtect Appliance DP320 that earned an additional $50,000 in rewards.</p>



<p>In one of the most notable demonstrations, researcher DMDung of STAR Labs exploited a single out-of-bounds access vulnerability to take control of the Sonos Era 300 smart speaker — achieving the highest single-device payout of $50,000 and securing five Master of Pwn points.</p>



<p>Consumer printers were not spared from the day’s onslaught of exploits. Both Canon and HP devices were successfully hacked, highlighting ongoing concerns about the security of office and home printers.</p>



<p>The Canon imageCLASS MF654Cdw was a particularly popular target, with four different teams exploiting it using combinations of heap-based and stack-based buffer overflow vulnerabilities.<br>Meanwhile, Team Neodyme executed a stack-based buffer overflow on the HP DeskJet 2855e, earning $20,000 for their exploit.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/">Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>China-Backed Hackers Used 45 Hidden Domains in Telecom Cyber Attacks</title>
		<link>https://firsthackersnews.com/china-backed-salt-typhoon-45-domains-telecom-cyber-attacks/</link>
					<comments>https://firsthackersnews.com/china-backed-salt-typhoon-45-domains-telecom-cyber-attacks/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 09 Sep 2025 06:37:54 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[#ChinaHacking]]></category>
		<category><![CDATA[#CyberAttacks]]></category>
		<category><![CDATA[#CyberEspionage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#OnlineSecurity]]></category>
		<category><![CDATA[#SaltTyphoon]]></category>
		<category><![CDATA[#TelecomSecurity]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#UN4841]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10491</guid>

					<description><![CDATA[<p>Threat hunters recently found 45 secret domains linked to Salt Typhoon, a China-backed hacking group. These domains, some</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/china-backed-salt-typhoon-45-domains-telecom-cyber-attacks/">China-Backed Hackers Used 45 Hidden Domains in Telecom Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Threat hunters recently found <strong>45 secret domains</strong> linked to <strong>Salt Typhoon</strong>, a China-backed hacking group. These domains, some created in May 2020, show their <strong>cyber espionage</strong> started years before the 2024 <strong>telecom attacks</strong>. For example, the oldest domain, <strong>onlineeylity[.]com</strong>, was registered on May 19, 2020, using a fake name, Monica Burch, with a false Los Angeles address.</p>



<h2 class="wp-block-heading"><strong>Salt Typhoon’s Sneaky Tactics</strong></h2>



<p>Since 2019, <strong>Salt Typhoon</strong>, also known as <strong>UNC4841</strong>, has targeted sensitive systems. They exploited a major flaw, <strong>CVE-2023-2868</strong>, in Barracuda Email Security Gateway systems. This flaw, with a severity score of 9.8, allowed hackers to access emails. Additionally, Silent Push, a cybersecurity firm, noted these domains connect to <strong>high-density IP addresses</strong>, hosting many websites. Some low-density IPs date back to October 2021.</p>



<h2 class="wp-block-heading"><strong>Links to Other Hacking Groups</strong></h2>



<p>Interestingly, <strong>Salt Typhoon</strong> shares methods with groups like <strong>Earth Estries</strong>, <strong>FamousSparrow</strong>, <strong>GhostEmperor</strong>, and <strong>UNC5807</strong>. For instance, they targeted <strong>U.S. telecom companies</strong> in 2024, focusing on critical systems. Moreover, 16 domains were registered using <strong>Proton Mail emails</strong> tied to fake addresses, showing their clever tricks to stay hidden.</p>



<h2 class="wp-block-heading"><strong>Implications for Global Cybersecurity</strong> </h2>



<p>This exposure of <strong>45 unreported domains in Salt Typhoon operations</strong> serves as a wake-up call for organizations worldwide, especially those in high-risk sectors like telecommunications and government. The longevity of this campaign—spanning from 2019 to the present—highlights the persistent nature of <strong>state-sponsored cyber threats</strong> from actors like Salt Typhoon.</p>



<p>Experts at Silent Push urge immediate action: &#8220;As such, we strongly urge any organization that believes itself to be at risk of Chinese espionage to search its DNS logs for the past five years for requests to any of the domains in our archive feed, or their subdomains. It would also be prudent to check for requests to any of the listed IP addresses, particularly during the time periods in which this actor operated them.&#8221;</p>



<h2 class="wp-block-heading"><strong>Protecting Against These Threats</strong></h2>



<p>This discovery highlights the danger of <strong>China-linked cyber threats</strong>. Silent Push advises checking <strong>DNS logs</strong> for the past five years for these domains or IPs. Also, organizations should:</p>



