<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/mobile-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Sun, 03 May 2026 20:54:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Mobile Security &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Facebook Phishing Campaign Targets Business Accounts</title>
		<link>https://firsthackersnews.com/facebook-phishing-campaign/</link>
					<comments>https://firsthackersnews.com/facebook-phishing-campaign/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 03 May 2026 20:54:12 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#AppSheet]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#FacebookPhishing]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#Netlify]]></category>
		<category><![CDATA[#OnlineSafety]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#Telegram]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11680</guid>

					<description><![CDATA[<p>Researchers at Guardio Labs have uncovered a large and highly organized phishing operation known as AccountDumpling, which has</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/facebook-phishing-campaign/">Facebook Phishing Campaign Targets Business Accounts</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Researchers at Guardio Labs have uncovered a large and highly organized phishing operation known as <strong>AccountDumpling</strong>, which has already compromised more than 30,000 Facebook accounts worldwide. What makes this campaign stand out is not just its scale, but the way it abuses legitimate platforms to make phishing emails appear completely authentic.</p>



<p>Instead of relying on fake domains or compromised mail servers, attackers use Google AppSheet to send emails through Google’s own infrastructure. These messages are generated as part of automated workflows, meaning they pass authentication checks like SPF, DKIM, and DMARC without raising suspicion. </p>



<p>As a result, security tools and spam filters see them as trusted communications, allowing phishing messages to land directly in inboxes of targeted users—often business account owners managing Facebook pages.</p>



<h2 class="wp-block-heading">Multi-Layered Attack Strategy</h2>



<p>The campaign is not a single phishing page but a structured, multi-stage system designed to increase success rates. Victims are first directed to pages hosted on Netlify, where attackers replicate the Facebook Help Center with high accuracy. These pages are customized per victim using unique subdomains, making them difficult to block using traditional security measures.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="1024" height="766" src="https://firsthackersnews.com/wp-content/uploads/2026/05/image.png" alt="" class="wp-image-11681" srcset="https://firsthackersnews.com/wp-content/uploads/2026/05/image-300x224.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-768x575.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/05/image.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Email phishing (Source: Guard Labs)</figcaption></figure>



<p>From there, users are guided through a series of steps that collect not only login credentials but also deeper identity information such as date of birth and even government-issued ID images. In some cases, the attackers shift tactics by offering fake incentives, like verification badges, hosted on platforms such as Vercel. These pages are designed to look dynamic and legitimate, while quietly bypassing detection systems using techniques like hidden Unicode characters.</p>



<p>The operation becomes more advanced in later stages. Attackers host phishing documents on Google Drive, presenting them as official Meta notifications. These documents, often designed using Canva, contain embedded links that redirect victims into interactive phishing environments. These environments are powered by real-time communication frameworks, allowing attackers to actively engage with victims during the login process.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="1024" height="809" src="https://firsthackersnews.com/wp-content/uploads/2026/05/image-1.png" alt="" class="wp-image-11682" srcset="https://firsthackersnews.com/wp-content/uploads/2026/05/image-1-300x237.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-1-768x607.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/05/image-1.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Account Dumpling (Source: Guard Labs)</figcaption></figure>



<p>This live interaction is a critical aspect of the campaign. Instead of passively collecting credentials, attackers can request one-time passwords, monitor user actions, and even capture browser sessions as they happen. This significantly increases the likelihood of successful account takeover, even when multi-factor authentication is enabled.</p>



<h2 class="wp-block-heading">Real-Time Data Exfiltration and Attribution</h2>



<p>Once credentials are captured, they are immediately transmitted through a centralized system built around Telegram bots. This allows operators to monitor incoming data in real time and quickly take control of compromised accounts before victims notice suspicious activity.</p>



<p>Analysis of the infrastructure shows a strong operational scale, with thousands of records flowing into attacker-controlled channels. Most victims are concentrated in regions like the United States and Europe, indicating a focus on high-value targets such as businesses and influencers.</p>



<p>Investigators were also able to trace elements of the campaign back to Vietnamese actors. This attribution is supported by metadata found in phishing documents and developer comments embedded within the malicious code, providing insight into the origin of the operation.</p>



<h2 class="wp-block-heading">A Shift Toward Industrialized Phishing</h2>



<p>AccountDumpling reflects a broader shift in cybercrime, where phishing is no longer a simple tactic but part of a larger, industrialized ecosystem. Attackers are combining trusted services, automation, and real-time interaction to create highly effective campaigns that are difficult to detect and disrupt.</p>



