<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Malware &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/malware/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 21 Apr 2026 06:49:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Malware &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</title>
		<link>https://firsthackersnews.com/n8n-webhook-malware-attack/</link>
					<comments>https://firsthackersnews.com/n8n-webhook-malware-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 05:48:17 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AutomationSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#n8n]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#WebhookAttack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11602</guid>

					<description><![CDATA[<p>A new cyberattack campaign is exploiting trusted automation platforms like n8n to deliver malware and track users in</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/n8n-webhook-malware-attack/">n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new cyberattack campaign is exploiting trusted automation platforms like n8n to deliver malware and track users in a much more subtle way. Instead of relying on traditional malicious infrastructure, attackers are hiding their activity inside legitimate services—making detection far more difficult.</p>



<p>Between October 2025 and March 2026, security analysts observed a significant spike in phishing campaigns leveraging webhook functionality. These attacks take advantage of how automation tools are designed to connect apps and process real-time data, effectively turning a business productivity feature into a delivery channel for cyber threats.</p>



<h2 class="wp-block-heading">How the Attack Works</h2>



<p>Platforms like n8n and Zapier use webhooks to trigger workflows when a user interacts with a specific URL. Attackers are now embedding these webhook URLs into phishing emails, often disguising them as trusted services like file-sharing links.</p>



<p>When a victim clicks the link, the webhook triggers a workflow that dynamically serves content based on the user’s system or browser data. This makes the attack highly adaptive and harder to detect.</p>



<p>In many observed cases, users are redirected to fake pages that mimic services such as cloud storage platforms. These pages may include CAPTCHA-style verification to appear legitimate. Once the user interacts, a malicious file is downloaded—often disguised as a document or installer.</p>



<ul class="wp-block-list">
<li>Attackers use trusted webhook URLs to bypass security filters</li>



<li>Payloads are dynamically tailored based on victim device data</li>
</ul>



<h2 class="wp-block-heading">Advanced Techniques and Impact</h2>



<p>Research from Cisco Talos shows that attackers are not just delivering malware—they are also using these workflows to collect valuable data about their targets.</p>



<p>Some campaigns install remote monitoring tools that give attackers persistent access to infected systems. Others use tracking techniques, such as invisible pixels in emails, to monitor when messages are opened and gather device-level information.</p>



<p>Because the traffic originates from legitimate platforms, it blends into normal network activity. This makes it much harder for traditional security tools to flag or block the attack.</p>



<p>This campaign highlights a major shift in cyber threats. Instead of breaking into systems directly, attackers are abusing trusted tools that organizations rely on every day. As automation and AI-driven workflows become more common, they also introduce new risks that defenders must account for.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/n8n-webhook-malware-attack/">n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/n8n-webhook-malware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Messaging Apps Used to Deliver ProSpy Spyware</title>
		<link>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/</link>
					<comments>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 09:35:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11582</guid>

					<description><![CDATA[<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as <strong>ProSpy</strong>, aimed primarily at journalists, activists, and political figures.</p>



<h2 class="wp-block-heading"><strong>Social Engineering and Delivery Tactics</strong></h2>



<p>The attack typically begins with direct contact. Victims are approached through platforms like LinkedIn, email, or messaging apps by accounts posing as journalists, support staff, or known contacts. These interactions are carefully crafted to build trust before introducing a malicious link.</p>



<p>The link is usually presented as something urgent or relevant, such as a video call request, shared document, or account alert. Once clicked, victims are redirected either to fake login pages or download portals.</p>



<p>Common tactics used:</p>



<ul class="wp-block-list">
<li>Impersonation of trusted individuals or organizations</li>



<li>Spearphishing messages tailored to the target</li>



<li>Fake login pages mimicking services like email or cloud platforms</li>



<li>Malicious download links disguised as secure communication tools</li>
</ul>



<p>This approach relies heavily on human trust rather than technical exploitation, making it highly effective even against cautious users.</p>



<h2 class="wp-block-heading"><strong>Fake Apps and Spyware Capabilities</strong></h2>



<p>The core of the campaign is the use of fake Android applications that appear to be secure messaging tools. These apps are distributed through convincing websites that mimic official sources and offer “enhanced” or “pro” versions of popular platforms.</p>



<p>Once installed, the spyware operates silently in the background, collecting and transmitting sensitive data to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="472" height="325" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png" alt="" class="wp-image-11583" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2-300x207.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png 472w" sizes="(max-width: 472px) 100vw, 472px" /><figcaption class="wp-element-caption">ProSpy searches for backup files from third-party applications and exfiltrates them (Source: Lookout).<br></figcaption></figure>



<p>Key capabilities include:</p>



<ul class="wp-block-list">
<li>Access to contacts, messages, and call-related data</li>



<li>Collection of device information and stored files</li>



<li>Extraction of documents, media, and backup data</li>



<li>Continuous communication with remote command servers</li>
</ul>



<p>The malware is designed to blend in as a legitimate app, making detection difficult for users who install it outside official app stores.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>Broader Implications</strong></h2>



