<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/mobile-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Wed, 04 Mar 2026 18:18:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Mobile Security &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Chrome Introduces Quantum-Safe HTTPS Protection</title>
		<link>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/</link>
					<comments>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 09:59:25 +0000</pubDate>
				<category><![CDATA[google]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#Encryption]]></category>
		<category><![CDATA[#GoogleChrome]]></category>
		<category><![CDATA[#HTTPS]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MerkleTreeCertificates]]></category>
		<category><![CDATA[#MTC]]></category>
		<category><![CDATA[#PKI]]></category>
		<category><![CDATA[#PostQuantumCryptography]]></category>
		<category><![CDATA[#QuantumComputing]]></category>
		<category><![CDATA[#QuantumSafe]]></category>
		<category><![CDATA[#TLS]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11322</guid>

					<description><![CDATA[<p>Google Chrome’s security team has announced a new plan to protect HTTPS from future quantum computer attacks. The</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/">Chrome Introduces Quantum-Safe HTTPS Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">Google Chrome’s security team has announced a new plan to protect HTTPS from future quantum computer attacks.</span> </p>



<p>The new approach uses <strong data-start="189" data-end="224">Merkle Tree Certificates (MTCs)</strong>, developed through the IETF PLANTS working group, to strengthen web security without slowing down the internet.</p>



<h2 class="wp-block-heading">Why This Is Needed</h2>



<p>Quantum computers could one day break today’s encryption methods used in HTTPS.</p>



<p>Post-quantum cryptography already exists, but it creates much larger keys. Larger keys mean:</p>



<ul class="wp-block-list">
<li>Bigger certificate sizes</li>



<li>Slower TLS handshakes</li>



<li>Higher bandwidth usage</li>



<li>Performance issues in traditional X.509 certificate chains</li>
</ul>



<p>Because of this, Chrome is not adding post-quantum X.509 certificates to its Root Store right now.</p>



<h2 class="wp-block-heading">What Are Merkle Tree Certificates (MTCs)?</h2>



<p>Instead of using large signature chains, MTCs use compact cryptographic proofs.</p>



<p>Here’s how it works:</p>



<ul class="wp-block-list">
<li>A Certification Authority (CA) signs one “Tree Head”</li>



<li>That Tree Head can represent millions of certificates</li>



<li>The browser receives only a small proof showing the certificate is included</li>
</ul>



<p>This keeps security strong while reducing data size.</p>



<h2 class="wp-block-heading">Key Benefits of MTCs</h2>



<ul class="wp-block-list">
<li>Smaller TLS handshakes</li>



<li>Better performance</li>



<li>Built-in transparency</li>



<li>Easier scaling for millions of certificates</li>



<li>Strong post-quantum protection</li>
</ul>



<h2 class="wp-block-heading">Chrome’s Rollout Plan</h2>



<p>Chrome is rolling this out in three phases.</p>



<p>Phase 1 (Now Ongoing)<br>Chrome is working with Cloudflare to test MTCs in real-world conditions. A traditional X.509 certificate is still used as a backup during testing.</p>



<p>Phase 2 (Q1 2027)<br>Trusted Certificate Transparency log operators will help launch public MTC systems.</p>



<p>Phase 3 (Q3 2027)<br>Chrome will introduce a new Quantum-Resistant Root Store (CQRS). This will support only MTC-based certificates and run alongside the current root program.</p>



<p>Websites will also have the option to enforce quantum-resistant connections only.</p>



<h2 class="wp-block-heading">What’s Next</h2>



<p>Google sees this as a major step in modernizing TLS.</p>



<p>Future plans include:</p>



<ul class="wp-block-list">
<li>Improved automated certificate management (ACME)</li>



<li>Better revocation systems to replace old CRLs</li>



<li>Stronger domain validation methods</li>



<li>Continuous external monitoring instead of yearly audits</li>
</ul>



<p>Chrome aims to build a faster, simpler, and quantum-safe web while maintaining compatibility with today’s ecosystem.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/">Chrome Introduces Quantum-Safe HTTPS Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenClaw Exploit Compromises Developer AI Agents</title>
		<link>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/</link>
					<comments>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 06:19:11 +0000</pubDate>
				<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AIAgents]]></category>
		<category><![CDATA[#AIAssistant]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#BruteForceAttack]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#DevSecOps]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunit]]></category>
		<category><![CDATA[#LocalhostExploit]]></category>
		<category><![CDATA[#OpenClaw]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#ShadowAI]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#WebSocketVulnerability]]></category>
		<category><![CDATA[#WorkstationSecurity]]></category>
		<category><![CDATA[#ZeroClickExploit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11289</guid>

					<description><![CDATA[<p>OpenClaw, a popular open-source AI assistant with over 100,000 GitHub stars, recently fixed a serious security flaw that</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/">OpenClaw Exploit Compromises Developer AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>OpenClaw, a popular<a href="https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/"> open-source AI</a> assistant with over 100,000 GitHub stars, recently fixed a serious security flaw that allowed malicious websites to silently take control of developer AI agents.</p>