<p>Compromised accounts are rarely the end goal. They are often reused for further scams, advertising fraud, or additional phishing attacks, creating a cycle that sustains and expands the operation. This approach shows how modern threat actors are leveraging legitimate platforms at scale, turning them into tools for widespread abuse while staying under the radar.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/facebook-phishing-campaign/">Facebook Phishing Campaign Targets Business Accounts</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/facebook-phishing-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>EtherRAT Attack Targets Enterprise Admins</title>
		<link>https://firsthackersnews.com/etherrat-attack/</link>
					<comments>https://firsthackersnews.com/etherrat-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 01 May 2026 18:28:07 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BlueTeam]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EtherRAT]]></category>
		<category><![CDATA[#GitHubAbuse]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#RAT]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SEOpoisoning]]></category>
		<category><![CDATA[#SOC]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11676</guid>

					<description><![CDATA[<p>A newly identified campaign called EtherRAT is targeting enterprise environments by combining SEO manipulation, GitHub abuse, and blockchain-based</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/etherrat-attack/">EtherRAT Attack Targets Enterprise Admins</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified campaign called <strong>EtherRAT</strong> is targeting enterprise environments by combining SEO manipulation, GitHub abuse, and blockchain-based infrastructure. Instead of going after random users, attackers are focusing on IT professionals who already have elevated access.</p>



<p>This activity was uncovered by the Atos Threat Research Center in early 2026. The goal is clear—compromise high-privilege users and gain direct access to critical systems.</p>



<h2 class="wp-block-heading"><strong>How the Attack Starts</strong></h2>



<p>The attack begins with SEO poisoning across search engines like Bing, Yahoo, DuckDuckGo, and Yandex.</p>



<p>Attackers push fake GitHub repositories to the top of search results for queries related to popular admin tools. These repositories look legitimate and contain detailed documentation, but they don’t host malware directly.</p>



<p>The infection flow works like this:</p>



<ul class="wp-block-list">
<li>Fake GitHub repo acts as a trusted storefront</li>



<li>README links redirect users to another repository</li>



<li>Second repo hosts a malicious MSI installer</li>



<li>Payload is executed on the victim system</li>
</ul>



<p>This two-step setup helps attackers stay active even if one repository is removed.</p>



<h2 class="wp-block-heading"><strong>Targeting High-Privilege Users</strong></h2>



<p>The campaign specifically mimics well-known administrative tools such as PsExec, AzCopy, Sysmon, LAPS, and WinDbg. These tools are typically used by administrators, DevOps teams, and security analysts.</p>



<p>This approach acts as a filtering mechanism:</p>



<ul class="wp-block-list">
<li>Only users searching for these tools are targeted</li>



<li>Most victims already have elevated privileges</li>



<li>A successful infection gives immediate high-level access</li>
</ul>



<p>By abusing trust in commonly used tools, attackers increase the chances of execution without suspicion.</p>



<h2 class="wp-block-heading"><strong>Malware Behavior and Execution</strong></h2>



<p>Once the malicious installer runs, a multi-stage RAT is deployed using JavaScript and fileless techniques.</p>



<p>The behavior includes:</p>



<ul class="wp-block-list">
<li>Obfuscated scripts install Node.js and trigger execution</li>



<li>Payloads are decrypted in memory using AES-256</li>



<li>Persistence is created through Windows Registry Run keys</li>



<li>Malware runs under legitimate processes like conhost.exe</li>



<li>Continuous communication with attacker infrastructure</li>
</ul>



<p>The RAT allows attackers to execute commands, monitor systems, and extract sensitive data without obvious signs.</p>



<h2 class="wp-block-heading"><strong>Blockchain-Based Command and Control</strong></h2>



<p>One of the most unique aspects of EtherRAT is its use of blockchain for command-and-control.</p>



<p>Instead of fixed servers, the malware retrieves its C2 address from the Ethereum network. This makes it extremely difficult to block or disrupt.</p>



<p>Key advantages for attackers:</p>



<ul class="wp-block-list">
<li>No fixed IP or domain to blacklist</li>



<li>C2 can be updated instantly via blockchain transactions</li>
</ul>



<p>Because public blockchain infrastructure is widely accessible, traditional takedown strategies become ineffective.</p>



<h2 class="wp-block-heading"><strong>Ongoing Activity and Threat Impact</strong></h2>



<p>Researchers observed at least 40+ malicious GitHub repositories over several months, showing this is not a one-time campaign but an ongoing operation.</p>



<p>There are also similarities with techniques used by groups like Lazarus Group and MuddyWater, though attribution is still being analyzed.</p>



<p>Unlike typical large-scale malware campaigns, EtherRAT focuses on stealth and persistence. After initial access, attackers perform quiet reconnaissance instead of immediate disruptive actions.</p>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>This campaign highlights a shift in cyber threats:</p>



<ul class="wp-block-list">
<li>Attackers target fewer users but with higher value</li>



<li>Legitimate platforms like GitHub are used to build trust</li>



<li>Decentralized technologies like blockchain increase resilience</li>
</ul>



<p>Organizations should verify software sources, limit administrative privileges, and monitor unusual outbound traffic—especially connections to blockchain services.</p>