<ul class="wp-block-list">
<li>Update systems to fix vulnerabilities like <strong>CVE-2023-2868</strong>.</li>



<li>Watch for suspicious subdomains or IPs.</li>



<li>Share threat information to stay ahead of hackers.</li>
</ul>



<p>In conclusion, these <strong>45 domains</strong> reveal <strong>Salt Typhoon’s</strong> long-running espionage. Therefore, telecoms and governments must act fast to strengthen <strong>cybersecurity defenses</strong> against such advanced threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/china-backed-salt-typhoon-45-domains-telecom-cyber-attacks/">China-Backed Hackers Used 45 Hidden Domains in Telecom Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/china-backed-salt-typhoon-45-domains-telecom-cyber-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Launch Daring $130 Million Bank Heist Attempt on Brazilian Fintech Firm</title>
		<link>https://firsthackersnews.com/brazilian-fintech-130m-bank-heist-attempt/</link>
					<comments>https://firsthackersnews.com/brazilian-fintech-130m-bank-heist-attempt/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 03 Sep 2025 06:14:10 +0000</pubDate>
				<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Bank Heist]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[#BankHeist]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#FintechBreach]]></category>
		<category><![CDATA[#FintechSecurity]]></category>
		<category><![CDATA[#PixPaymentSystem]]></category>
		<category><![CDATA[#SinqiaBreach]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10481</guid>

					<description><![CDATA[<p>In a shocking cybersecurity incident that highlights the growing threats to global financial systems, hackers recently targeted a</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/brazilian-fintech-130m-bank-heist-attempt/">Hackers Launch Daring $130 Million Bank Heist Attempt on Brazilian Fintech Firm</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In a shocking cybersecurity incident that highlights the growing threats to global financial systems, hackers recently targeted a prominent Brazilian fintech company in an audacious bid to siphon off $130 million. This attempted bank heist underscores the vulnerabilities in real-time payment platforms and the critical need for robust third-party access controls. If you&#8217;re in the fintech industry or concerned about cyber threats, here&#8217;s everything you need to know about this high-stakes breach.</p>



<p>On August 29, 2025, cybercriminals infiltrated Sinqia S.A., a São Paulo-based subsidiary of the leading financial technology provider Evertec, Inc. The attackers exploited the Brazilian Central Bank&#8217;s instant payment system, known as Pix, to initiate unauthorized business-to-business transactions. Pix, launched in November 2020, has become Brazil&#8217;s most popular payment method, operating 24/7 and handling massive volumes of real-time transfers—making it a prime target for sophisticated cyber attacks.</p>



<p>The breach involved attempts to steal approximately $130 million, affecting operations linked to two financial institutions that are customers of Sinqia. Local media reports have pointed fingers at HSBC as one of the involved banks, though the institution has firmly stated that no customer funds or personal data were compromised. Sinqia, which provides financial software and IT services to the banking sector, supports 24 financial institutions across Brazil, amplifying the potential ripple effects of this incident.</p>



<h2 class="wp-block-heading"><strong>Outcomes and Ongoing Recovery Efforts</strong></h2>



<p>Following the detection, Sinqia engaged external cybersecurity forensics experts to investigate and mitigate the breach. A portion of the targeted $130 million has already been recovered, with efforts continuing to reclaim the rest. Importantly, there&#8217;s no evidence that the attack extended beyond the Pix system or involved the exposure of personal data, providing some relief amid the chaos.</p>



<p>In response, the Central Bank of Brazil temporarily revoked Sinqia&#8217;s access to the Pix platform. The company is actively collaborating with authorities, submitting necessary documentation and assurances to restore connectivity. Evertec, Sinqia&#8217;s parent company and a major player in transaction processing across Latin America, Puerto Rico, and the Caribbean, has filed disclosures with the U.S. Securities and Exchange Commission (SEC), noting that the financial and reputational impacts could be significant. This includes potential effects on internal controls, though full details are still emerging.</p>



<p>HSBC, responding to media speculation, reiterated that the incident had no bearing on its customers&#8217; assets or information, emphasizing the isolated nature of the breach within Sinqia&#8217;s operations.</p>



<h2 class="wp-block-heading"><strong>Broader Implications for Cybersecurity in Fintech</strong></h2>



<p>This attempted $130 million bank heist serves as a stark reminder of the escalating risks in the fintech sector, where real-time payment systems like Pix are both innovative and vulnerable. Brazil&#8217;s Pix has faced repeated threats from Android banking malware and other cyber exploits, reflecting a global trend of increasing attacks on financial infrastructure.</p>