<p>This campaign highlights a growing trend where attackers combine social engineering with mobile spyware to conduct surveillance operations. The targeting of civil society groups suggests a shift toward more personalized and contract-driven espionage activities.</p>



<p>It also reinforces a critical point: even advanced threats often rely on simple entry points — convincing a user to trust and install something that appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ClickFix Variant Bypasses Detection Using Rundll32 &#038; WebDAV</title>
		<link>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/</link>
					<comments>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 19:09:57 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#ClickFix]]></category>
		<category><![CDATA[#ClickFixVariant]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DetectionBypass]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Rundll32]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#WebDAV]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11539</guid>

					<description><![CDATA[<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newer and more dangerous version of the ClickFix attack is now targeting Windows users, and it’s taking a smarter route than before. Earlier variants relied heavily on PowerShell or mshta, which many security tools already watch closely. This time, attackers are using built-in Windows tools like rundll32.exe and WebDAV to stay under the radar and avoid early detection.</p>



<p>Instead of obvious scripting activity, the attack blends into normal system behavior. This makes it harder for security teams to notice anything suspicious during the initial stages.</p>



<h2 class="wp-block-heading"><strong>How the Attack Tricks Users</strong></h2>



<p>ClickFix still depends on social engineering. The attacker lures users to a fake website that looks like a CAPTCHA verification page. One such example is “healthybyhillary[.]com.”</p>



<figure class="wp-block-image size-full"><img decoding="async" width="903" height="534" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image.png" alt="" class="wp-image-11540" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-300x177.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-768x454.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image.png 903w" sizes="(max-width: 903px) 100vw, 903px" /><figcaption class="wp-element-caption">Phishing Website (Source – CyberProof)</figcaption></figure>



<p>The page guides the user through a simple-looking process:</p>



<ul class="wp-block-list">
<li>Press <strong>Win + R</strong> to open the Run dialog</li>



<li>Paste a pre-copied command using <strong>Ctrl + V</strong></li>



<li>Hit <strong>Enter</strong> to execute it</li>
</ul>



<p>To an average user, this feels like a normal verification step. But in reality, it triggers a malicious command that starts the infection process.</p>



<h2 class="wp-block-heading"><strong>How It Evades Detection</strong></h2>



<p>Once executed, the attack uses rundll32.exe along with WebDAV to pull a malicious DLL from a remote server. Since rundll32.exe is a trusted Windows tool, this activity often appears legitimate.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="825" height="858" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png" alt="" class="wp-image-11541" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-288x300.png 288w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1-768x799.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-1.png 825w" sizes="(max-width: 825px) 100vw, 825px" /><figcaption class="wp-element-caption">Attack Chain  (Source – CyberProof)<br></figcaption></figure>



<p>A few key techniques make this variant harder to detect:</p>



<ul class="wp-block-list">
<li>Uses <strong>WebDAV</strong> to fetch remote files like a network share</li>



<li>Executes DLL functions using <strong>ordinal numbers (#1)</strong> instead of readable names</li>



<li>Avoids early use of PowerShell to bypass common detection rules</li>



<li>Runs most of the attack <strong>in memory</strong>, leaving minimal traces on disk</li>
</ul>



<p>After the initial stage, PowerShell is used quietly with flags like <strong>-NoP</strong> and <strong>-NonI</strong>, along with <strong>IEX (Invoke-Expression)</strong> to load additional payloads.</p>



<p>The final payload, known as <strong>SkimokKeep</strong>, includes advanced evasion methods:</p>



<ul class="wp-block-list">
<li>Resolves system functions using <strong>hashing instead of direct imports</strong></li>



<li>Checks for sandbox or VM environments before running</li>



<li>Uses anti-debugging tricks like timing checks</li>



<li>Injects code into legitimate processes such as browsers</li>
</ul>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>This shift is significant because many defenses are still focused on detecting script-based attacks. By abusing trusted Windows components and reducing visible activity, attackers get a much quieter entry point.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>What Security Teams Should Watch</strong></h2>



<p>To detect or prevent this attack, organizations should focus on unusual system behavior rather than just scripts:</p>



<ul class="wp-block-list">
<li>Monitor suspicious use of <strong>rundll32.exe</strong>, especially with WebDAV-related arguments</li>



<li>Enable <strong>command-line logging</strong> for system binaries (LOLBins)</li>



<li>Restrict or monitor <strong>WebDAV traffic over port 80</strong></li>



<li>Block known malicious IPs and domains linked to the campaign</li>



<li>Educate users about <strong>fake CAPTCHA pages and ClickFix tricks</strong></li>
</ul>



<p>This variant shows how attackers continue to adapt. The real risk isn’t just the malware itself—it’s how easily users can be convinced to launch it.</p>



<h2 class="wp-block-heading"><strong>Block Known Malicious Infrastructure</strong></h2>



<p>Security teams should proactively block known indicators linked to this campaign to reduce exposure:</p>