<p>The vulnerability required no clicks, no extensions, and no user interaction. Simply visiting a malicious website could trigger the attack.</p>



<p>The OpenClaw team classified the issue as High severity and released a fix within 24 hours.</p>



<h3 class="wp-block-heading">How the Attack Worked</h3>



<p>When a developer visited an attacker-controlled website, malicious JavaScript executed in the browser. That script initiated a WebSocket connection directly to the local OpenClaw gateway.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Because the gateway exempted localhost connections from rate limiting, attackers could perform rapid brute-force password attempts — often hundreds per second — significantly increasing the likelihood of bypassing human-created passwords.</p>



<p>Once authentication was successful, the malicious script silently registered itself as a trusted device. This bypassed normal user confirmation prompts and granted persistent access.</p>



<p>From there, the attacker effectively controlled the AI agent and the connected environment.</p>



<h3 class="wp-block-heading">What Attackers Could Do</h3>



<p>With gateway-level access, attackers could:</p>



<ul class="wp-block-list">
<li>Send instructions to the AI agent and retrieve responses</li>



<li>Access configuration data, including AI providers and integrations</li>



<li>Enumerate connected nodes and internal IP addresses</li>



<li>Read logs for operational and reconnaissance insights</li>



<li>Search Slack or messaging history for API keys and credentials</li>



<li>Extract sensitive files from the workstation</li>



<li>Execute shell commands on connected systems</li>
</ul>



<p>In practical terms, this equated to a full workstation compromise.</p>



<p>This incident highlights a growing cybersecurity concern: shadow AI. Developer-adopted AI tools often operate outside traditional IT visibility while maintaining deep access to local systems, credentials, APIs, and internal communications.</p>



<p>Earlier this year, OpenClaw’s ecosystem also faced issues with malicious community “skills” distributed through its marketplace. However, this newly discovered vulnerability was more severe because it resided in the core gateway architecture itself — not in third-party plugins.</p>



<p>The OpenClaw team classified the issue as High severity and released a fix within 24 hours. Users and organizations must immediately upgrade to version 2026.2.25 or later to mitigate risk.</p>



<p>Beyond patching, enterprises should implement stronger governance, monitoring, and security controls for AI-powered developer tools. </p>



<p>As AI agents gain deeper system access, their compromise no longer represents just an application breach — it represents full environment exposure.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/">OpenClaw Exploit Compromises Developer AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</title>
		<link>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/</link>
					<comments>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 01 Mar 2026 18:36:42 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BCP]]></category>
		<category><![CDATA[#BusinessContinuity]]></category>
		<category><![CDATA[#CrisisManagement]]></category>
		<category><![CDATA[#CyberResilience]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#i6Security]]></category>
		<category><![CDATA[#MiddleEastConflict]]></category>
		<category><![CDATA[#OperationalResilience]]></category>
		<category><![CDATA[#SOCMonitoring]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11283</guid>

					<description><![CDATA[<p>The ongoing Middle East conflict has significantly elevated cyber risk across the region. During periods of geopolitical tension,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/">i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The ongoing Middle East conflict has significantly elevated cyber risk across the region. During periods of geopolitical tension, cyberattacks increase in frequency, coordination, and intent. Organizations across finance, energy, telecom, government, and large enterprises are facing intensified disruption attempts, including DDoS campaigns, ransomware operations, infrastructure targeting, and supply chain exploitation.</p>



<p>In such an environment, cybersecurity controls alone are not sufficient.</p>



<p>What determines resilience during conflict is the strength of Business Continuity Planning (BCP) combined with real-time cyber defense operations.</p>



<h2 class="wp-block-heading">The Shift From Security to Continuity</h2>



<p>Traditional cybersecurity focuses on detection and response. During active regional conflict, that approach must evolve into operational resilience.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Business Continuity ensures that critical operations remain functional despite sustained cyber pressure. It defines executive decision authority during crisis, structures communication channels, aligns legal and compliance obligations, and prioritizes recovery timelines based on business impact.</p>



<p>When war tensions escalate, tolerance for downtime disappears. Customers expect uninterrupted service. Regulators expect accountability. Stakeholders expect leadership clarity. Organizations without a tested continuity framework risk turning a cyber incident into a full-scale operational disruption.</p>



<h2 class="wp-block-heading">Elevated Threat Conditions Require Elevated Readiness</h2>



<p>The current regional instability demands a higher defensive posture. This includes continuous monitoring, validated backup integrity, predefined executive escalation paths, and tight coordination between security operations and leadership.</p>



<p>A mature continuity-driven model integrates:</p>



<ul class="wp-block-list">
<li>24&#215;7 Security Operations and incident management</li>



<li>Advanced threat detection and correlation</li>



<li>MITRE ATT&amp;CK–aligned investigations</li>



<li>Rapid containment and structured recovery</li>



<li>Executive-level reporting and crisis coordination</li>
</ul>



<p>Security tools are critical, but without structured continuity alignment, even strong detection capabilities can fall short under sustained attack pressure.</p>