<p>For businesses, the incident stresses the importance of multi-factor authentication, regular vendor audits, and advanced threat detection systems. As cyber threats evolve—with reports like the Picus Blue Report 2025 showing a doubling in password cracking attempts—fintech firms must prioritize proactive defenses to safeguard against similar breaches.</p>



<p>Evertec acquired Sinqia in 2023 to expand its footprint in Brazil&#8217;s booming financial market, but this event could lead to heightened scrutiny from regulators and investors. The full material impact, including any long-term damage to trust and operations, remains to be seen.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/brazilian-fintech-130m-bank-heist-attempt/">Hackers Launch Daring $130 Million Bank Heist Attempt on Brazilian Fintech Firm</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/brazilian-fintech-130m-bank-heist-attempt/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack</title>
		<link>https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/</link>
					<comments>https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 02 Sep 2025 06:50:38 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataBreach2025]]></category>
		<category><![CDATA[#DriftCompromise]]></category>
		<category><![CDATA[#SalesforceBreach]]></category>
		<category><![CDATA[#SalesLoftHack]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ZscalerBreach]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10477</guid>

					<description><![CDATA[<p>In a major cybersecurity incident shaking the tech world, Zscaler, a leading cloud security provider, has confirmed a</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/">Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In a major cybersecurity incident shaking the tech world, Zscaler, a leading cloud security provider, has confirmed a data breach that exposed sensitive customer information due to a supply chain attack targeting SalesLoft and Drift integrations with Salesforce. This breach, reported on September 1, 2025, has sparked widespread concern about the vulnerabilities in third-party SaaS integrations. If you’re a Zscaler customer or care about data security, here’s everything you need to know about the breach, the exposed data, and how to protect yourself from potential fallout.</p>



<h2 class="wp-block-heading"><strong>What Happened in the Zscaler Data Breach?</strong></h2>



<p>The breach originated from a sophisticated supply chain attack exploiting SalesLoft’s Drift AI chat agent, which integrates with Salesforce to manage sales workflows. Threat actors, identified by Google Threat Intelligence Group (GTIG) as UNC6395, stole OAuth and refresh tokens from SalesLoft Drift, gaining unauthorized access to Zscaler’s Salesforce environment between August 8 and August 18, 2025. This allowed hackers to exfiltrate sensitive customer data from Zscaler’s Salesforce instance. Importantly, Zscaler’s core products, services, and infrastructure were not compromised, but the breach still poses significant risks due to the nature of the exposed information.</p>



<h2 class="wp-block-heading"><strong>Exposed Information: What Was Leaked?</strong></h2>



<p>The attackers accessed a range of sensitive customer data stored in Zscaler’s Salesforce environment. According to Zscaler’s advisory, the compromised information includes:</p>



<ul class="wp-block-list">
<li><strong>Customer Names</strong>: Full names of individuals associated with Zscaler accounts. </li>



<li><strong>Business Email Addresses</strong>: Corporate email IDs, which could be used for targeted phishing campaigns.</li>



<li> <strong>Job Titles</strong>: Professional roles, enabling attackers to craft convincing social engineering attacks.</li>



<li><strong>Phone Numbers</strong>: Business contact numbers, increasing the risk of voice phishing (vishing). </li>



<li><strong>Regional/Location Details</strong>: Geographic data tied to customer accounts. </li>



<li><strong>Zscaler Product Licensing and Commercial Information</strong>: Details about licensing agreements and commercial transactions.</li>



<li> <strong>Support Case Content</strong>: Plain text from certain customer support cases, though no attachments or files were included.</li>
</ul>



<p>While Zscaler has found no evidence of misuse so far, the stolen data is highly valuable for cybercriminals. It could be used for phishing, vishing, or social engineering attacks, where attackers impersonate Zscaler or trusted vendors to extract further sensitive information or credentials.</p>



<p>Data breaches like this aren&#8217;t just headlines – they have real-world consequences. Exposed customer info could be weaponized for:</p>



<ul class="wp-block-list">
<li><strong>Phishing and Social Engineering</strong>: Hackers might impersonate Zscaler to trick users into revealing more data. </li>



<li><strong>Reputation Damage</strong>: For Zscaler, a company built on trust in security, this could erode client confidence.</li>



<li> <strong>Industry Wake-Up Call</strong>: It underscores the need for robust vendor risk management, especially in cloud-based services.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/">Zscaler Data Breach 2025: Customer Names, Emails, and Support Data Exposed in SalesLoft and Drift Hack</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zscaler-data-breach-2025-salesloft-drift-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis</title>
		<link>https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/</link>
					<comments>https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 17 Jun 2025 07:22:17 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#InsuranceCybersecurity]]></category>
		<category><![CDATA[#InsurTech]]></category>
		<category><![CDATA[#ScatteredSpider]]></category>
		<category><![CDATA[#SIMSwapping]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10305</guid>