<p>EtherRAT shows how modern attackers are blending trusted platforms with advanced techniques to create highly targeted and durable threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/etherrat-attack/">EtherRAT Attack Targets Enterprise Admins</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/etherrat-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WhatsApp Tests Safer Cloud Backup for Messages</title>
		<link>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/</link>
					<comments>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 19:17:49 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CloudBackup]]></category>
		<category><![CDATA[#CloudStorage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#EncryptedBackup]]></category>
		<category><![CDATA[#EndToEndEncryption]]></category>
		<category><![CDATA[#MessagingSecurity]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#WhatsApp]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11658</guid>

					<description><![CDATA[<p>WhatsApp is developing a new cloud backup system that shifts away from relying entirely on third-party services like</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/">WhatsApp Tests Safer Cloud Backup for Messages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>WhatsApp is developing a new cloud backup system that shifts away from relying entirely on third-party services like Google Drive and iCloud. The idea is to bring backup storage under its own control, giving users a more secure and dedicated space for their chats, media, and files.</p>



<p>With this approach, users will no longer have to depend on shared cloud storage limits. Instead, WhatsApp aims to provide its own storage environment specifically built for messaging data. This is especially important as chat backups today include large files like high-resolution images, videos, and voice notes, which quickly consume available space.</p>



<p>All data stored in this system will be protected with end-to-end encryption by default. This means that messages remain private, and even WhatsApp itself cannot access the content. By keeping backups encrypted at all times, the platform is aiming to reduce the risk of unauthorized access or data exposure.</p>



<h2 class="wp-block-heading">Enhanced Security with Passkeys</h2>



<p>To strengthen protection further, WhatsApp is planning to introduce passkey-based authentication for backup access. Instead of using traditional passwords or long encryption keys, users will be able to unlock their backups using biometric methods such as fingerprint or facial recognition.</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" width="1024" height="754" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-1024x754.png" alt="" class="wp-image-11659" style="aspect-ratio:1.3581289218482602;width:798px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-300x221.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-768x566.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-1024x754.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">WhatsApp Backup Storage Limits Overview (Source: WABetaInfo)</figcaption></figure>



<p>This makes the process both simpler and more secure. The authentication is tied directly to the user’s device, which reduces the risk of attacks like phishing, credential theft, or brute-force attempts. The passkey is securely stored and can sync across trusted devices, allowing users to restore backups without needing to remember complex credentials.</p>



<p>At the same time, WhatsApp is expected to keep alternative options available. Users who prefer using passwords or encryption keys will still have that choice, ensuring flexibility for different security preferences.</p>



<h2 class="wp-block-heading">Storage Options and Rollout Plans</h2>



<p>The upcoming system is also expected to introduce dedicated storage plans for backups. Early expectations suggest a small free storage tier for basic use, along with larger paid options for users who need more capacity. This would allow users to manage their backup storage without affecting their personal cloud accounts.</p>



<p>Despite this shift, WhatsApp is likely to continue supporting third-party backups for users who prefer their current setup. This ensures a smoother transition without forcing immediate changes.</p>



<p>The feature is still in development and has not yet been released publicly. It is expected to go through multiple testing phases to ensure stability, security, and compatibility with existing systems before a wider rollout begins.</p>



<p>This move reflects a broader industry trend toward building self-contained ecosystems that prioritize privacy, security, and better control over user data, rather than relying entirely on external platforms.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/">WhatsApp Tests Safer Cloud Backup for Messages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Multi Stage Malware Attack Uses Obfuscation to Evade Detection</title>
		<link>https://firsthackersnews.com/multi-stage-malware-attack/</link>
					<comments>https://firsthackersnews.com/multi-stage-malware-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 15:30:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11647</guid>

					<description><![CDATA[<p>Security researchers have identified a new malware campaign that uses advanced hiding techniques and multi-stage payloads to avoid</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/multi-stage-malware-attack/">Multi Stage Malware Attack Uses Obfuscation to Evade Detection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a new malware campaign that uses advanced hiding techniques and multi-stage payloads to avoid detection. Instead of launching a direct attack, the malware spreads in stages, making it harder for traditional security tools to detect and block it. This approach is characterized as a multi stage malware attack.</p>



<p>The attack starts with a targeted phishing email sent to specific organizations, particularly government-related entities. The email is designed to look legitimate, pretending to come from an internal consultant and referencing a real-looking project to gain trust.</p>



<p>To make the message more convincing, it is marked as urgent and includes a request for a read receipt. This increases the chances that the recipient will open the attachments without suspicion.</p>



<p>This multi stage malware attack poses serious threats to organizations, as its multi-layered nature complicates detection and remediation efforts.</p>



