<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mobile Security &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/mobile-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 28 Apr 2026 19:23:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Mobile Security &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>WhatsApp Tests Safer Cloud Backup for Messages</title>
		<link>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/</link>
					<comments>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 19:17:49 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CloudBackup]]></category>
		<category><![CDATA[#CloudStorage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#EncryptedBackup]]></category>
		<category><![CDATA[#EndToEndEncryption]]></category>
		<category><![CDATA[#MessagingSecurity]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#WhatsApp]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11658</guid>

					<description><![CDATA[<p>WhatsApp is developing a new cloud backup system that shifts away from relying entirely on third-party services like</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/">WhatsApp Tests Safer Cloud Backup for Messages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>WhatsApp is developing a new cloud backup system that shifts away from relying entirely on third-party services like Google Drive and iCloud. The idea is to bring backup storage under its own control, giving users a more secure and dedicated space for their chats, media, and files.</p>



<p>With this approach, users will no longer have to depend on shared cloud storage limits. Instead, WhatsApp aims to provide its own storage environment specifically built for messaging data. This is especially important as chat backups today include large files like high-resolution images, videos, and voice notes, which quickly consume available space.</p>



<p>All data stored in this system will be protected with end-to-end encryption by default. This means that messages remain private, and even WhatsApp itself cannot access the content. By keeping backups encrypted at all times, the platform is aiming to reduce the risk of unauthorized access or data exposure.</p>



<h2 class="wp-block-heading">Enhanced Security with Passkeys</h2>



<p>To strengthen protection further, WhatsApp is planning to introduce passkey-based authentication for backup access. Instead of using traditional passwords or long encryption keys, users will be able to unlock their backups using biometric methods such as fingerprint or facial recognition.</p>



<figure class="wp-block-image size-large is-resized"><img fetchpriority="high" decoding="async" width="1024" height="754" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-1024x754.png" alt="" class="wp-image-11659" style="aspect-ratio:1.3581289218482602;width:798px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-300x221.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-768x566.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-1024x754.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">WhatsApp Backup Storage Limits Overview (Source: WABetaInfo)</figcaption></figure>



<p>This makes the process both simpler and more secure. The authentication is tied directly to the user’s device, which reduces the risk of attacks like phishing, credential theft, or brute-force attempts. The passkey is securely stored and can sync across trusted devices, allowing users to restore backups without needing to remember complex credentials.</p>



<p>At the same time, WhatsApp is expected to keep alternative options available. Users who prefer using passwords or encryption keys will still have that choice, ensuring flexibility for different security preferences.</p>



<h2 class="wp-block-heading">Storage Options and Rollout Plans</h2>



<p>The upcoming system is also expected to introduce dedicated storage plans for backups. Early expectations suggest a small free storage tier for basic use, along with larger paid options for users who need more capacity. This would allow users to manage their backup storage without affecting their personal cloud accounts.</p>



<p>Despite this shift, WhatsApp is likely to continue supporting third-party backups for users who prefer their current setup. This ensures a smoother transition without forcing immediate changes.</p>



<p>The feature is still in development and has not yet been released publicly. It is expected to go through multiple testing phases to ensure stability, security, and compatibility with existing systems before a wider rollout begins.</p>



<p>This move reflects a broader industry trend toward building self-contained ecosystems that prioritize privacy, security, and better control over user data, rather than relying entirely on external platforms.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/">WhatsApp Tests Safer Cloud Backup for Messages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Multi Stage Malware Attack Uses Obfuscation to Evade Detection</title>
		<link>https://firsthackersnews.com/multi-stage-malware-attack/</link>
					<comments>https://firsthackersnews.com/multi-stage-malware-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 15:30:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11647</guid>

					<description><![CDATA[<p>Security researchers have identified a new malware campaign that uses advanced hiding techniques and multi-stage payloads to avoid</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/multi-stage-malware-attack/">Multi Stage Malware Attack Uses Obfuscation to Evade Detection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a new malware campaign that uses advanced hiding techniques and multi-stage payloads to avoid detection. Instead of launching a direct attack, the malware spreads in stages, making it harder for traditional security tools to detect and block it. This approach is characterized as a multi stage malware attack.</p>



<p>The attack starts with a targeted phishing email sent to specific organizations, particularly government-related entities. The email is designed to look legitimate, pretending to come from an internal consultant and referencing a real-looking project to gain trust.</p>



<p>To make the message more convincing, it is marked as urgent and includes a request for a read receipt. This increases the chances that the recipient will open the attachments without suspicion.</p>