<h2 class="wp-block-heading">Multi-Platform Security Expertise</h2>



<p>Effective resilience requires seamless operation across enterprise ecosystems. i6 brings deep experience across leading SIEM, XDR, and EDR platforms, including Microsoft Sentinel, IBM QRadar, Splunk, ArcSight, Google Chronicle, CrowdStrike Falcon, VMware Carbon Black, Microsoft Defender, and other enterprise-grade technologies.</p>



<p>Our approach reinforces existing security investments while strengthening response coordination and operational stability.</p>



<h2 class="wp-block-heading">i6 Commitment During the Current Middle East Conflict</h2>



<p>In response to the elevated cyber threat landscape created by the ongoing Middle East war tensions, i6 is extending FREE SOC monitoring and Business Continuity reinforcement support to eligible organizations operating within the region.</p>



<p>This initiative reflects our belief that during periods of regional instability, cybersecurity responsibility extends beyond commercial engagement. Operational continuity becomes a shared priority.</p>



<p>Our objective is clear: strengthen detection, accelerate response, and help organizations maintain operational stability despite heightened risk conditions.</p>



<h2 class="wp-block-heading">Continuity Defines Leadership</h2>



<p>Business Continuity is not a document prepared for audits. It is an executive discipline that determines whether an organization absorbs disruption or withstands it.</p>



<p>During the current Middle East environment, resilience is no longer optional. Organizations that remain operational during instability are not necessarily those without incidents. They are those with structured readiness and continuity-driven defense.</p>



<p><strong>At i6, we stand ready to reinforce that resilience when it matters most.</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/">i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Zoom Update Infects 1,437 in Days</title>
		<link>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/</link>
					<comments>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 17:40:22 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#CyberThreatAlert]]></category>
		<category><![CDATA[#FakeUpdate]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#SurveillanceMalware]]></category>
		<category><![CDATA[#TeramindAbuse]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[#ZoomScam]]></category>
		<category><![CDATA[#ZoomUpdateMalware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11256</guid>

					<description><![CDATA[<p>A new scam is targeting Zoom users by exploiting trust in meeting invitations. In just twelve days, 1,437</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/">Fake Zoom Update Infects 1,437 in Days</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">A new scam is targeting Zoom users by exploiting trust in meeting invitations.</span> </p>



<p>In just twelve days, 1,437 Windows users downloaded a malicious file after visiting a fake Zoom meeting page. What looked like a routine update turned into silent surveillance.</p>



<h2 class="wp-block-heading">How the Scam Works</h2>



<p>The attack begins with a fake domain designed to closely resemble Zoom’s official website.</p>



<p>When opened, the page displays a realistic Zoom waiting room. Fake participants join the meeting one by one. Background sounds and meeting chimes play to create authenticity.</p>



<p>Everything feels normal.</p>



<p>Then a “Network Issue” message appears on the screen.</p>



<p>This is intentional. The warning creates urgency and makes users believe their Zoom session requires a fix.</p>



<h2 class="wp-block-heading">The Fake Update Trap</h2>



<p>Shortly after the “network issue” appears, users see an “Update Available” pop-up.</p>



<p>A countdown timer starts. There is no option to close it.</p>



<p>Within seconds, a file downloads automatically. The page even switches to what looks like a Microsoft Store installation screen for “Zoom Workplace,” reinforcing the illusion.</p>



<p>But the downloaded file is not a Zoom update.</p>



<p>It is a modified Teramind monitoring agent — a legitimate employee surveillance tool — preconfigured to send data to attacker-controlled servers.</p>



<p>Once executed, the installer:</p>



<p>• Runs silently in the background<br>• Installs under a hidden system directory<br>• Uses legitimate Teramind binaries<br>• Avoids detection because the software itself is genuine</p>



<p>The tool operates in stealth mode, meaning no visible icons or program listings appear.</p>



<p>After installation, it begins collecting:</p>



<p>• Keystrokes<br>• Screens activity<br>• Application usage<br>• Clipboard content</p>



<p>It also includes anti-analysis techniques, behaving differently in sandbox or research environments.</p>



<p>Because it uses authentic software components, many antivirus tools fail to immediately flag it.</p>



<h2 class="wp-block-heading">Why This Attack Is Effective</h2>



<p>This campaign does not rely on sophisticated exploits.</p>



<p>It relies on timing and psychology.</p>



<p>Within 30 seconds, victims believe they are simply fixing a Zoom glitch. The interactive design even prevents automated security scanners from easily detecting the malicious behavior.</p>



<p>Instead of building new malware, attackers are misusing trusted corporate monitoring software.</p>



<p>That makes detection harder — and the deception more convincing.</p>



<h2 class="wp-block-heading">What To Do If You Suspect Infection</h2>



<p>If you visited the fake site or downloaded the file:</p>



<p>• Do not run the installer<br>• Check for unusual hidden folders in the ProgramData directory<br>• Review active background services for unknown entries<br>• Change passwords from a clean device<br>• Contact your IT or security team immediately</p>