<p>The email contains two files with slightly misspelled names to appear like quick internal documents:</p>



<ul class="wp-block-list">
<li>A Word file pretending to be a report</li>



<li>A PDF file that looks like an official document</li>
</ul>



<p>These small tricks are used to make the attack look normal and believable.</p>



<h2 class="wp-block-heading">How the Multi-Stage Attack Works</h2>



<p>The infection process is carefully designed and happens in multiple steps. This layered approach helps the malware stay hidden during each stage.</p>



<p>When the Word file is opened, it asks the user to enable macros. If the user allows it, hidden code runs in the background and downloads a malicious file from an external server. This technique helps bypass basic security checks.</p>



<p>At the same time, the PDF file acts as another attack path. It shows a fake error message asking the user to update their PDF reader. If the user clicks the prompt, it downloads another malicious file disguised as a legitimate application.</p>



<p>Once installed, the malware:</p>



<ul class="wp-block-list">
<li>Connects to remote servers using trusted services</li>



<li>Uses tools like developer tunnels to maintain access</li>



<li>Sends stolen data through platforms like Discord</li>



<li>Executes commands on the infected system</li>
</ul>



<p>By using legitimate platforms, the malware blends in with normal network traffic, making it difficult to detect.</p>



<h2 class="wp-block-heading">Evasion Techniques and Why It’s Dangerous</h2>



<p>This malware uses several techniques to avoid being detected by security systems. It checks for analysis environments, hides its code, and uses trusted services to carry out its activities.</p>



<p>Some of its key evasion methods include:</p>



<ul class="wp-block-list">
<li>Hiding malicious code inside compiled scripts</li>



<li>Using trusted cloud services for communication</li>



<li>Disguising files with familiar names and branding</li>



<li>Delivering payloads in stages instead of all at once</li>
</ul>



<p>Because of these methods, the malware can remain active for a long time without being noticed. It can steal data, monitor systems, and give attackers remote access.</p>



<p>This attack shows a growing trend where cybercriminals rely on trusted platforms and multi-step infections to bypass traditional defenses. Organizations should focus on monitoring behavior, restricting macros, and educating users to recognize suspicious emails.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/multi-stage-malware-attack/">Multi Stage Malware Attack Uses Obfuscation to Evade Detection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/multi-stage-malware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Messaging Apps Used to Deliver ProSpy Spyware</title>
		<link>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/</link>
					<comments>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 09:35:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11582</guid>

					<description><![CDATA[<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as <strong>ProSpy</strong>, aimed primarily at journalists, activists, and political figures.</p>



<h2 class="wp-block-heading"><strong>Social Engineering and Delivery Tactics</strong></h2>



<p>The attack typically begins with direct contact. Victims are approached through platforms like LinkedIn, email, or messaging apps by accounts posing as journalists, support staff, or known contacts. These interactions are carefully crafted to build trust before introducing a malicious link.</p>



<p>The link is usually presented as something urgent or relevant, such as a video call request, shared document, or account alert. Once clicked, victims are redirected either to fake login pages or download portals.</p>



<p>Common tactics used:</p>



<ul class="wp-block-list">
<li>Impersonation of trusted individuals or organizations</li>



<li>Spearphishing messages tailored to the target</li>



<li>Fake login pages mimicking services like email or cloud platforms</li>



<li>Malicious download links disguised as secure communication tools</li>
</ul>



<p>This approach relies heavily on human trust rather than technical exploitation, making it highly effective even against cautious users.</p>



<h2 class="wp-block-heading"><strong>Fake Apps and Spyware Capabilities</strong></h2>



<p>The core of the campaign is the use of fake Android applications that appear to be secure messaging tools. These apps are distributed through convincing websites that mimic official sources and offer “enhanced” or “pro” versions of popular platforms.</p>



<p>Once installed, the spyware operates silently in the background, collecting and transmitting sensitive data to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="472" height="325" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png" alt="" class="wp-image-11583" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2-300x207.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png 472w" sizes="auto, (max-width: 472px) 100vw, 472px" /><figcaption class="wp-element-caption">ProSpy searches for backup files from third-party applications and exfiltrates them (Source: Lookout).<br></figcaption></figure>



<p>Key capabilities include:</p>



<ul class="wp-block-list">
<li>Access to contacts, messages, and call-related data</li>



<li>Collection of device information and stored files</li>



<li>Extraction of documents, media, and backup data</li>



<li>Continuous communication with remote command servers</li>
</ul>



<p>The malware is designed to blend in as a legitimate app, making detection difficult for users who install it outside official app stores.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>Broader Implications</strong></h2>



<p>This campaign highlights a growing trend where attackers combine social engineering with mobile spyware to conduct surveillance operations. The targeting of civil society groups suggests a shift toward more personalized and contract-driven espionage activities.</p>