<ul class="wp-block-list">
<li><strong>178.16.53[.]137</strong></li>



<li><strong>141.98.234[.]27</strong></li>



<li><strong>46.149.73[.]60</strong></li>



<li><strong>91.219.23[.]245</strong></li>
</ul>



<p>Suspicious domains to watch or block:</p>



<ul class="wp-block-list">
<li><strong>mer-forgea.sightup[.]in[.]net</strong></li>



<li><strong>data-x7-sync.neurosync[.]in[.]net</strong></li>
</ul>



<p>You can place this section right after the “What Security Teams Should Watch” section so it flows naturally as an action step.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/">ClickFix Variant Bypasses Detection Using Rundll32 &amp; WebDAV</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/clickfix-variant-rundll32-webdav-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</title>
		<link>https://firsthackersnews.com/windows-kernel-driver-security-update/</link>
					<comments>https://firsthackersnews.com/windows-kernel-driver-security-update/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 29 Mar 2026 05:22:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DriverSecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#KernelSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#Microsoft]]></category>
		<category><![CDATA[#Rootkit]]></category>
		<category><![CDATA[#SecureBoot]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#ThreatProtection]]></category>
		<category><![CDATA[#Windows11]]></category>
		<category><![CDATA[#WindowsServer2025]]></category>
		<category><![CDATA[#WindowsUpdate]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11518</guid>

					<description><![CDATA[<p>Microsoft is introducing a major security improvement in Windows 11 and Windows Server 2025 by changing how kernel</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-kernel-driver-security-update/">Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft is introducing a major security improvement in Windows 11 and Windows Server 2025 by changing how kernel drivers are trusted and loaded, significantly enhancing Windows kernel driver security. Starting with the April 2026 update, the operating system will block untrusted cross-signed kernel drivers by default.</p>



<p>This update ensures that only drivers verified through Microsoft’s Windows Hardware Compatibility Program (WHCP) are allowed to run automatically. By enforcing stricter validation, Microsoft is reducing the risk of attackers using malicious drivers to gain deep, kernel-level access to systems.</p>



<p>This enhancement is crucial for maintaining high standards of Windows kernel driver security across all devices.</p>



<p>Kernel drivers operate at the core of the operating system, so any weakness in how they are signed or validated can be exploited. By removing support for legacy signing methods, Microsoft is closing a long-standing security gap.</p>



<h2 class="wp-block-heading"><strong>Removal of Cross-Signed Drivers and Security Impact</strong></h2>



<p>The older cross-signing model allowed third-party certificate authorities to approve drivers without strict validation from Microsoft. While this approach helped with compatibility in the past, it also introduced security risks.</p>



<p>Attackers have historically abused this model by stealing signing keys and using them to install rootkits and other advanced malware. Even though Microsoft deprecated cross-signing in 2021, older certificates were still trusted by Windows systems until now.</p>



<p>With this update, that trust is fully removed. Drivers must now go through a stricter approval process that includes:</p>



<ul class="wp-block-list">
<li>Identity verification of the vendor</li>



<li>Security and compatibility testing</li>



<li>Malware scanning before certification</li>
</ul>



<p>This significantly reduces the chances of malicious drivers being loaded into the Windows kernel.</p>



<h2 class="wp-block-heading"><strong>Deployment Approach and Enterprise Considerations</strong></h2>



<p>To avoid disruptions, Microsoft is rolling out this change in stages. Initially, the system will monitor and evaluate driver activity before enforcing the block. This allows organizations to identify compatibility issues early.</p>



<p>Additionally, Microsoft will maintain an allow list for widely used legacy drivers to prevent system failures. If unsupported drivers are detected, enforcement may be delayed until the system is stable.</p>



<p>For enterprise environments, there is still controlled flexibility. Organizations that rely on custom kernel drivers can allow them using Application Control for Business policies. These policies must be securely signed and tied to UEFI Secure Boot, ensuring only trusted internal drivers are permitted.</p>



<p>Overall, this update marks a significant step toward strengthening Windows security by limiting kernel-level attack vectors and enforcing modern driver validation standards.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-kernel-driver-security-update/">Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-kernel-driver-security-update/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</title>
		<link>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/</link>
					<comments>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 19:14:56 +0000</pubDate>
				<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Linux Malware]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#Backdoor]]></category>
		<category><![CDATA[#CVE20243094]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#LinuxSecurity]]></category>
		<category><![CDATA[#LinuxVulnerability]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#OpenSourceSecurity]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#ssh]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#xz]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11512</guid>

					<description><![CDATA[<p>Red Hat has raised a critical alert after a supply chain attack was discovered in the widely used</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/xz-backdoor-vulnerability-linux/">xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Red Hat has raised a critical alert after a supply chain attack was discovered in the widely used xz compression tool. Security researchers found that certain recent versions of the library were tampered with, introducing hidden malicious functionality.</p>



<p>This issue, identified as <strong>CVE-2024-3094</strong>, impacts versions 5.6.0 and 5.6.1. The injected code is designed to stay hidden during normal review processes and only becomes active during the software build stage. Once active, it can interfere with SSH authentication, potentially allowing attackers to gain unauthorized access to affected systems.</p>