					<description><![CDATA[<p>Scattered Spider Threat Looms Over Insurance Industry Google’s Threat Intelligence Group has identified multiple cybersecurity breaches in American</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/">Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"><strong>Scattered Spider Threat Looms Over Insurance Industry</strong></h2>



<p>Google’s Threat Intelligence Group has identified multiple cybersecurity breaches in American insurance companies, all consistent with Scattered Spider’s signature tactics. Previously targeting UK and U.S. retailers—including prominent names like Marks &amp; Spencer, Harrods, and Co-op—this hacker collective is now pivoting to a new vertical insurance.</p>



<h2 class="wp-block-heading"><strong>What Is Scattered Spider?</strong></h2>



<p>Scattered Spider—also known by aliases like UNC3944, 0ktapus, Scatter Swine, Starfraud, and Muddled Libra—is a decentralized hacking coalition specializing in <strong>ransomware</strong>, <strong>social engineering</strong>, and <strong>SIM-swapping</strong> attacks. Their campaigns often begin with deceptive communications—calls, SMS or email—targeted at help desks or call centers to bypass multi-factor authentication and gain unauthorized access.</p>



<h2 class="wp-block-heading"><strong>Recent Intrusions Impacting Major Insurers</strong></h2>



<p>Several high-profile U.S. insurance organizations, including <strong>Erie Insurance</strong> and <strong>Philadelphia Insurance Companies</strong>, have reported network outages and suspicious activity dating from early to mid-June. Both incidents involved emergency shutdowns of internal systems, telephony infrastructure, and customer portals. </p>



<ul class="wp-block-list">
<li><strong>Erie Insurance</strong> detected abnormal network behavior on June 7, disrupting services and initiating a forensic investigation in partnership with law enforcement.</li>



<li><strong>Philadelphia Insurance Companies (PHLY)</strong> reported unauthorized access around June 9, isolating systems to contain the breach while working with external cybersecurity experts.</li>
</ul>



<h2 class="wp-block-heading"><strong>Attack Methods: A Sophisticated Social Engineering Campaign</strong></h2>



<p>Scattered Spider employs a highly coordinated and deceptive set of cyberattack strategies, primarily centered around advanced social engineering. One of their most common tactics is <strong>help-desk impersonation</strong>, where attackers fabricate convincing stories to manipulate support staff into resetting login credentials, granting unauthorized access. They also exploit <strong>MFA fatigue</strong>—also known as MFA bombing—by continuously sending multi-factor authentication requests until users inadvertently approve access out of frustration or confusion. In addition, <strong>SIM swapping and phishing</strong> are used to hijack mobile numbers or steal login credentials, enabling intrusions into cloud platforms and endpoint devices. Once deep access is achieved, the group often proceeds to deploy powerful <strong>ransomware strains</strong> like <em>DragonForce</em>, <em>RansomHub</em>, and <em>Qilin</em>, encrypting critical data and demanding ransom for its release. These methods highlight Scattered Spider’s expertise in blending psychological manipulation with technical precision.</p>



<h2 class="wp-block-heading"><strong>Why the Insurance Sector Is at Risk</strong></h2>



<ul class="wp-block-list">
<li><strong>Sector-by-Sector Strategy</strong>: Scattered Spider typically targets one industry intensely before moving on.</li>



<li><strong>Human Vulnerabilities</strong>: Insurance firms rely heavily on call centers and legacy identity systems—prime targets for social engineering .</li>



<li><strong>Rich Data &amp; Customer Trust</strong>: Access to sensitive financial and personal data makes insurers lucrative for cybercriminals.</li>
</ul>



<h2 class="wp-block-heading"><strong>Proactive Defense Strategies</strong></h2>



<p>To strengthen cyber resilience, Google and Mandiant recommend that insurance firms should:</p>



<ul class="wp-block-list">
<li><strong>Implement Zero‑Trust Identity Controls</strong>: Segregate user identities, enforce strong password policies, and integrate phishing-resistant MFA.</li>



<li><strong>Enhance Helpdesk Authentication</strong>: Use challenge-response scripts, photo verification, or voice recognition before resetting passwords.</li>



<li><strong>Train Staff in Social Engineering Awareness</strong>: Educate on tactics like MFA bombing and pretexted calls.</li>



<li><strong>Monitor for Anomalous Access</strong>: Flag logins from unusual locations or residential IPs—especially post-reset.</li>