<p>It also reinforces a critical point: even advanced threats often rely on simple entry points — convincing a user to trust and install something that appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chrome Introduces Quantum-Safe HTTPS Protection</title>
		<link>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/</link>
					<comments>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 09:59:25 +0000</pubDate>
				<category><![CDATA[google]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#Encryption]]></category>
		<category><![CDATA[#GoogleChrome]]></category>
		<category><![CDATA[#HTTPS]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MerkleTreeCertificates]]></category>
		<category><![CDATA[#MTC]]></category>
		<category><![CDATA[#PKI]]></category>
		<category><![CDATA[#PostQuantumCryptography]]></category>
		<category><![CDATA[#QuantumComputing]]></category>
		<category><![CDATA[#QuantumSafe]]></category>
		<category><![CDATA[#TLS]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11322</guid>

					<description><![CDATA[<p>Google Chrome’s security team has announced a new plan to protect HTTPS from future quantum computer attacks. The</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/">Chrome Introduces Quantum-Safe HTTPS Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">Google Chrome’s security team has announced a new plan to protect HTTPS from future quantum computer attacks.</span> </p>



<p>The new approach uses <strong data-start="189" data-end="224">Merkle Tree Certificates (MTCs)</strong>, developed through the IETF PLANTS working group, to strengthen web security without slowing down the internet.</p>



<h2 class="wp-block-heading">Why This Is Needed</h2>



<p>Quantum computers could one day break today’s encryption methods used in HTTPS.</p>



<p>Post-quantum cryptography already exists, but it creates much larger keys. Larger keys mean:</p>



<ul class="wp-block-list">
<li>Bigger certificate sizes</li>



<li>Slower TLS handshakes</li>



<li>Higher bandwidth usage</li>



<li>Performance issues in traditional X.509 certificate chains</li>
</ul>



<p>Because of this, Chrome is not adding post-quantum X.509 certificates to its Root Store right now.</p>



<h2 class="wp-block-heading">What Are Merkle Tree Certificates (MTCs)?</h2>



<p>Instead of using large signature chains, MTCs use compact cryptographic proofs.</p>



<p>Here’s how it works:</p>



<ul class="wp-block-list">
<li>A Certification Authority (CA) signs one “Tree Head”</li>



<li>That Tree Head can represent millions of certificates</li>



<li>The browser receives only a small proof showing the certificate is included</li>
</ul>



<p>This keeps security strong while reducing data size.</p>



<h2 class="wp-block-heading">Key Benefits of MTCs</h2>



<ul class="wp-block-list">
<li>Smaller TLS handshakes</li>



<li>Better performance</li>



<li>Built-in transparency</li>



<li>Easier scaling for millions of certificates</li>



<li>Strong post-quantum protection</li>
</ul>



<h2 class="wp-block-heading">Chrome’s Rollout Plan</h2>



<p>Chrome is rolling this out in three phases.</p>



<p>Phase 1 (Now Ongoing)<br>Chrome is working with Cloudflare to test MTCs in real-world conditions. A traditional X.509 certificate is still used as a backup during testing.</p>



<p>Phase 2 (Q1 2027)<br>Trusted Certificate Transparency log operators will help launch public MTC systems.</p>



<p>Phase 3 (Q3 2027)<br>Chrome will introduce a new Quantum-Resistant Root Store (CQRS). This will support only MTC-based certificates and run alongside the current root program.</p>



<p>Websites will also have the option to enforce quantum-resistant connections only.</p>



<h2 class="wp-block-heading">What’s Next</h2>



<p>Google sees this as a major step in modernizing TLS.</p>



<p>Future plans include:</p>



<ul class="wp-block-list">
<li>Improved automated certificate management (ACME)</li>



<li>Better revocation systems to replace old CRLs</li>



<li>Stronger domain validation methods</li>



<li>Continuous external monitoring instead of yearly audits</li>
</ul>



<p>Chrome aims to build a faster, simpler, and quantum-safe web while maintaining compatibility with today’s ecosystem.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/">Chrome Introduces Quantum-Safe HTTPS Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenClaw Exploit Compromises Developer AI Agents</title>
		<link>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/</link>
					<comments>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 06:19:11 +0000</pubDate>
				<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AIAgents]]></category>
		<category><![CDATA[#AIAssistant]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#BruteForceAttack]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#DevSecOps]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunit]]></category>
		<category><![CDATA[#LocalhostExploit]]></category>
		<category><![CDATA[#OpenClaw]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#ShadowAI]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#WebSocketVulnerability]]></category>
		<category><![CDATA[#WorkstationSecurity]]></category>
		<category><![CDATA[#ZeroClickExploit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11289</guid>