<h2 class="wp-block-heading">Technical Impact and Mitigation</h2>



<p>The attack is highly sophisticated, as the malicious components are not fully visible in the main source code. Instead, they rely on additional build-time elements to assemble and execute the payload. This makes detection difficult using standard code inspection methods.</p>



<p>Once deployed, the compromised library can alter how SSH authentication behaves, creating an opportunity for attackers to bypass normal security checks and access systems remotely.</p>



<p>Key highlights:</p>



<ul class="wp-block-list">
<li>CVE-2024-3094 affects xz and xz-libs versions 5.6.0 and 5.6.1</li>



<li>Malicious code is triggered during the build process</li>



<li>Targets SSH authentication mechanisms</li>



<li>Impacts Fedora Rawhide, Fedora 40 Beta, Debian unstable, and openSUSE</li>



<li>Red Hat Enterprise Linux (RHEL) remains unaffected</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h3 class="wp-block-heading">Immediate Actions</h3>



<ul class="wp-block-list">
<li>Downgrade to trusted xz version 5.4.x</li>



<li>Stop using Fedora Rawhide until systems are secured</li>



<li>Apply official patches and updates from Red Hat</li>



<li>Monitor systems for unusual SSH behavior</li>
</ul>



<p>Even though active exploitation has not been widely reported, the nature of this compromise makes it a high-risk issue. Prompt action is necessary to protect systems from potential unauthorized access.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/xz-backdoor-vulnerability-linux/">xz Backdoor Vulnerability Exposes Linux Systems to Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/xz-backdoor-vulnerability-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Mirai Botnets Now Driving DDoS and Proxy Abuse</title>
		<link>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/</link>
					<comments>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 15:08:45 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#BotnetActivity]]></category>
		<category><![CDATA[#Botnets]]></category>
		<category><![CDATA[#C2Servers]]></category>
		<category><![CDATA[#CyberAttacks]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DDoS]]></category>
		<category><![CDATA[#DDoSAttack]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#IoTBotnet]]></category>
		<category><![CDATA[#IoTSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#Mirai]]></category>
		<category><![CDATA[#MiraiBotnet]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#ProxyAbuse]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11502</guid>

					<description><![CDATA[<p>Mirai botnets are rapidly evolving into powerful platforms used for large-scale DDoS attacks and proxy abuse across IoT</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/">Mirai Botnets Now Driving DDoS and Proxy Abuse</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Mirai botnets are rapidly evolving into powerful platforms used for large-scale DDoS attacks and proxy abuse across IoT and mobile devices.</p>



<p>Researchers observed over 21,000 command-and-control (C2) servers between July and December 2025. Along with this growth, attackers are increasingly using infected devices as residential proxies, not just for DDoS attacks.</p>



<p>This rise also aligns with a surge in massive DDoS campaigns. Reports highlight “hyper-volumetric” attacks, including one reaching 31.4 Tbps, showing how far these botnets have evolved. At the same time, botnet activity has sharply increased after a period of stability, indicating a renewed wave of large-scale operations.</p>



<h2 class="wp-block-heading"><strong>Evolution of Mirai-Based Botnets</strong></h2>



<p>Mirai first appeared in 2016, targeting internet-connected devices such as routers and IoT systems that often rely on weak or default credentials. Once compromised, these devices are added to a botnet that can launch high-volume traffic floods across multiple layers.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="750" height="686" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-5.png" alt="" class="wp-image-11503" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-5-300x274.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-5.png 750w" sizes="auto, (max-width: 750px) 100vw, 750px" /><figcaption class="wp-element-caption">Top regions hosting botnet C2 infrastructure (Source: Spamhaus).<br></figcaption></figure>



<p>The public release of Mirai’s source code played a major role in its growth. It allowed attackers to create multiple variants, each adding new capabilities while keeping the core attack techniques intact.</p>



<p>One well-known variant, Satori, rapidly spread by exploiting vulnerabilities in routers, especially through command injection flaws. It used automated scripts to download and execute malware across different device architectures, allowing infections to scale quickly without user interaction.</p>



<h2 class="wp-block-heading">Expanding Capabilities and Abuse Techniques</h2>



<p>Modern Mirai botnets are no longer limited to DDoS attacks. They are now being used in more advanced and flexible ways, increasing their overall impact.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1000" height="563" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-6.png" alt="" class="wp-image-11504" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-6-300x169.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-6-768x432.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-6.png 1000w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /><figcaption class="wp-element-caption">Botnets used in brute-force attacks (Source: Spamhaus).<br></figcaption></figure>



<p>Key capabilities seen in recent campaigns include:</p>



<ul class="wp-block-list">
<li>Large-scale DDoS attacks reaching record-breaking volumes</li>



<li>Use of infected devices as residential proxy networks</li>



<li>Automated exploitation of IoT vulnerabilities</li>



<li>Multi-architecture malware deployment for wider coverage</li>



<li>Stealthier operations to avoid detection</li>
</ul>



<h2 class="wp-block-heading">Aisuru-Kimwolf Expanding DDoS and Proxy Abuse</h2>



<p>Newer botnet families like Aisuru and Kimwolf have taken Mirai-based threats to the next level. These botnets are now used not only for massive DDoS attacks but also as residential proxy networks that can be rented for cybercrime activities.</p>