<li><strong>Conduct Regular Forensic Readiness</strong>: Maintain log review, incident playbooks, and partnerships with third-party cybersecurity firms.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/">Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ArubaOS Critical Vulnerability Allows Remote Code Execution by Attackers</title>
		<link>https://firsthackersnews.com/arubaos-critical-vulnerability/</link>
					<comments>https://firsthackersnews.com/arubaos-critical-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 03 May 2024 00:41:48 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Remote code execution]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[arubaos]]></category>
		<category><![CDATA[critical vulnerability]]></category>
		<category><![CDATA[remote code execution]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7861</guid>

					<description><![CDATA[<p>Multiple vulnerabilities in ArubaOS affect HPE Aruba Networking devices, including Mobility Conductor, Mobility Controllers WLAN Gateways, and SD-WAN</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/arubaos-critical-vulnerability/">ArubaOS Critical Vulnerability Allows Remote Code Execution by Attackers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Multiple vulnerabilities in ArubaOS affect HPE Aruba Networking devices, including Mobility Conductor, Mobility Controllers WLAN Gateways, and SD-WAN Gateways managed by Aruba Central. These vulnerabilities involve Unauthenticated Buffer Overflow (CVE-2024-26305, CVE-2024-26304, CVE-2024-33511, CVE-2024-33512, and CVE-2024-33518) and Unauthenticated Denial-of-Service (CVE-2024-33513, CVE-2024-33514, CVE-2024-33515, CVE-2024-33516, CVE-2024-33517, and CVE-2024-33518).</p>



<p>These vulnerabilities, ranging from 5.3 (Medium) to 9.8 (Critical) in severity, are all linked to the PAPI (Protocol Application Programming Interface) protocol.</p>



<h2 class="wp-block-heading"><strong>ArubaOS Critical Vulnerability</strong></h2>



<p><strong>Unauthenticated Buffer Overflow Vulnerability</strong></p>



<p>This vulnerability, present in multiple areas, could enable threat actors to execute unauthenticated remote code on vulnerable systems.</p>



<p>Exploiting this vulnerability could result in the execution of arbitrary code with elevated privileges. The vulnerability exists in various components with different severities:</p>



<ul class="wp-block-list">
<li>Utility Daemon (CVE-2024-26305 – 9.8 (Critical))</li>



<li>L2/L3 Management Service (CVE-2024-26304 – 9.8 (Critical))</li>



<li>Automatic Reporting Service (CVE-2024-33511 – 9.8 (Critical))</li>



<li>Local User Authentication Database (CVE-2024-33512 – 9.8 (Critical))</li>
</ul>



<p><strong>Unauthenticated Denial-Of-Service</strong></p>



<p>This vulnerability enables a threat actor to disrupt the normal functioning of the affected product, rendering it inoperable. The vulnerability occurs in multiple components with the following severities:</p>



<ul class="wp-block-list">
<li>AP Management Service (CVE-2024-33513, CVE-2024-33514, CVE-2024-33515 – 5.9 (Medium))</li>



<li>Auth Service (CVE-2024-33516 – 5.3 (Medium))</li>



<li>Radio Frequency Manager Service (CVE-2024-33517 – 5.3 (Medium))</li>



<li>Radio Frequency Daemon (CVE-2024-3518 – 5.3 (Medium))</li>
</ul>



<h2 class="wp-block-heading"><strong>Affected Products and Fixed Versions</strong></h2>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Affected Software Versions</strong></td><td><strong>Versions from and up to</strong></td></tr><tr><td>ArubaOS 10.5.x.x&nbsp;</td><td>10.5.1.0 and below</td></tr><tr><td>ArubaOS 10.4.x.x&nbsp;</td><td>10.4.1.0 and below</td></tr><tr><td>ArubaOS 8.11.x.x&nbsp;</td><td>8.11.2.1 and below</td></tr><tr><td>ArubaOS 8.10.x.x&nbsp;</td><td>8.10.0.10 and below</td></tr><tr><td>ArubaOS 8.8.x.x:</td><td>all</td></tr><tr><td>ArubaOS 8.7.x.x:</td><td>all</td></tr><tr><td>ArubaOS 8.6.x.x:</td><td>all</td></tr><tr><td>ArubaOS 6.5.4.x:</td><td>all</td></tr><tr><td>SD-WAN 8.7.0.0-2.3.0.x:</td><td>all</td></tr><tr><td>SD-WAN 8.6.0.4-2.2.x.x:</td><td>all</td></tr></tbody></table></figure>