					<description><![CDATA[<p>OpenClaw, a popular open-source AI assistant with over 100,000 GitHub stars, recently fixed a serious security flaw that</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/">OpenClaw Exploit Compromises Developer AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>OpenClaw, a popular<a href="https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/"> open-source AI</a> assistant with over 100,000 GitHub stars, recently fixed a serious security flaw that allowed malicious websites to silently take control of developer AI agents.</p>



<p>The vulnerability required no clicks, no extensions, and no user interaction. Simply visiting a malicious website could trigger the attack.</p>



<p>The OpenClaw team classified the issue as High severity and released a fix within 24 hours.</p>



<h3 class="wp-block-heading">How the Attack Worked</h3>



<p>When a developer visited an attacker-controlled website, malicious JavaScript executed in the browser. That script initiated a WebSocket connection directly to the local OpenClaw gateway.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Because the gateway exempted localhost connections from rate limiting, attackers could perform rapid brute-force password attempts — often hundreds per second — significantly increasing the likelihood of bypassing human-created passwords.</p>



<p>Once authentication was successful, the malicious script silently registered itself as a trusted device. This bypassed normal user confirmation prompts and granted persistent access.</p>



<p>From there, the attacker effectively controlled the AI agent and the connected environment.</p>



<h3 class="wp-block-heading">What Attackers Could Do</h3>



<p>With gateway-level access, attackers could:</p>



<ul class="wp-block-list">
<li>Send instructions to the AI agent and retrieve responses</li>



<li>Access configuration data, including AI providers and integrations</li>



<li>Enumerate connected nodes and internal IP addresses</li>



<li>Read logs for operational and reconnaissance insights</li>



<li>Search Slack or messaging history for API keys and credentials</li>



<li>Extract sensitive files from the workstation</li>



<li>Execute shell commands on connected systems</li>
</ul>



<p>In practical terms, this equated to a full workstation compromise.</p>



<p>This incident highlights a growing cybersecurity concern: shadow AI. Developer-adopted AI tools often operate outside traditional IT visibility while maintaining deep access to local systems, credentials, APIs, and internal communications.</p>



<p>Earlier this year, OpenClaw’s ecosystem also faced issues with malicious community “skills” distributed through its marketplace. However, this newly discovered vulnerability was more severe because it resided in the core gateway architecture itself — not in third-party plugins.</p>



<p>The OpenClaw team classified the issue as High severity and released a fix within 24 hours. Users and organizations must immediately upgrade to version 2026.2.25 or later to mitigate risk.</p>



<p>Beyond patching, enterprises should implement stronger governance, monitoring, and security controls for AI-powered developer tools. </p>



<p>As AI agents gain deeper system access, their compromise no longer represents just an application breach — it represents full environment exposure.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/">OpenClaw Exploit Compromises Developer AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</title>
		<link>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/</link>
					<comments>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 01 Mar 2026 18:36:42 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BCP]]></category>
		<category><![CDATA[#BusinessContinuity]]></category>
		<category><![CDATA[#CrisisManagement]]></category>
		<category><![CDATA[#CyberResilience]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#i6Security]]></category>
		<category><![CDATA[#MiddleEastConflict]]></category>
		<category><![CDATA[#OperationalResilience]]></category>
		<category><![CDATA[#SOCMonitoring]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11283</guid>

					<description><![CDATA[<p>The ongoing Middle East conflict has significantly elevated cyber risk across the region. During periods of geopolitical tension,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/">i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The ongoing Middle East conflict has significantly elevated cyber risk across the region. During periods of geopolitical tension, cyberattacks increase in frequency, coordination, and intent. Organizations across finance, energy, telecom, government, and large enterprises are facing intensified disruption attempts, including DDoS campaigns, ransomware operations, infrastructure targeting, and supply chain exploitation.</p>



<p>In such an environment, cybersecurity controls alone are not sufficient.</p>



<p>What determines resilience during conflict is the strength of Business Continuity Planning (BCP) combined with real-time cyber defense operations.</p>



<h2 class="wp-block-heading">The Shift From Security to Continuity</h2>



<p>Traditional cybersecurity focuses on detection and response. During active regional conflict, that approach must evolve into operational resilience.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Business Continuity ensures that critical operations remain functional despite sustained cyber pressure. It defines executive decision authority during crisis, structures communication channels, aligns legal and compliance obligations, and prioritizes recovery timelines based on business impact.</p>



<p>When war tensions escalate, tolerance for downtime disappears. Customers expect uninterrupted service. Regulators expect accountability. Stakeholders expect leadership clarity. Organizations without a tested continuity framework risk turning a cyber incident into a full-scale operational disruption.</p>



<h2 class="wp-block-heading">Elevated Threat Conditions Require Elevated Readiness</h2>



<p>The current regional instability demands a higher defensive posture. This includes continuous monitoring, validated backup integrity, predefined executive escalation paths, and tight coordination between security operations and leadership.</p>