<p>This multi stage malware attack poses serious threats to organizations, as its multi-layered nature complicates detection and remediation efforts.</p>



<p>The email contains two files with slightly misspelled names to appear like quick internal documents:</p>



<ul class="wp-block-list">
<li>A Word file pretending to be a report</li>



<li>A PDF file that looks like an official document</li>
</ul>



<p>These small tricks are used to make the attack look normal and believable.</p>



<h2 class="wp-block-heading">How the Multi-Stage Attack Works</h2>



<p>The infection process is carefully designed and happens in multiple steps. This layered approach helps the malware stay hidden during each stage.</p>



<p>When the Word file is opened, it asks the user to enable macros. If the user allows it, hidden code runs in the background and downloads a malicious file from an external server. This technique helps bypass basic security checks.</p>



<p>At the same time, the PDF file acts as another attack path. It shows a fake error message asking the user to update their PDF reader. If the user clicks the prompt, it downloads another malicious file disguised as a legitimate application.</p>



<p>Once installed, the malware:</p>



<ul class="wp-block-list">
<li>Connects to remote servers using trusted services</li>



<li>Uses tools like developer tunnels to maintain access</li>



<li>Sends stolen data through platforms like Discord</li>



<li>Executes commands on the infected system</li>
</ul>



<p>By using legitimate platforms, the malware blends in with normal network traffic, making it difficult to detect.</p>



<h2 class="wp-block-heading">Evasion Techniques and Why It’s Dangerous</h2>



<p>This malware uses several techniques to avoid being detected by security systems. It checks for analysis environments, hides its code, and uses trusted services to carry out its activities.</p>



<p>Some of its key evasion methods include:</p>



<ul class="wp-block-list">
<li>Hiding malicious code inside compiled scripts</li>



<li>Using trusted cloud services for communication</li>



<li>Disguising files with familiar names and branding</li>



<li>Delivering payloads in stages instead of all at once</li>
</ul>



<p>Because of these methods, the malware can remain active for a long time without being noticed. It can steal data, monitor systems, and give attackers remote access.</p>



<p>This attack shows a growing trend where cybercriminals rely on trusted platforms and multi-step infections to bypass traditional defenses. Organizations should focus on monitoring behavior, restricting macros, and educating users to recognize suspicious emails.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/multi-stage-malware-attack/">Multi Stage Malware Attack Uses Obfuscation to Evade Detection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/multi-stage-malware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Messaging Apps Used to Deliver ProSpy Spyware</title>
		<link>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/</link>
					<comments>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 09:35:08 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11582</guid>

					<description><![CDATA[<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Attackers are running a targeted espionage campaign across the Middle East by disguising malware as trusted messaging applications. The operation delivers an Android spyware known as <strong>ProSpy</strong>, aimed primarily at journalists, activists, and political figures.</p>



<h2 class="wp-block-heading"><strong>Social Engineering and Delivery Tactics</strong></h2>



<p>The attack typically begins with direct contact. Victims are approached through platforms like LinkedIn, email, or messaging apps by accounts posing as journalists, support staff, or known contacts. These interactions are carefully crafted to build trust before introducing a malicious link.</p>



<p>The link is usually presented as something urgent or relevant, such as a video call request, shared document, or account alert. Once clicked, victims are redirected either to fake login pages or download portals.</p>



<p>Common tactics used:</p>



<ul class="wp-block-list">
<li>Impersonation of trusted individuals or organizations</li>



<li>Spearphishing messages tailored to the target</li>



<li>Fake login pages mimicking services like email or cloud platforms</li>



<li>Malicious download links disguised as secure communication tools</li>
</ul>



<p>This approach relies heavily on human trust rather than technical exploitation, making it highly effective even against cautious users.</p>



<h2 class="wp-block-heading"><strong>Fake Apps and Spyware Capabilities</strong></h2>



<p>The core of the campaign is the use of fake Android applications that appear to be secure messaging tools. These apps are distributed through convincing websites that mimic official sources and offer “enhanced” or “pro” versions of popular platforms.</p>



<p>Once installed, the spyware operates silently in the background, collecting and transmitting sensitive data to attacker-controlled servers.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="472" height="325" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png" alt="" class="wp-image-11583" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-2-300x207.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-2.png 472w" sizes="(max-width: 472px) 100vw, 472px" /><figcaption class="wp-element-caption">ProSpy searches for backup files from third-party applications and exfiltrates them (Source: Lookout).<br></figcaption></figure>