<figure class="wp-block-table"><table><tbody><tr><td><strong>Fixed in versions</strong></td><td><strong>Versions to</strong></td></tr><tr><td>ArubaOS 10.6.x.x</td><td>10.6.0.0 and above</td></tr><tr><td>ArubaOS 10.5.x.x</td><td>10.5.1.1 and above</td></tr><tr><td>ArubaOS 10.4.x.x</td><td>10.4.1.1 and above</td></tr><tr><td>ArubaOS 8.11.x.x</td><td>8.11.2.2 and above</td></tr><tr><td>ArubaOS 8.10.x.x</td><td>8.10.0.11 and above</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#x200d;Follow Us on:<strong> <a href="https://twitter.com/Info_FHNews" target="_blank" rel="noreferrer noopener">Twitter</a>,<a href="https://www.instagram.com/first_hackers_news/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/arubaos-critical-vulnerability/">ArubaOS Critical Vulnerability Allows Remote Code Execution by Attackers</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/arubaos-critical-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Exploit SVG Image Files for GUloader Malware Distribution</title>
		<link>https://firsthackersnews.com/guloader-malware-distribution/</link>
					<comments>https://firsthackersnews.com/guloader-malware-distribution/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 29 Feb 2024 17:17:29 +0000</pubDate>
				<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Darknet]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[exploitation]]></category>
		<category><![CDATA[GuLoader]]></category>
		<category><![CDATA[Malicious]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[Stealthy malware]]></category>
		<category><![CDATA[SVG files]]></category>
		<category><![CDATA[SVG image files]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7473</guid>

					<description><![CDATA[<p>Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of the GUloader malware.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/guloader-malware-distribution/">Hackers Exploit SVG Image Files for GUloader Malware Distribution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of the GUloader malware.</p>



<h2 class="wp-block-heading"><strong>Hackers Exploit SVG Image Files for GUloader Malware</strong></h2>



<p>GuLoader is notorious for its stealth capabilities and capacity to circumvent conventional security measures by employing polymorphic code and encryption. </p>



<p>These features enable it to constantly alter its structure, posing challenges for antivirus software and intrusion detection systems in detecting its presence. SpiderLabs&#8217; observations indicate a significant surge in the utilization of GuLoader.</p>



<p>McAfee Labs has recently detected a campaign involving the distribution of GUloader through malicious SVG files delivered via email.</p>



<p>SVG stands for Scalable Vector Graphics. Furthermore, it is a widely used file format for vector graphics that describes two-dimensional graphics in XML format. Moreover, SVG files are used for various purposes, including web design, icons, logos, illustrations, and interactive graphics.</p>



<p>One of the main advantages of SVG files is that they can be scaled to any size without losing quality, making them ideal for responsive web design and high-resolution displays. Additionally, SVG files can be edited with text editors or graphic design software. Moreover, they support features like animations and interactivity through JavaScript.</p>



<p>The infection process initiates when a user opens an SVG file attached to an email. This action prompts the browser to download a ZIP file that contains a Windows Script File (WSF).</p>



<p>The WSF file then executes, utilizing wscript to invoke a PowerShell command that establishes a connection to a malicious domain. Consequently, it executes hosted content, including shellcode injected into the MSBuild application.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="932" height="227" src="https://firsthackersnews.com/wp-content/uploads/2024/02/image.png" alt="" class="wp-image-7474" srcset="https://firsthackersnews.com/wp-content/uploads/2024/02/image-200x49.png 200w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-300x73.png 300w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-400x97.png 400w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-600x146.png 600w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-768x187.png 768w, https://firsthackersnews.com/wp-content/uploads/2024/02/image-800x195.png 800w, https://firsthackersnews.com/wp-content/uploads/2024/02/image.png 932w" sizes="(max-width: 932px) 100vw, 932px" /></figure>



<h2 class="wp-block-heading"><strong>More details</strong></h2>



<p>The attack begins with a spam email containing an SVG file named “dhgle-Skljdf.svg”. Embedded JavaScript within the SVG file triggers the creation of a malicious ZIP archive upon opening.</p>



<p>Once extracted, the ZIP file reveals an obfuscated WSF script, thereby complicating analysis.</p>



<p>This script employs PowerShell to establish a connection to a malicious domain and execute the retrieved content. Additionally, this content includes base64-encoded shellcode and a PowerShell script.</p>



<p><br>The PowerShell script endeavors to inject the shellcode into the legitimate MSBuild process through the Process Hollowing technique.</p>



<p>Following injection, the shellcode conducts an anti-analysis check and alters the Registry run key to establish persistence.</p>



<p>In the last stage, the process entails downloading and executing the final malicious executable, GUloader, or its variants.</p>