<p>Security reports have linked Aisuru-Kimwolf to extremely large attacks, including one reaching 31.4 Tbps. These attacks often generate massive traffic with billions of packets per second, using random patterns to avoid basic detection and filtering systems.</p>



<p>At the same time, Kimwolf, which targets Android devices, is being used to exploit residential proxy services. Attackers use these networks to access internal systems, infect devices like smart TVs and smartphones, and then sell that access for activities such as fraud and credential stuffing.</p>



<h2 class="wp-block-heading">Ongoing Threat and Defensive Focus</h2>



<p>Law enforcement and tech companies have started taking action against these botnets by targeting their command-and-control infrastructure and disrupting the platforms used to manage proxy networks.</p>



<p>However, these efforts have not fully stopped the threat. Mirai-based botnets continue to survive and grow because many devices remain unpatched, especially routers and Android systems. Attackers can also quickly rebuild their infrastructure after disruptions.</p>



<p>For defenders, the focus should remain on strong basic security practices:</p>



<ul class="wp-block-list">
<li>Keep routers and IoT devices updated</li>



<li>Monitor unusual outbound traffic</li>



<li>Secure Android and edge devices</li>



<li>Track indicators linked to Mirai variants</li>
</ul>



<p>As these botnets continue to evolve, they are becoming more powerful and more versatile, combining large-scale disruption with stealthy abuse of network access.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/">Mirai Botnets Now Driving DDoS and Proxy Abuse</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/mirai-botnets-ddos-proxy-abuse/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</title>
		<link>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/</link>
					<comments>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 19:24:57 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Web application security]]></category>
		<category><![CDATA[#AppleDevices]]></category>
		<category><![CDATA[#AppleSecurity]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DarkSword]]></category>
		<category><![CDATA[#ExploitChain]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#iOSExploit]]></category>
		<category><![CDATA[#iOSVulnerability]]></category>
		<category><![CDATA[#iPhoneRisk]]></category>
		<category><![CDATA[#iPhoneSecurity]]></category>
		<category><![CDATA[#KernelExploit]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#SafariExploit]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11498</guid>

					<description><![CDATA[<p>DarkSword iOS exploit is now drawing serious attention after researchers confirmed that the advanced exploit chain is no</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-exploit-leaked-online/">DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>DarkSword iOS exploit is now drawing serious attention after researchers confirmed that the advanced exploit chain is no longer limited to its original operators.</strong><br> This development raises serious concerns because it means a highly sophisticated exploit is no longer restricted to a limited group of attackers.</p>



<p>A recent demonstration by security researcher @matteyeux showed successful kernel read and write access on an iPad mini 6 running iOS 18.6.2 using the DarkSword exploit. This public validation shows that the exploit remains effective in real-world conditions and increases the risk for millions of Apple devices that have not yet been patched.</p>



<p>Google Threat Intelligence Group reportedly first observed DarkSword in active campaigns in November 2025. The exploit kit has been mainly linked to UNC6353, a suspected Russian espionage group that previously used the Coruna iOS exploit kit. Reported targets have included victims in Ukraine, Saudi Arabia, Turkey, and Malaysia, showing that the threat has already been used in focused international operations.</p>



<h2 class="wp-block-heading">Technical Structure and Post-Compromise Activity</h2>



<p>DarkSword is not just a single exploit but a complete exploit kit and infostealer written in JavaScript. The attack typically begins when a victim visits a compromised website containing a malicious iframe, a method commonly associated with watering hole attacks.</p>



<p>Once the target opens the page, the exploit escapes Safari’s WebContent sandbox. It then bypasses important Apple protections, including Trusted Path Read-Only and Pointer Authentication Codes, by abusing sensitive internal dyld structures in writable stack memory. The chain then moves through the GPU process by exploiting an out-of-bounds write flaw in the ANGLE graphics engine before targeting the XNU kernel through a Copy-On-Write vulnerability in the AppleM2ScalerCSCDriver driver.</p>



<p>This gives attackers arbitrary memory read and write access, allowing them to modify sandbox restrictions and reach protected parts of the file system. Researchers also found that DarkSword operates fully in memory and quickly loads final-stage malware after compromise. Three malware families linked to the activity have been identified as GHOSTBLADE, GHOSTKNIFE, and GHOSTSABER. These payloads are designed to steal sensitive data, including secure messages, saved credentials, and cryptocurrency wallet information.</p>



<h2 class="wp-block-heading">Security Response and Protection Measures</h2>



<p>The public validation of DarkSword by independent researchers significantly increases the overall threat level. Once a working exploit chain becomes accessible beyond its original operators, the chances of wider abuse rise sharply.</p>



<p>The command-and-control infrastructure used in these operations adds to the concern. Instead of using obvious malicious domains, attackers relied on subdomains created on compromised legitimate websites, helping their traffic blend in and making detection harder.</p>