<h2 class="wp-block-heading" id="h-indicators-of-compromise-iocs"><strong>Indicators of Compromise (IOCs)</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>Indicator Type</th><th>Value</th></tr></thead><tbody><tr><td><strong>File Hash (SHA-256)</strong></td><td>644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa</td></tr><tr><td><strong>Domain</strong></td><td>uswebzoomus[.]com</td></tr><tr><td><strong>Teramind Instance ID</strong></td><td>941afee582cc71135202939296679e229dd7cced</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/">Fake Zoom Update Infects 1,437 in Days</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</title>
		<link>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/</link>
					<comments>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 10:56:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#BankingTrojan]]></category>
		<category><![CDATA[#CryptoTheft]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#iOSSecurity]]></category>
		<category><![CDATA[#MaaS]]></category>
		<category><![CDATA[#MalwareAsAService]]></category>
		<category><![CDATA[#MobileMalware]]></category>
		<category><![CDATA[#MobileSpyware]]></category>
		<category><![CDATA[#OTPBypass]]></category>
		<category><![CDATA[#Smishing]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroDayRAT]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11229</guid>

					<description><![CDATA[<p>ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/">ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware that focuses only on spying or financial theft, this tool combines both into a single platform. It allows attackers to monitor victims in real time while also stealing money directly from banking and cryptocurrency apps.</p>



<p>Security researchers from Cyberthint found that ZeroDayRAT is being sold on Telegram as a Malware-as-a-Service (MaaS). This means even non-technical criminals can subscribe, access a web-based dashboard, and control infected devices remotely.</p>



<p>The infection usually starts with smishing messages — fake SMS alerts pretending to be service providers or app updates. Victims are tricked into installing a malicious Android APK or iOS payload. Once installed, the attacker gains full control through a browser-based control panel.</p>



<p>Through this dashboard, attackers can view device details, monitor messages, track GPS location, and even activate the microphone and camera. The malware also targets financial apps by using clipboard hijacking and fake login overlays to steal credentials. It can intercept OTP codes, allowing criminals to bypass two-factor authentication in real time.</p>



<p>ZeroDayRAT is sold in subscription tiers — $250 per day, $1000 per week, and $3500 per month — and transactions are reportedly handled through escrow services, indicating an organized criminal operation.</p>



<h2 class="wp-block-heading"><strong>What Makes ZeroDayRAT Dangerous</strong></h2>



<ul class="wp-block-list">
<li>Real-time GPS tracking and live surveillance</li>



<li>Remote camera and microphone activation</li>



<li>Screen recording and keylogging</li>



<li>Clipboard hijacking for cryptocurrency theft</li>



<li>Fake login overlays for banking and payment apps</li>



<li>OTP interception to bypass 2FA</li>



<li>Easy-to-use browser control panel</li>



<li>Sold as a subscription service on Telegram</li>
</ul>



<h2 class="wp-block-heading"><strong>Credibility Concerns</strong></h2>



<p>Security analysts say ZeroDayRAT appears to be a real threat, but some details raise questions. In one promotional screenshot, researchers noticed a browser tab labeled “Create USDT Wallet Address,” which looked staged or taken from demo material. This suggests that some features may be exaggerated for marketing.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="1024" height="570" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-5.png" alt="" class="wp-image-11230" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-200x111.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-300x167.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-400x223.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-600x334.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-768x428.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-800x445.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Crypto Wallets and Banking Apps Are Primary Targets (Source: Cyberthint)</figcaption></figure>



<p>Even so, the overall capability of the tool reflects a growing shift in cybercrime. Criminals can now rent advanced surveillance kits that were once limited to highly skilled actors. ZeroDayRAT joins other mobile-focused threats like Anatsa, Arsink, and NFCShare that target banking apps, crypto wallets, and everyday mobile behavior.</p>



<p>As mobile malware continues to evolve, users and organizations must stay cautious. Most infections still begin with simple smishing messages or fake app downloads — proving that even small actions can lead to serious compromise.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/">ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</title>
		<link>https://firsthackersnews.com/google-blocks-malicious-apps-2025/</link>
					<comments>https://firsthackersnews.com/google-blocks-malicious-apps-2025/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sat, 21 Feb 2026 06:13:24 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AIinSecurity]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AppSecurity]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalSafety]]></category>
		<category><![CDATA[#GooglePlay]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwarePrevention]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#PlayStore]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#SecurityNews]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11225</guid>

					<description><![CDATA[<p>Google says it stopped more than 1.75 million malicious or policy-violating Android apps from reaching users in 2025.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-blocks-malicious-apps-2025/">Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google says it stopped more than 1.75 million malicious or policy-violating Android apps from reaching users in 2025. Over 80,000 developer accounts were also banned to prevent repeat abuse.</p>



<p>The company credits stronger, multi-layered protections and AI-powered reviews for discouraging attackers from targeting the Play Store in the first place.</p>