<p>A mature continuity-driven model integrates:</p>



<ul class="wp-block-list">
<li>24&#215;7 Security Operations and incident management</li>



<li>Advanced threat detection and correlation</li>



<li>MITRE ATT&amp;CK–aligned investigations</li>



<li>Rapid containment and structured recovery</li>



<li>Executive-level reporting and crisis coordination</li>
</ul>



<p>Security tools are critical, but without structured continuity alignment, even strong detection capabilities can fall short under sustained attack pressure.</p>



<h2 class="wp-block-heading">Multi-Platform Security Expertise</h2>



<p>Effective resilience requires seamless operation across enterprise ecosystems. i6 brings deep experience across leading SIEM, XDR, and EDR platforms, including Microsoft Sentinel, IBM QRadar, Splunk, ArcSight, Google Chronicle, CrowdStrike Falcon, VMware Carbon Black, Microsoft Defender, and other enterprise-grade technologies.</p>



<p>Our approach reinforces existing security investments while strengthening response coordination and operational stability.</p>



<h2 class="wp-block-heading">i6 Commitment During the Current Middle East Conflict</h2>



<p>In response to the elevated cyber threat landscape created by the ongoing Middle East war tensions, i6 is extending FREE SOC monitoring and Business Continuity reinforcement support to eligible organizations operating within the region.</p>



<p>This initiative reflects our belief that during periods of regional instability, cybersecurity responsibility extends beyond commercial engagement. Operational continuity becomes a shared priority.</p>



<p>Our objective is clear: strengthen detection, accelerate response, and help organizations maintain operational stability despite heightened risk conditions.</p>



<h2 class="wp-block-heading">Continuity Defines Leadership</h2>



<p>Business Continuity is not a document prepared for audits. It is an executive discipline that determines whether an organization absorbs disruption or withstands it.</p>



<p>During the current Middle East environment, resilience is no longer optional. Organizations that remain operational during instability are not necessarily those without incidents. They are those with structured readiness and continuity-driven defense.</p>



<p><strong>At i6, we stand ready to reinforce that resilience when it matters most.</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/">i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Zoom Update Infects 1,437 in Days</title>
		<link>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/</link>
					<comments>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 17:40:22 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#CyberThreatAlert]]></category>
		<category><![CDATA[#FakeUpdate]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#SurveillanceMalware]]></category>
		<category><![CDATA[#TeramindAbuse]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[#ZoomScam]]></category>
		<category><![CDATA[#ZoomUpdateMalware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11256</guid>

					<description><![CDATA[<p>A new scam is targeting Zoom users by exploiting trust in meeting invitations. In just twelve days, 1,437</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/">Fake Zoom Update Infects 1,437 in Days</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">A new scam is targeting Zoom users by exploiting trust in meeting invitations.</span> </p>



<p>In just twelve days, 1,437 Windows users downloaded a malicious file after visiting a fake Zoom meeting page. What looked like a routine update turned into silent surveillance.</p>



<h2 class="wp-block-heading">How the Scam Works</h2>



<p>The attack begins with a fake domain designed to closely resemble Zoom’s official website.</p>



<p>When opened, the page displays a realistic Zoom waiting room. Fake participants join the meeting one by one. Background sounds and meeting chimes play to create authenticity.</p>



<p>Everything feels normal.</p>



<p>Then a “Network Issue” message appears on the screen.</p>



<p>This is intentional. The warning creates urgency and makes users believe their Zoom session requires a fix.</p>



<h2 class="wp-block-heading">The Fake Update Trap</h2>



<p>Shortly after the “network issue” appears, users see an “Update Available” pop-up.</p>



<p>A countdown timer starts. There is no option to close it.</p>



<p>Within seconds, a file downloads automatically. The page even switches to what looks like a Microsoft Store installation screen for “Zoom Workplace,” reinforcing the illusion.</p>



<p>But the downloaded file is not a Zoom update.</p>



<p>It is a modified Teramind monitoring agent — a legitimate employee surveillance tool — preconfigured to send data to attacker-controlled servers.</p>



<p>Once executed, the installer:</p>



<p>• Runs silently in the background<br>• Installs under a hidden system directory<br>• Uses legitimate Teramind binaries<br>• Avoids detection because the software itself is genuine</p>



<p>The tool operates in stealth mode, meaning no visible icons or program listings appear.</p>



<p>After installation, it begins collecting:</p>



<p>• Keystrokes<br>• Screens activity<br>• Application usage<br>• Clipboard content</p>



<p>It also includes anti-analysis techniques, behaving differently in sandbox or research environments.</p>



<p>Because it uses authentic software components, many antivirus tools fail to immediately flag it.</p>