<p>To reduce risk, Apple users and enterprise security teams should ensure that all devices are updated immediately to iOS 26.1 or later, as these versions include fixes for the kernel vulnerabilities involved in the exploit chain. For high-risk users such as journalists, executives, and government personnel, enabling Apple’s Lockdown Mode can provide an additional layer of defense against advanced web-based attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/darksword-ios-exploit-leaked-online/">DarkSword iOS Exploit Leaked Online, Putting Apple Devices at Risk</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/darksword-ios-exploit-leaked-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Wiper Malware: The Rising Cyber Threat Authorities Are Warning About</title>
		<link>https://firsthackersnews.com/wiper-malware-rising-cyber-threat/</link>
					<comments>https://firsthackersnews.com/wiper-malware-rising-cyber-threat/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 15 Mar 2026 19:49:14 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#destructivemalware]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAttack]]></category>
		<category><![CDATA[#malwareprotection]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#wipermalware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11456</guid>

					<description><![CDATA[<p>Cybersecurity agencies around the world are warning about the growing risk of wiper malware. This type of malicious</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wiper-malware-rising-cyber-threat/">Wiper Malware: The Rising Cyber Threat Authorities Are Warning About</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity agencies around the world are warning about the growing risk of wiper malware. This type of malicious software is designed to destroy data instead of stealing it. Recent alerts from authorities indicate that the threat is increasing and could impact organizations that depend heavily on digital systems.</p>



<p>Unlike many traditional cyberattacks that focus on financial gain, wiper malware aims to cause maximum disruption. Once it infects a system, it can erase important information and damage operating systems, making recovery extremely difficult.</p>



<h2 class="wp-block-heading"><strong>What is Wiper Malware</strong></h2>



<p>Wiper malware is a type of malicious software created to erase data, corrupt files, and damage operating systems. When activated, it begins deleting important files and may overwrite storage sectors so that the data cannot be recovered. Because of this destructive design, the main goal of the attack is to disrupt operations rather than extract financial value.</p>



<p>Key characteristics of wiper malware include</p>



<ul class="wp-block-list">
<li>Permanent deletion of files and system data</li>



<li>Corruption of operating systems and boot records</li>



<li>Disruption of entire networks and infrastructure</li>
</ul>



<p>These capabilities allow attackers to cause severe operational damage within a short time.</p>



<p><strong>Why Security Authorities Are Raising Concerns</strong></p>



<p>Cybersecurity authorities are raising warnings because destructive malware campaigns have increased in recent years. Many attackers are shifting from traditional data theft to attacks that focus on operational damage and disruption.</p>



<p>Wiper malware is particularly dangerous because it can spread across connected systems and destroy large volumes of data. If organizations do not have reliable backup systems or recovery plans, restoring operations can take significant time and resources.</p>



<h2 class="wp-block-heading"><strong>How Wiper Malware Enters a Network</strong></h2>



<p>Like many cyber threats, wiper malware typically enters a network through common attack techniques. Phishing emails, unpatched vulnerabilities, and compromised credentials are often used as the initial entry point.</p>



<p>Once attackers gain access, they may move across multiple systems within the network before deploying the destructive payload. This allows the malware to affect several machines at the same time, increasing the overall damage.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>Potential Impact on Organizations</strong></h2>



<p>The impact of a wiper malware attack can be severe because the data destruction is usually permanent. Organizations may lose important files, operational systems, and access to critical services.</p>



<p>Possible consequences include</p>



<ul class="wp-block-list">
<li>Loss of sensitive and operational data</li>



<li>Shutdown of business systems and services</li>



<li>Financial losses caused by downtime</li>



<li>Reputational damage and regulatory challenges</li>
</ul>



<p>Organizations that do not maintain proper backups or incident response plans may struggle to recover quickly.</p>



<h2 class="wp-block-heading"><strong>How Organizations Can Reduce the Risk</strong></h2>



<p>Organizations can lower the risk of destructive malware by strengthening their cybersecurity practices. Maintaining regular offline backups, applying system updates, and monitoring networks for unusual activity are important steps.</p>



<p>Security awareness training for employees is also essential, since phishing emails remain one of the most common entry points for malware attacks.</p>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>Wiper malware represents a serious cyber threat focused on destruction rather than financial gain. As cybersecurity authorities continue to warn about the growing risk, organizations must ensure that their defenses, monitoring capabilities, and backup strategies are strong enough to withstand such attacks.</p>



<p>Preparing in advance is essential to minimize disruption and protect critical digital infrastructure.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wiper-malware-rising-cyber-threat/">Wiper Malware: The Rising Cyber Threat Authorities Are Warning About</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wiper-malware-rising-cyber-threat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Use Microsoft Teams Attack Method to Gain Remote Access</title>
		<link>https://firsthackersnews.com/microsoft-teams-attack-remote-access/</link>
					<comments>https://firsthackersnews.com/microsoft-teams-attack-remote-access/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 05:33:20 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#A0Backdoor]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAttack]]></category>
		<category><![CDATA[#MicrosoftTeams]]></category>
		<category><![CDATA[#MicrosoftTeamsAttack]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#QuickAssist]]></category>
		<category><![CDATA[#RemoteAccessAttack]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#ThreatActors]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11431</guid>