<p>Key capabilities include:</p>



<ul class="wp-block-list">
<li>Access to contacts, messages, and call-related data</li>



<li>Collection of device information and stored files</li>



<li>Extraction of documents, media, and backup data</li>



<li>Continuous communication with remote command servers</li>
</ul>



<p>The malware is designed to blend in as a legitimate app, making detection difficult for users who install it outside official app stores.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>Broader Implications</strong></h2>



<p>This campaign highlights a growing trend where attackers combine social engineering with mobile spyware to conduct surveillance operations. The targeting of civil society groups suggests a shift toward more personalized and contract-driven espionage activities.</p>



<p>It also reinforces a critical point: even advanced threats often rely on simple entry points — convincing a user to trust and install something that appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/">Fake Messaging Apps Used to Deliver ProSpy Spyware</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/prospy-spyware-fake-messaging-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Chrome Introduces Quantum-Safe HTTPS Protection</title>
		<link>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/</link>
					<comments>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 09:59:25 +0000</pubDate>
				<category><![CDATA[google]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#Encryption]]></category>
		<category><![CDATA[#GoogleChrome]]></category>
		<category><![CDATA[#HTTPS]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MerkleTreeCertificates]]></category>
		<category><![CDATA[#MTC]]></category>
		<category><![CDATA[#PKI]]></category>
		<category><![CDATA[#PostQuantumCryptography]]></category>
		<category><![CDATA[#QuantumComputing]]></category>
		<category><![CDATA[#QuantumSafe]]></category>
		<category><![CDATA[#TLS]]></category>
		<category><![CDATA[#WebSecurity]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11322</guid>

					<description><![CDATA[<p>Google Chrome’s security team has announced a new plan to protect HTTPS from future quantum computer attacks. The</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/">Chrome Introduces Quantum-Safe HTTPS Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">Google Chrome’s security team has announced a new plan to protect HTTPS from future quantum computer attacks.</span> </p>



<p>The new approach uses <strong data-start="189" data-end="224">Merkle Tree Certificates (MTCs)</strong>, developed through the IETF PLANTS working group, to strengthen web security without slowing down the internet.</p>



<h2 class="wp-block-heading">Why This Is Needed</h2>



<p>Quantum computers could one day break today’s encryption methods used in HTTPS.</p>



<p>Post-quantum cryptography already exists, but it creates much larger keys. Larger keys mean:</p>



<ul class="wp-block-list">
<li>Bigger certificate sizes</li>



<li>Slower TLS handshakes</li>



<li>Higher bandwidth usage</li>



<li>Performance issues in traditional X.509 certificate chains</li>
</ul>



<p>Because of this, Chrome is not adding post-quantum X.509 certificates to its Root Store right now.</p>



<h2 class="wp-block-heading">What Are Merkle Tree Certificates (MTCs)?</h2>



<p>Instead of using large signature chains, MTCs use compact cryptographic proofs.</p>



<p>Here’s how it works:</p>



<ul class="wp-block-list">
<li>A Certification Authority (CA) signs one “Tree Head”</li>



<li>That Tree Head can represent millions of certificates</li>



<li>The browser receives only a small proof showing the certificate is included</li>
</ul>



<p>This keeps security strong while reducing data size.</p>



<h2 class="wp-block-heading">Key Benefits of MTCs</h2>



<ul class="wp-block-list">
<li>Smaller TLS handshakes</li>



<li>Better performance</li>



<li>Built-in transparency</li>



<li>Easier scaling for millions of certificates</li>



<li>Strong post-quantum protection</li>
</ul>



<h2 class="wp-block-heading">Chrome’s Rollout Plan</h2>



<p>Chrome is rolling this out in three phases.</p>



<p>Phase 1 (Now Ongoing)<br>Chrome is working with Cloudflare to test MTCs in real-world conditions. A traditional X.509 certificate is still used as a backup during testing.</p>



<p>Phase 2 (Q1 2027)<br>Trusted Certificate Transparency log operators will help launch public MTC systems.</p>



<p>Phase 3 (Q3 2027)<br>Chrome will introduce a new Quantum-Resistant Root Store (CQRS). This will support only MTC-based certificates and run alongside the current root program.</p>



<p>Websites will also have the option to enforce quantum-resistant connections only.</p>



<h2 class="wp-block-heading">What’s Next</h2>



<p>Google sees this as a major step in modernizing TLS.</p>



<p>Future plans include:</p>



<ul class="wp-block-list">
<li>Improved automated certificate management (ACME)</li>