<h2 class="wp-block-heading">Why This Attack Is Effective</h2>



<p>This campaign does not rely on sophisticated exploits.</p>



<p>It relies on timing and psychology.</p>



<p>Within 30 seconds, victims believe they are simply fixing a Zoom glitch. The interactive design even prevents automated security scanners from easily detecting the malicious behavior.</p>



<p>Instead of building new malware, attackers are misusing trusted corporate monitoring software.</p>



<p>That makes detection harder — and the deception more convincing.</p>



<h2 class="wp-block-heading">What To Do If You Suspect Infection</h2>



<p>If you visited the fake site or downloaded the file:</p>



<p>• Do not run the installer<br>• Check for unusual hidden folders in the ProgramData directory<br>• Review active background services for unknown entries<br>• Change passwords from a clean device<br>• Contact your IT or security team immediately</p>



<h2 class="wp-block-heading" id="h-indicators-of-compromise-iocs"><strong>Indicators of Compromise (IOCs)</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>Indicator Type</th><th>Value</th></tr></thead><tbody><tr><td><strong>File Hash (SHA-256)</strong></td><td>644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa</td></tr><tr><td><strong>Domain</strong></td><td>uswebzoomus[.]com</td></tr><tr><td><strong>Teramind Instance ID</strong></td><td>941afee582cc71135202939296679e229dd7cced</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/">Fake Zoom Update Infects 1,437 in Days</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</title>
		<link>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/</link>
					<comments>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 10:56:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#BankingTrojan]]></category>
		<category><![CDATA[#CryptoTheft]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#iOSSecurity]]></category>
		<category><![CDATA[#MaaS]]></category>
		<category><![CDATA[#MalwareAsAService]]></category>
		<category><![CDATA[#MobileMalware]]></category>
		<category><![CDATA[#MobileSpyware]]></category>
		<category><![CDATA[#OTPBypass]]></category>
		<category><![CDATA[#Smishing]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroDayRAT]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11229</guid>

					<description><![CDATA[<p>ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/">ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware that focuses only on spying or financial theft, this tool combines both into a single platform. It allows attackers to monitor victims in real time while also stealing money directly from banking and cryptocurrency apps.</p>



<p>Security researchers from Cyberthint found that ZeroDayRAT is being sold on Telegram as a Malware-as-a-Service (MaaS). This means even non-technical criminals can subscribe, access a web-based dashboard, and control infected devices remotely.</p>



<p>The infection usually starts with smishing messages — fake SMS alerts pretending to be service providers or app updates. Victims are tricked into installing a malicious Android APK or iOS payload. Once installed, the attacker gains full control through a browser-based control panel.</p>



<p>Through this dashboard, attackers can view device details, monitor messages, track GPS location, and even activate the microphone and camera. The malware also targets financial apps by using clipboard hijacking and fake login overlays to steal credentials. It can intercept OTP codes, allowing criminals to bypass two-factor authentication in real time.</p>



<p>ZeroDayRAT is sold in subscription tiers — $250 per day, $1000 per week, and $3500 per month — and transactions are reportedly handled through escrow services, indicating an organized criminal operation.</p>



<h2 class="wp-block-heading"><strong>What Makes ZeroDayRAT Dangerous</strong></h2>



<ul class="wp-block-list">
<li>Real-time GPS tracking and live surveillance</li>



<li>Remote camera and microphone activation</li>



<li>Screen recording and keylogging</li>



<li>Clipboard hijacking for cryptocurrency theft</li>



<li>Fake login overlays for banking and payment apps</li>



<li>OTP interception to bypass 2FA</li>



<li>Easy-to-use browser control panel</li>



<li>Sold as a subscription service on Telegram</li>
</ul>



<h2 class="wp-block-heading"><strong>Credibility Concerns</strong></h2>



<p>Security analysts say ZeroDayRAT appears to be a real threat, but some details raise questions. In one promotional screenshot, researchers noticed a browser tab labeled “Create USDT Wallet Address,” which looked staged or taken from demo material. This suggests that some features may be exaggerated for marketing.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="570" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-5.png" alt="" class="wp-image-11230" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-200x111.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-300x167.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-400x223.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-600x334.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-768x428.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-800x445.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5.png 1024w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Crypto Wallets and Banking Apps Are Primary Targets (Source: Cyberthint)</figcaption></figure>



<p>Even so, the overall capability of the tool reflects a growing shift in cybercrime. Criminals can now rent advanced surveillance kits that were once limited to highly skilled actors. ZeroDayRAT joins other mobile-focused threats like Anatsa, Arsink, and NFCShare that target banking apps, crypto wallets, and everyday mobile behavior.</p>



<p>As mobile malware continues to evolve, users and organizations must stay cautious. Most infections still begin with simple smishing messages or fake app downloads — proving that even small actions can lead to serious compromise.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/">ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