					<description><![CDATA[<p>Cybersecurity researchers have uncovered Microsoft Teams attack campaigns are now targeting employees in finance and healthcare organizations by</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-attack-remote-access/">Hackers Use Microsoft Teams Attack Method to Gain Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity researchers have uncovered Microsoft Teams attack campaigns are now targeting employees in finance and healthcare organizations by posing as internal IT support.</p>



<p>In this operation, attackers pretend to be internal IT support staff and convince victims to grant remote access to their computers. Once access is obtained, they deploy a stealthy malware tool called <strong>A0Backdoor</strong> to maintain long-term control of the system.</p>



<p>Researchers at BlueVoyant linked the activity to a threat group known as <strong>Blitz Brigantine</strong>, also tracked as <strong>Storm-1811</strong>.</p>



<h2 class="wp-block-heading"><strong><strong>How the Microsoft Teams Attack Begins</strong></strong></h2>



<p>The campaign starts with a tactic designed to overwhelm the victim.</p>



<p>Attackers send a large number of spam emails to the target’s inbox in a short period of time. This “email bombing” creates confusion and pressure for the employee.</p>



<p>Soon after, the attacker contacts the victim through Microsoft Teams, pretending to be from the company’s IT help desk and offering to fix the email problem.</p>



<p>The victim is then guided to open <strong>Windows Quick Assist</strong>, a legitimate remote support tool built into Windows. Once the victim approves the request, the attacker gains full remote control of the device.</p>



<h2 class="wp-block-heading"><strong>Malware Installation Process</strong></h2>



<p>After gaining access, the attackers begin installing malicious software on the system.</p>



<p>They download installer packages that appear to be legitimate updates for Microsoft Teams or Windows Phone Link. To make the files look trustworthy, the attackers:</p>



<p>• host the installers on Microsoft cloud storage accounts<br>• sign the files using digital certificates<br>• disguise them as normal software updates</p>



<p>When the installer runs, it places a real Microsoft application alongside a malicious file named <strong>hostfxr.dll</strong>.</p>



<p>When the legitimate program starts, it accidentally loads the malicious file instead. This technique is known as <strong>DLL sideloading</strong>, which allows malware to run quietly without raising suspicion.</p>



<h2 class="wp-block-heading"><strong>Advanced Evasion Techniques</strong></h2>



<p>The malicious loader uses several tricks to avoid detection and analysis.</p>



<p>• checks system firmware for signs of virtual testing environments<br>• creates multiple junk processing threads to disrupt debugging tools<br>• uses time-based conditions to unlock the main payload</p>



<p>The malware only activates within a specific <strong>55-hour time window</strong>, making it harder for researchers to analyze.</p>



<p>Another unusual trick involves an invisible space character hidden in a command line prompt. The malware requires this hidden character to generate the correct key needed to decrypt the final payload.</p>



<p>These techniques make the attack extremely difficult to study or reproduce.</p>



<h2 class="wp-block-heading"><strong>A0Backdoor and Data Exfiltration</strong></h2>



<p>Once the protection checks are completed, the malware loads <strong>A0Backdoor</strong> directly into memory.</p>



<p>This backdoor allows attackers to collect information and maintain persistent access to the infected system.</p>



<p>The malware gathers details such as:</p>



<p>• system device information<br>• username and environment details<br>• network configuration data</p>



<p>This information helps attackers identify and manage compromised machines.</p>



<h2 class="wp-block-heading"><strong>Using DNS Tunneling to Stay Hidden</strong></h2>



<p>To communicate with attacker servers without raising alarms, the malware uses a technique called <strong>DNS tunneling</strong>.</p>



<p>Instead of connecting directly to a suspicious command server, the malware sends requests through trusted public DNS resolvers such as <strong>1.1.1.1</strong> or <strong>8.8.8.8</strong>.</p>



<p>These requests are disguised as normal mail exchange queries used in everyday email routing.</p>



<p>The attackers hide commands and stolen data inside long subdomains within the DNS requests. The public resolver forwards the request to the attacker’s server and sends the response back to the infected machine.</p>



<p>Because the traffic looks like regular network activity, it blends in with normal corporate operations.</p>



<p>The attackers also rely on <strong>older registered domains</strong> instead of new ones, helping them bypass security filters that often block recently created domains.</p>



<h2 class="wp-block-heading"><strong>How Organizations Can Reduce Risk</strong></h2>



<p>Security experts warn that this campaign shows how attackers are shifting from traditional ransomware to more stealthy and targeted intrusion techniques.</p>



<p>Organizations should take several steps to reduce risk:</p>



<p>• train employees to verify IT support messages received through Microsoft Teams<br>• monitor and restrict remote access tools like Quick Assist<br>• block unapproved software installers from running on company systems<br>• watch for unusual DNS traffic patterns</p>