<p>Every app submitted to Google Play now goes through more than 10,000 automated and human safety checks before publication, followed by continuous monitoring after it goes live. Google has also added generative AI models to help reviewers detect complex malware, fraud schemes, hidden subscriptions, and misuse of user data.</p>



<h2 class="wp-block-heading"><strong>Privacy, Reviews, and Child Safety &#8211; Google malicious apps</strong></h2>



<p>Beyond blocking malicious apps, Google strengthened privacy and trust controls across the platform.</p>



<p><strong>Key highlights from 2025:</strong></p>



<ul class="wp-block-list">
<li>1.75+ million apps rejected for malware, fraud, hidden charges, or data misuse</li>



<li>80,000+ bad developer accounts banned</li>



<li>255,000 apps restricted from accessing excessive sensitive data</li>



<li>160 million fake or abusive ratings and reviews blocked</li>



<li>Extra protections added to prevent children from accessing high-risk apps</li>
</ul>



<p>Tools like Play Policy Insights and the Data Safety section help developers fix privacy issues before submission, reducing accidental violations.</p>



<h2 class="wp-block-heading"><strong>On-Device Protection with Play Protect</strong></h2>



<p>Security doesn’t stop at the Play Store. Google Play Protect now scans over 350 billion apps daily, including sideloaded apps installed outside the store.</p>



<p><strong>In 2025:</strong></p>



<ul class="wp-block-list">
<li>27 million new malicious sideloaded apps detected</li>



<li>Expanded fraud protection to 185 markets (2.8+ billion devices)</li>



<li>266 million risky installation attempts blocked</li>



<li>872,000 high-risk scam apps stopped</li>



<li>New in-call scam protection prevents users from disabling Play Protect during social-engineering attacks</li>
</ul>



<h2 class="wp-block-heading"><strong>How Google Strengthened Play Store Security in 2025</strong></h2>



<p>Developers made over 20 billion daily integrity checks using the Play Integrity API to protect apps from abuse and spoofing. Hardware-backed security signals and improved account verification are also being expanded, including limited distribution accounts for students and hobbyists.</p>



<p>Looking ahead, Google plans deeper AI integration, stricter verification, and new Android 16 protections such as built-in defenses against tapjacking.</p>



<p>Together, these measures show Google’s broader strategy: block malicious apps at scale, reduce fraud and privacy abuse, and strengthen trust across the Android ecosystem.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-blocks-malicious-apps-2025/">Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/google-blocks-malicious-apps-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PromptSpy: Android Malware Uses Google Gemini AI</title>
		<link>https://firsthackersnews.com/promptspy/</link>
					<comments>https://firsthackersnews.com/promptspy/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 05:54:19 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AccessibilityAbuse]]></category>
		<category><![CDATA[#AISecurity]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AppSecurity]]></category>
		<category><![CDATA[#BankingTrojan]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DigitalForensics]]></category>
		<category><![CDATA[#EmergingThreats]]></category>
		<category><![CDATA[#GeminiAI]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#MobileThreats]]></category>
		<category><![CDATA[#PhishingCampaign]]></category>
		<category><![CDATA[#PlayProtect]]></category>
		<category><![CDATA[#PromptSpy]]></category>
		<category><![CDATA[#RAT]]></category>
		<category><![CDATA[#RemoteAccessTrojan]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VNC]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11210</guid>

					<description><![CDATA[<p>PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time decisions</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptspy/">PromptSpy: Android Malware Uses Google Gemini AI</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time decisions on infected devices.</p>



<p>Instead of using fixed screen coordinates or simple automation rules, PromptSpy sends Gemini a natural-language request along with an XML snapshot of the current screen. This snapshot includes details about visible elements such as text, type, and screen position.</p>



<p>Gemini analyzes the screen content and responds with JSON instructions telling the malware what action to perform — such as tap, long-press, or swipe — and exactly where to do it.</p>



<p>The main goal is persistence. PromptSpy uses this AI-driven method to keep its malicious app pinned in the Recent Apps list, even when the user tries to close it.</p>



<p>The malware runs in a loop. It executes Gemini’s instructions using Android’s Accessibility Service, captures the updated screen, and sends it back to Gemini. This continues until the AI confirms the app is successfully pinned. Because it relies on AI analysis instead of hardcoded rules, it works across different devices, Android versions, and manufacturer customizations.</p>



<p>Security researchers at ESET describe PromptSpy as the first known Android malware to directly integrate generative AI into its execution flow. The focus is stealthy persistence and maintaining control over the device.</p>



<h3 class="wp-block-heading">Android AI Malware Capabilities</h3>



<p>Beyond AI-based persistence, PromptSpy also acts as a powerful remote access tool.</p>



<p>It includes a built-in VNC component that allows attackers to control the infected phone in real time. Once the victim grants Accessibility permissions, attackers can:</p>