<li>Better revocation systems to replace old CRLs</li>



<li>Stronger domain validation methods</li>



<li>Continuous external monitoring instead of yearly audits</li>
</ul>



<p>Chrome aims to build a faster, simpler, and quantum-safe web while maintaining compatibility with today’s ecosystem.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/">Chrome Introduces Quantum-Safe HTTPS Protection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/chrome-quantum-safe-https-merkle-tree-certificates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenClaw Exploit Compromises Developer AI Agents</title>
		<link>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/</link>
					<comments>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 06:19:11 +0000</pubDate>
				<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AIAgents]]></category>
		<category><![CDATA[#AIAssistant]]></category>
		<category><![CDATA[#AIThreats]]></category>
		<category><![CDATA[#BruteForceAttack]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAwareness]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#DevSecOps]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunit]]></category>
		<category><![CDATA[#LocalhostExploit]]></category>
		<category><![CDATA[#OpenClaw]]></category>
		<category><![CDATA[#PatchNow]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#ShadowAI]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#WebSocketVulnerability]]></category>
		<category><![CDATA[#WorkstationSecurity]]></category>
		<category><![CDATA[#ZeroClickExploit]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11289</guid>

					<description><![CDATA[<p>OpenClaw, a popular open-source AI assistant with over 100,000 GitHub stars, recently fixed a serious security flaw that</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/">OpenClaw Exploit Compromises Developer AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>OpenClaw, a popular<a href="https://firsthackersnews.com/ai-jailbreak-cyberattack-government-data-breach/"> open-source AI</a> assistant with over 100,000 GitHub stars, recently fixed a serious security flaw that allowed malicious websites to silently take control of developer AI agents.</p>



<p>The vulnerability required no clicks, no extensions, and no user interaction. Simply visiting a malicious website could trigger the attack.</p>



<p>The OpenClaw team classified the issue as High severity and released a fix within 24 hours.</p>



<h3 class="wp-block-heading">How the Attack Worked</h3>



<p>When a developer visited an attacker-controlled website, malicious JavaScript executed in the browser. That script initiated a WebSocket connection directly to the local OpenClaw gateway.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Because the gateway exempted localhost connections from rate limiting, attackers could perform rapid brute-force password attempts — often hundreds per second — significantly increasing the likelihood of bypassing human-created passwords.</p>



<p>Once authentication was successful, the malicious script silently registered itself as a trusted device. This bypassed normal user confirmation prompts and granted persistent access.</p>



<p>From there, the attacker effectively controlled the AI agent and the connected environment.</p>



<h3 class="wp-block-heading">What Attackers Could Do</h3>



<p>With gateway-level access, attackers could:</p>



<ul class="wp-block-list">
<li>Send instructions to the AI agent and retrieve responses</li>



<li>Access configuration data, including AI providers and integrations</li>



<li>Enumerate connected nodes and internal IP addresses</li>



<li>Read logs for operational and reconnaissance insights</li>



<li>Search Slack or messaging history for API keys and credentials</li>



<li>Extract sensitive files from the workstation</li>



<li>Execute shell commands on connected systems</li>
</ul>



<p>In practical terms, this equated to a full workstation compromise.</p>



<p>This incident highlights a growing cybersecurity concern: shadow AI. Developer-adopted AI tools often operate outside traditional IT visibility while maintaining deep access to local systems, credentials, APIs, and internal communications.</p>



<p>Earlier this year, OpenClaw’s ecosystem also faced issues with malicious community “skills” distributed through its marketplace. However, this newly discovered vulnerability was more severe because it resided in the core gateway architecture itself — not in third-party plugins.</p>



<p>The OpenClaw team classified the issue as High severity and released a fix within 24 hours. Users and organizations must immediately upgrade to version 2026.2.25 or later to mitigate risk.</p>



<p>Beyond patching, enterprises should implement stronger governance, monitoring, and security controls for AI-powered developer tools. </p>



<p>As AI agents gain deeper system access, their compromise no longer represents just an application breach — it represents full environment exposure.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/">OpenClaw Exploit Compromises Developer AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/openclaw-zero-click-ai-agent-compromise/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</title>
		<link>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/</link>
					<comments>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 01 Mar 2026 18:36:42 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BCP]]></category>
		<category><![CDATA[#BusinessContinuity]]></category>
		<category><![CDATA[#CrisisManagement]]></category>
		<category><![CDATA[#CyberResilience]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#i6Security]]></category>
		<category><![CDATA[#MiddleEastConflict]]></category>
		<category><![CDATA[#OperationalResilience]]></category>
		<category><![CDATA[#SOCMonitoring]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11283</guid>