<p>Improving employee awareness and controlling remote access tools can significantly reduce the chances of these types of attacks succeeding.</p>



<p><strong>Organizations should train employees to recognize signs of a Microsoft Teams attack to prevent remote access abuse.</strong><br></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-attack-remote-access/">Hackers Use Microsoft Teams Attack Method to Gain Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-teams-attack-remote-access/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apache ActiveMQ Vulnerability Enables DoS Attacks</title>
		<link>https://firsthackersnews.com/apache-activemq-dos-vulnerability-mqtt-packets/</link>
					<comments>https://firsthackersnews.com/apache-activemq-dos-vulnerability-mqtt-packets/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 19:25:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#activemq]]></category>
		<category><![CDATA[#activemqvulnerability]]></category>
		<category><![CDATA[#apacheactivemq]]></category>
		<category><![CDATA[#apachevulnerability]]></category>
		<category><![CDATA[#cve202566168]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#denialofservice]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#dosattack]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#mqtt]]></category>
		<category><![CDATA[#mqttsecurity]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11384</guid>

					<description><![CDATA[<p>Researchers have identified a security issue in Apache ActiveMQ, specifically related to the Apache ActiveMQ DoS vulnerability, a</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apache-activemq-dos-vulnerability-mqtt-packets/">Apache ActiveMQ Vulnerability Enables DoS Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Researchers have identified a security issue in <strong>Apache ActiveMQ</strong>, specifically related to the <strong>Apache ActiveMQ DoS vulnerability</strong>, a widely used open-source message broker that enables communication between applications.</p>



<p>The vulnerability, tracked as <strong>CVE-2025-66168</strong>, could allow attackers to disrupt the service by sending specially crafted network packets. If exploited, the <strong>Apache ActiveMQ DoS vulnerability</strong> may cause the broker to behave unexpectedly and lead to <strong>Denial-of-Service (DoS) disruptions</strong>, interrupting data flow between connected systems.</p>



<p>Organizations that rely on ActiveMQ for messaging and application integration should review their deployments in light of the <strong>Apache ActiveMQ DoS vulnerability</strong> and apply the latest security updates.</p>



<p>It is crucial for organizations to stay informed about the <strong>Apache ActiveMQ DoS vulnerability</strong> and implement necessary security measures.</p>



<h2 class="wp-block-heading">Understanding the Apache ActiveMQ DoS Vulnerability</h2>



<p>The problem was discovered by security researcher <strong>Gai Tanaka</strong> and affects the way ActiveMQ processes <strong>MQTT protocol messages</strong>.</p>



<p>MQTT is commonly used in environments such as <strong>IoT platforms and systems with limited network bandwidth</strong>. The vulnerability occurs when the broker processes incoming MQTT packets without properly verifying a specific length value inside the packet structure.</p>



<p>If an attacker sends a malformed packet containing manipulated values, the broker may incorrectly calculate the size of the message. This can lead to processing errors that disrupt the broker’s normal operation.</p>



<h2 class="wp-block-heading">How the Attack Works</h2>



<p>An attacker must first establish a valid connection with the broker before sending the malicious packet.</p>



<p>Once connected, the attacker can send specially crafted MQTT packets that confuse the message parsing logic and trigger abnormal broker behavior.</p>



<p>Important conditions for exploitation include:</p>



<ul class="wp-block-list">
<li>The attacker must authenticate with the broker</li>



<li>MQTT transport must be enabled on the server</li>



<li>Malformed packets must be delivered after connection is established</li>
</ul>



<p>Systems that <strong>do not use MQTT connectors</strong> are not affected by this specific vulnerability.</p>



<h2 class="wp-block-heading">Affected Versions</h2>



<p>The vulnerability impacts several releases of Apache ActiveMQ, including:</p>



<ul class="wp-block-list">
<li>Versions <strong>below 5.19.2</strong></li>



<li>Versions <strong>6.0.0 to 6.1.8</strong></li>



<li>Version <strong>6.2.0</strong></li>
</ul>



<p>Organizations running these versions should verify their deployments as soon as possible.</p>



<h2 class="wp-block-heading">Patches and Recommended Actions</h2>



<p>The <strong>Apache Software Foundation</strong> has released security updates that fix the packet validation issue.</p>



<p>Administrators should upgrade their systems to one of the following patched versions:</p>



<ul class="wp-block-list">
<li><strong>5.19.2</strong></li>



<li><strong>6.1.9</strong></li>



<li><strong>6.2.1</strong></li>
</ul>



<p>These updates improve packet validation and prevent the processing errors that could cause service disruption.</p>



<p>If upgrading immediately is not possible, administrators can temporarily lower the risk by <strong>turning off MQTT transport connectors</strong>, provided their applications do not require MQTT messaging.</p>



<p>Regular patching and monitoring remain essential for protecting messaging infrastructure from emerging vulnerabilities.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apache-activemq-dos-vulnerability-mqtt-packets/">Apache ActiveMQ Vulnerability Enables DoS Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/apache-activemq-dos-vulnerability-mqtt-packets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