<ul class="wp-block-list">
<li>View the device screen live</li>



<li>Simulate taps and gestures</li>



<li>Perform actions as if physically holding the phone</li>
</ul>



<figure class="wp-block-image size-full"><img decoding="async" width="1024" height="768" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-3.png" alt="" class="wp-image-11211" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-200x150.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-300x225.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-400x300.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-600x450.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-768x576.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-800x600.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Android/Phishing.Agent.M UI showing the same fake site as the PromptSpy dropper (Source: ESET).</figcaption></figure>



<p>The malware can capture lockscreen credentials, gather device information, take screenshots, record screen activity as video, and monitor which app is currently in use.</p>



<p>It communicates with a hardcoded command-and-control server using the VNC protocol, protected by AES encryption. The server can also send a Gemini API key and additional task instructions to the malware.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="968" height="1024" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-968x1024.png" alt="" class="wp-image-11212" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-200x212.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-284x300.png 284w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-400x423.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-600x635.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-768x813.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-800x846.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-968x1024.png 968w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-1200x1270.png 1200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-1452x1536.png 1452w" sizes="(max-width: 968px) 100vw, 968px" /><figcaption class="wp-element-caption">Malware screen prompting installation of the PromptSpy payload (Source: ESET).<br></figcaption></figure>



<p>PromptSpy also actively blocks removal attempts. It abuses Accessibility permissions to place invisible overlays on important system buttons, including those used to uninstall the app or disable its privileges.</p>



<p>These transparent overlays intercept user taps on “Uninstall” or “Stop,” preventing normal removal.</p>



<p>Technical analysis shows that PromptSpy is delivered through a dropper app. The malicious payload (app-release.apk) is embedded inside the dropper’s assets directory.</p>



<h2 class="wp-block-heading"><strong>Campaign Spread and Target Regions</strong></h2>



<p>ESET connects PromptSpy to a multi-stage, financially driven campaign mainly targeting users in Argentina.</p>



<p>An earlier variant, VNCSpy, was uploaded from Hong Kong in January 2026. More advanced PromptSpy samples appeared from Argentina in February 2026.</p>



<p>The malware spread through domains such as mgardownload[.]com and m-mgarg[.]com, which imitated JPMorgan Chase branding under the name “MorganArg” using Spanish banking lures.</p>



<p>Analysis of the same infrastructure revealed another Android phishing trojan signed with the same certificate and using the same fake banking site, likely acting as the initial infection stage before deploying PromptSpy.</p>



<p>Although PromptSpy has not appeared widely in ESET telemetry and may still be in limited testing, the active domains confirm some real-world use.</p>



<p>Code findings, including simplified Chinese debug strings and references to Chinese Accessibility events, suggest development in a Chinese-speaking environment, even though current targets are in Latin America.</p>



<p>PromptSpy is not available on Google Play, and Google Play Protect now detects known variants.</p>



<p>This campaign follows ESET’s 2025 discovery of PromptLock, an AI-powered ransomware prototype, highlighting the growing use of generative AI in malware operations.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th><strong>SHA-1</strong></th><th><strong>Filename</strong></th><th><strong>Detection</strong></th><th><strong>Description</strong></th></tr></thead><tbody><tr><td>6BBC9AB132BA066F63676E05DA13D108598BC29B</td><td>net.ustexas.myavlive.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>375D7423E63C8F5F2CC814E8CFE697BA25168AFA</td><td>nlll4.un7o6.q38l5.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>3978AC5CD14E357320E127D6C87F10CB70A1DCC2</td><td>ppyzz.dpk0p.ln441.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>E60D12017D2DA579DF87368F5596A0244621AE86</td><td>mgappc-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>9B1723284E311794987997CB7E8814EB6014713F</td><td>mgappm-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>076801BD9C6EB78FC0331A4C7A22C73199CC3824</td><td>mgappn-0.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>8364730E9BB2CF3A4B016DE1B34F38341C0EE2FA</td><td>mgappn-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>F8F4C5BC498BCCE907DC975DD88BE8D594629909</td><td>app-release.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy.</td></tr><tr><td>C14E9B062ED28115EDE096788F62B47A6ED841AC</td><td>mgapp.apk</td><td>Android/Phishing.Agent.M</td><td>Android phishing malware.</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptspy/">PromptSpy: Android Malware Uses Google Gemini AI</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/promptspy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Notepad++ Flaw Allows Code Execution, CISA Issues Alert</title>
		<link>https://firsthackersnews.com/notepad-plus-plus-code-execution-flaw/</link>
					<comments>https://firsthackersnews.com/notepad-plus-plus-code-execution-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 09:23:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CISAAlert]]></category>
		<category><![CDATA[#CodeExecution]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#ExploitRisk]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#NotepadPlusPlus]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#SoftwareSecurity]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11164</guid>

					<description><![CDATA[<p>CISA has raised concerns about a serious security issue affecting Notepad++, one of the most widely used text</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/notepad-plus-plus-code-execution-flaw/">Critical Notepad++ Flaw Allows Code Execution, CISA Issues Alert</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">CISA has raised concerns about a serious security issue affecting Notepad++, one of the most widely used text editors.</span> </p>