<p><br>The utilization of SVG files to distribute malware such as GUloader represents a worrisome advancement in the cybersecurity realm.</p>



<p>It&#8217;s imperative for organizations and individuals to exercise caution when encountering unexpected email attachments, particularly those containing SVG files. </p>



<p>Additionally, security professionals should prioritize updating their detection systems to effectively mitigate this evolving threat.</p>



<h2 class="wp-block-heading"><strong>IOCs</strong></h2>



<figure class="wp-block-table is-style-stripes"><table><tbody><tr><td><strong>File</strong></td><td><strong>SHA256/URL</strong></td></tr><tr><td>Email</td><td>66b04a8aaa06695fd718a7d1baa19386922b58e797634d5ac4ff96e79584f5c1</td></tr><tr><td>SVG</td><td>b20ea4faca043274bfbb1f52895c02a15cd0c81a333c40de32ed7ddd2b9b60c0</td></tr><tr><td>WSF</td><td>0a196171571adc8eb9edb164b44b7918f83a8425ec3328d9ebbec14d7e9e5d93</td></tr><tr><td>URL</td><td>hxxps://winderswonders[.]com/JK/Equitably[.]mix</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/guloader-malware-distribution/">Hackers Exploit SVG Image Files for GUloader Malware Distribution</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/guloader-malware-distribution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes</title>
		<link>https://firsthackersnews.com/exploit-weaponized-zip-files/</link>
					<comments>https://firsthackersnews.com/exploit-weaponized-zip-files/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 29 Feb 2024 15:46:43 +0000</pubDate>
				<category><![CDATA[BOTNET]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[NTLM hashes]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[weaponized ZIP]]></category>
		<category><![CDATA[zip files]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7470</guid>

					<description><![CDATA[<p>Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of concealing malicious payloads</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/exploit-weaponized-zip-files/">Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of concealing malicious payloads within compressed archives. This tactic poses a challenge for security systems, as detecting and analyzing the contents of such files becomes increasingly complex.</p>



<p>These files can serve as conduits for delivering multiple payloads to target users, enabling attackers to exploit vulnerabilities or execute various malicious operations once the files are extracted.</p>



<h2 class="wp-block-heading"><strong>Cybercriminals Exploit Weaponized ZIP</strong></h2>



<p>Recently, cybersecurity analysts at ANY.RUN uncovered active exploitation by hackers utilizing weaponized ZIP files to pilfer NTLM hashes.</p>



<p>The ingenious aspect lies in the intricate crafting of a 450-byte template for this HTML page. This page facilitates encrypted HTTP traffic redirection through multiple nodes. Facilitating this process is Google App Script (GAS), which receives requests from compromised systems. </p>



<p>Furthermore, the attackers employ the SMB protocol for implementation, utilizing the impacket-smbserver tool on their servers. This integration adds complexity and sophistication, indicative of a meticulously planned cyber strategy.</p>



<p>When the HTML content is opened, the attackers obtain the following user data:</p>



<ul class="wp-block-list"><li>IP address</li><li>NTLM challenge data</li><li>Username</li><li>Victim&#8217;s computer name</li></ul>



<h2 class="wp-block-heading"><strong>MITRE</strong></h2>



<ul class="wp-block-list"><li>Phishing (T1566)</li><li>User and PC name enumeration (T1589)</li><li>NTLM compromise (T1187)</li></ul>



<h2 class="wp-block-heading"><strong>Recommendation</strong></h2>



<p><br>To block these exploits effectively, consider implementing the following recommendations:</p>



<ol class="wp-block-list"><li><strong>Security Awareness Training</strong>: Educate users about the risks associated with opening attachments or clicking on links from unknown or suspicious sources.</li><li><strong>Email Filtering</strong>: Utilize advanced email filtering solutions to detect and block malicious attachments and links before they reach users&#8217; inboxes.</li><li><strong>Web Filtering</strong>: Employ web filtering tools to block access to known malicious websites and prevent users from inadvertently downloading malicious files.</li><li><strong>Network Segmentation</strong>: Segment your network to limit the spread of malware in case of a successful breach. This can prevent attackers from easily moving laterally within your network.</li><li><strong>Patch Management</strong>: Keep all software, including operating systems, web browsers, and plugins, up to date with the latest security patches to mitigate known vulnerabilities.</li><li><strong>Antivirus and Anti-Malware Software</strong>: Deploy robust antivirus and anti-malware solutions across all endpoints to detect and remove malicious files and activities.</li><li><strong>Behavioral Analysis</strong>: Implement security solutions that use behavioral analysis techniques to identify and block suspicious activities, such as abnormal file behavior or network traffic patterns.</li><li><strong>Disable SMBv1</strong>: Consider disabling the outdated SMBv1 protocol, which is commonly exploited by attackers, and encourage the use of more secure versions like SMBv2 or SMBv3.</li><li><strong>Network Monitoring</strong>: Monitor network traffic and system logs for signs of unusual or suspicious activity, which could indicate a potential exploit attempt.</li><li><strong>Incident Response Plan</strong>: Develop and regularly update an incident response plan to ensure a prompt and coordinated response to security incidents, including the mitigation of exploits and the restoration of affected systems.</li></ol>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong> <a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank"> Instagram</a>, <a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong> to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/exploit-weaponized-zip-files/">Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/exploit-weaponized-zip-files/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Two Adobe ColdFusion Vulnerabilities Exploited in The Wild</title>
		<link>https://firsthackersnews.com/coldfusion-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/coldfusion-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 10 Jan 2024 01:57:54 +0000</pubDate>
				<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[IOC's]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[adobe]]></category>
		<category><![CDATA[coldfusion]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=7278</guid>

					<description><![CDATA[<p>Two vulnerabilities in Adobe ColdFusion have been targeted in real-world attacks, as cautioned by the Cybersecurity &#38; Infrastructure</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/coldfusion-vulnerabilities/">Two Adobe ColdFusion Vulnerabilities Exploited in The Wild</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Two vulnerabilities in Adobe ColdFusion have been targeted in real-world attacks, as cautioned by the Cybersecurity &amp; Infrastructure Security Agency (CISA). These vulnerabilities stem from inadequate validation of deserialized data, leading to the potential for arbitrary code execution. Adobe addressed these issues by releasing patches in mid-July 2023, promptly after their initial detection.</p>



<h2 class="wp-block-heading"><strong>COLDFUSION ACE VULNERABILITIES EXPLOITED IN REAL-WORLD ATTACKS</strong></h2>



<p>On January 8, CISA issued their routine advisory on recently exploited vulnerabilities, highlighting two security breaches in Adobe ColdFusion, both traced back to the summer of 2023. </p>



<p>Despite the availability of patches around the same timeframe, the organization expresses certainty about the exploitation, aligning with prevailing trends. The concern intensifies as both vulnerabilities carry a CVSS rating of 9.8, indicating a high level of risk associated with their utilization in cyberattacks.</p>



<p>Both CVE-2023-29300 and CVE-2023-38203 highlight inadequate data validation during deserialization, resulting in arbitrary code execution (ACE). Intriguingly, both vulnerabilities affect the same string versions of ColdFusion – 2018, 2021, and 2023. </p>



<p>Exploiting these vulnerabilities involves sending a specially crafted data package to a vulnerable ColdFusion server, allowing adversaries to execute desired code without requiring user interaction, thereby heightening the severity of the vulnerability.</p>



<p>Arbitrary code execution vulnerabilities not only provide entry points but also opportunities for lateral movement. The ease of exploitation, requiring no user input, makes it a straightforward process. Given ColdFusion&#8217;s popularity as an app server solution, compromising it facilitates access to critical information, making finding a victim effortless.</p>



<h2 class="wp-block-heading"><strong>List of Affected ColdFusion Versions</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>Vulnearbility</th><th>Affected ColdFusion versions</th></tr></thead><tbody><tr><td>CVE-2023-29300<br>CVE-2023-38203</td><td>ColdFusion 2018, 2021, 2023</td></tr></tbody></table></figure>



<p>&nbsp;Here is&nbsp;<strong>the list of ColdFusion versions that are no longer vulnerable</strong>&nbsp;to the said exploits:</p>



<figure class="wp-block-table"><table><thead><tr><th>Version</th><th>Fixed in</th></tr></thead><tbody><tr><td>ColdFusion 2023</td><td>Update 1</td></tr><tr><td>ColdFusion 2021</td><td>Update 7</td></tr><tr><td>ColdFusion 2018</td><td>Update 17</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>&#x200d;Follow Us on:<strong>&nbsp;<a rel="noreferrer noopener" href="https://twitter.com/Info_FHNews" target="_blank">Twitter</a>,<a rel="noreferrer noopener" href="https://www.instagram.com/first_hackers_news/" target="_blank">&nbsp;Instagram</a>,&nbsp;<a rel="noreferrer noopener" href="https://www.linkedin.com/in/firsthackers-news/" target="_blank">Facebook</a></strong>&nbsp;to get the latest security news!</p></blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/coldfusion-vulnerabilities/">Two Adobe ColdFusion Vulnerabilities Exploited in The Wild</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/coldfusion-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