<p><span style="font-size: revert; color: initial;">The vulnerability, identified as CVE-2025-15556, impacts the application’s WinGUp updater component. The problem lies in how the software handles updates — it downloads files without properly verifying their authenticity.</span> </p>



<h3 class="wp-block-heading">How the Attack Could Happen</h3>



<p><span style="background-color: rgba(0, 0, 0, 0.2); font-size: revert; color: initial;">If an attacker manages to intercept the connection between the application and its update server, they could redirect the request to a malicious server. Instead of installing a legitimate update, the system could unknowingly download and execute a tampered installer.</span></p>



<p><span style="font-size: revert; color: initial;">This type of scenario is commonly known as a man-in-the-middle attack.</span> <span style="font-size: revert; color: initial;">If exploited successfully, the attacker could run code on the victim’s system with the same permissions as the logged-in user. That could lead to malware installation, data theft, backdoor creation, or long-term system compromise.</span></p>



<p>CISA has added this issue to its Known Exploited Vulnerabilities (KEV) catalog, signaling heightened risk. Although there is no confirmed link to ransomware campaigns at this time, the inclusion suggests that the flaw is being taken seriously.</p>



<p>Because Notepad++ is widely used by developers, IT teams, and enterprises, the potential impact is broad.Users are strongly advised to apply official updates as soon as they become available. </p>



<p>Organizations should prioritize patch deployment across all systems where Notepad++ is installed and monitor update traffic for unusual behavior.When the update mechanism itself becomes vulnerable, even routine software maintenance can turn into a security risk.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/notepad-plus-plus-code-execution-flaw/">Critical Notepad++ Flaw Allows Code Execution, CISA Issues Alert</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/notepad-plus-plus-code-execution-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Pay Users Hit by Phishing Scam Designed to Harvest Payment Data</title>
		<link>https://firsthackersnews.com/apple-pay-phishing-scam-account-takeover/</link>
					<comments>https://firsthackersnews.com/apple-pay-phishing-scam-account-takeover/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 08 Feb 2026 11:02:02 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Web application security]]></category>
		<category><![CDATA[#AccountSecurity]]></category>
		<category><![CDATA[#AppleID]]></category>
		<category><![CDATA[#ApplePay]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DigitalSafety]]></category>
		<category><![CDATA[#FraudPrevention]]></category>
		<category><![CDATA[#IdentityTheft]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#OnlineFraud]]></category>
		<category><![CDATA[#PaymentFraud]]></category>
		<category><![CDATA[#PhishingScam]]></category>
		<category><![CDATA[#ScamAlert]]></category>
		<category><![CDATA[#SecurityTips]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#StaySafeOnline]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#Vishing]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11121</guid>

					<description><![CDATA[<p>A new and well-planned phishing campaign is targeting users of Apple’s payment ecosystem. The attackers are not using</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apple-pay-phishing-scam-account-takeover/">Apple Pay Users Hit by Phishing Scam Designed to Harvest Payment Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">A new and well-planned phishing campaign is targeting users of Apple’s payment ecosystem. The attackers are not using the usual low-quality scam emails. Instead, they combine professional email design with phone-based fraud to trick victims into giving away access to their accounts.</span> </p>



<p>This method is more dangerous because it uses real security features, like two-factor authentication, against the victim.</p>



<h3 class="wp-block-heading"><strong>How the Phishing Email Looks Legitimate</strong></h3>



<p>The attack starts with an email that looks like it was sent by Apple. The message includes official logos, proper formatting, and a clean, professional layout. There are no obvious spelling mistakes or broken designs, which makes it harder to identify as fake.</p>



<p>The subject line is written to create fear and urgency. It usually mentions a costly purchase, such as a MacBook, expensive device, or large gift card transaction. The email claims the transaction has been blocked for security reasons.</p>



<p>Instead of providing a suspicious link, the message tells the user they must verify their identity to prevent account suspension.</p>



<h3 class="wp-block-heading"><strong>The Phone Number Trick (Vishing Stage)</strong></h3>



<p>A key difference in this campaign is that victims are told to call a “Billing &amp; Fraud Prevention” phone number. Some emails even claim that a fraud review “appointment” has already been scheduled.</p>



<p>This step is designed to build trust. Many people feel safer calling a number than clicking a link, which is exactly what the attackers want.</p>



<p>When the victim calls, they are connected to a scammer pretending to be an Apple support agent.</p>



<p>The fake support agent follows a prepared script. They speak calmly and professionally. They may confirm basic details like the victim’s name, email, or device type to sound convincing.</p>



<p>The goal here is psychological — the attacker wants the victim to believe they are dealing with a real security team trying to stop fraud.</p>



<h3 class="wp-block-heading"><strong>How the Account Takeover Happens</strong></h3>



<p>Once trust is built, the technical part of the attack begins. The scammer attempts to sign in to the victim’s Apple ID on their own device. This triggers a real two-factor authentication (2FA) code sent to the victim’s phone.</p>



<p>The scammer then asks the victim to read the code aloud. They claim it is required to “verify the account,” “cancel the transaction,” or “stop the fraud.” Research highlighted by <strong>Malwarebytes</strong> shows this tactic is becoming more common.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>If the victim shares the code, they unknowingly give the attacker full access to their account.</p>



<p>With control of the account, scammers can misuse stored payment methods, access digital wallet data, or even lock users out of their own devices. Because the login process used real security steps, victims may not realize they helped the attacker themselves.</p>



<h3 class="wp-block-heading"><strong>Key Warning Signs</strong></h3>



<ul class="wp-block-list">
<li>Emails creating urgency about expensive purchases you did not make</li>



<li>Messages asking you to call a number instead of using official channels</li>



<li>Anyone asking for your password or verification code</li>
</ul>



<h3 class="wp-block-heading"><strong>How to Stay Safe</strong></h3>



<p>Always verify alerts directly through official apps or websites, not through numbers or links in emails. Never share one-time verification codes with anyone — legitimate support teams will never ask for them.</p>



<p>If you believe you were targeted, immediately change your password, sign out of other sessions, and contact your bank about suspicious activity.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/apple-pay-phishing-scam-account-takeover/">Apple Pay Users Hit by Phishing Scam Designed to Harvest Payment Data</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/apple-pay-phishing-scam-account-takeover/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches</title>
		<link>https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/</link>
					<comments>https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 06 Feb 2026 09:05:56 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[BIG-IP Advanced WAF]]></category>
		<category><![CDATA[F5 BIG-IP]]></category>
		<category><![CDATA[NGINX products]]></category>
		<category><![CDATA[NGINX Prompt]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11113</guid>

					<description><![CDATA[<p>F5 has released its latest security update, fixing several vulnerabilities across its products. Although F5 lists some of</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/">Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>F5 has released its latest security update, fixing several vulnerabilities across its products. Although F5 lists some of these issues as “medium” under its internal scale, the newer CVSS v4.0 system rates the main ones at <strong>8.2</strong>, which is considered <strong>high risk</strong> for enterprise environments.</p>



<p>The update mainly affects <strong>BIG-IP Advanced WAF</strong>, <strong>NGINX products</strong>, and <strong>BIG-IP Container Ingress Services</strong>. Since these systems often handle incoming application traffic, leaving them unpatched could expose organizations to serious attacks.</p>



<h2 class="wp-block-heading"><strong>All about the vulnerability</strong></h2>



<p><strong>BIG-IP Advanced WAF &amp; ASM (CVE-2026-22548)</strong><br>This flaw affects the Web Application Firewall and Application Security Manager modules on BIG-IP devices. Attackers could potentially bypass security protections or disrupt services. It impacts versions <strong>17.1.0 to 17.1.2</strong>, and the fix is included in <strong>17.1.3</strong>.</p>



<p><strong>NGINX Vulnerability (CVE-2026-1642)</strong><br>A major issue was found across the NGINX ecosystem, including NGINX Plus, Open Source, and the Ingress Controller. Because NGINX often runs at the edge of networks as a reverse proxy or load balancer, vulnerable systems could become easy targets. This issue also carries a <strong>high severity score</strong>.</p>



<p><strong>BIG-IP Container Ingress Services (CVE-2026-22549)</strong><br>For organizations using Kubernetes or OpenShift, a vulnerability affects Container Ingress Services versions <strong>2.0.0 through 2.20.1</strong>. A patched version is available in <strong>2.20.2</strong>.</p>



<h2 class="wp-block-heading"><strong>Affected Components</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>CVE</th><th>Product</th><th>Severity</th><th>Affected Versions</th></tr></thead><tbody><tr><td>CVE-2026-22548</td><td>BIG-IP Advanced WAF / ASM</td><td>High</td><td>17.1.0 – 17.1.2</td></tr><tr><td>CVE-2026-1642</td><td>NGINX (Plus, Open Source, Ingress)</td><td>High</td><td>Multiple versions</td></tr><tr><td>CVE-2026-22549</td><td>BIG-IP Container Ingress</td><td>Medium</td><td>2.0.0 – 2.20.1</td></tr></tbody></table></figure>



<p>F5 also warned about a configuration risk related to SMTP settings in BIG-IP systems. This isn’t a software bug but could allow misuse if not properly secured. Administrators should review and harden their configurations.</p>



<h2 class="wp-block-heading">What Organizations Should Do</h2>



<ul class="wp-block-list">
<li>Identify all BIG-IP and NGINX systems in use</li>



<li>Check installed versions against the affected list</li>



<li>Apply updates as soon as possible</li>



<li>Review and secure SMTP configurations on BIG-IP devices</li>
</ul>



<p>Because these products sit at key network entry points, patching them quickly is critical to reducing exposure.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/">Critical Flaws in F5 BIG-IP and NGINX Prompt Urgent Security Patches</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/f5-bigip-nginx-critical-vulnerabilities-security-fixes/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