					<description><![CDATA[<p>The ongoing Middle East conflict has significantly elevated cyber risk across the region. During periods of geopolitical tension,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/">i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The ongoing Middle East conflict has significantly elevated cyber risk across the region. During periods of geopolitical tension, cyberattacks increase in frequency, coordination, and intent. Organizations across finance, energy, telecom, government, and large enterprises are facing intensified disruption attempts, including DDoS campaigns, ransomware operations, infrastructure targeting, and supply chain exploitation.</p>



<p>In such an environment, cybersecurity controls alone are not sufficient.</p>



<p>What determines resilience during conflict is the strength of Business Continuity Planning (BCP) combined with real-time cyber defense operations.</p>



<h2 class="wp-block-heading">The Shift From Security to Continuity</h2>



<p>Traditional cybersecurity focuses on detection and response. During active regional conflict, that approach must evolve into operational resilience.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<p>Business Continuity ensures that critical operations remain functional despite sustained cyber pressure. It defines executive decision authority during crisis, structures communication channels, aligns legal and compliance obligations, and prioritizes recovery timelines based on business impact.</p>



<p>When war tensions escalate, tolerance for downtime disappears. Customers expect uninterrupted service. Regulators expect accountability. Stakeholders expect leadership clarity. Organizations without a tested continuity framework risk turning a cyber incident into a full-scale operational disruption.</p>



<h2 class="wp-block-heading">Elevated Threat Conditions Require Elevated Readiness</h2>



<p>The current regional instability demands a higher defensive posture. This includes continuous monitoring, validated backup integrity, predefined executive escalation paths, and tight coordination between security operations and leadership.</p>



<p>A mature continuity-driven model integrates:</p>



<ul class="wp-block-list">
<li>24&#215;7 Security Operations and incident management</li>



<li>Advanced threat detection and correlation</li>



<li>MITRE ATT&amp;CK–aligned investigations</li>



<li>Rapid containment and structured recovery</li>



<li>Executive-level reporting and crisis coordination</li>
</ul>



<p>Security tools are critical, but without structured continuity alignment, even strong detection capabilities can fall short under sustained attack pressure.</p>



<h2 class="wp-block-heading">Multi-Platform Security Expertise</h2>



<p>Effective resilience requires seamless operation across enterprise ecosystems. i6 brings deep experience across leading SIEM, XDR, and EDR platforms, including Microsoft Sentinel, IBM QRadar, Splunk, ArcSight, Google Chronicle, CrowdStrike Falcon, VMware Carbon Black, Microsoft Defender, and other enterprise-grade technologies.</p>



<p>Our approach reinforces existing security investments while strengthening response coordination and operational stability.</p>



<h2 class="wp-block-heading">i6 Commitment During the Current Middle East Conflict</h2>



<p>In response to the elevated cyber threat landscape created by the ongoing Middle East war tensions, i6 is extending FREE SOC monitoring and Business Continuity reinforcement support to eligible organizations operating within the region.</p>



<p>This initiative reflects our belief that during periods of regional instability, cybersecurity responsibility extends beyond commercial engagement. Operational continuity becomes a shared priority.</p>



<p>Our objective is clear: strengthen detection, accelerate response, and help organizations maintain operational stability despite heightened risk conditions.</p>



<h2 class="wp-block-heading">Continuity Defines Leadership</h2>



<p>Business Continuity is not a document prepared for audits. It is an executive discipline that determines whether an organization absorbs disruption or withstands it.</p>



<p>During the current Middle East environment, resilience is no longer optional. Organizations that remain operational during instability are not necessarily those without incidents. They are those with structured readiness and continuity-driven defense.</p>



<p><strong>At i6, we stand ready to reinforce that resilience when it matters most.</strong></p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/">i6 — Your Business Continuity Partner During the Ongoing Middle East Conflict</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/business-continuity-middle-east-conflict-bcp-support/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake Zoom Update Infects 1,437 in Days</title>
		<link>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/</link>
					<comments>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 17:40:22 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#CyberThreatAlert]]></category>
		<category><![CDATA[#FakeUpdate]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#SurveillanceMalware]]></category>
		<category><![CDATA[#TeramindAbuse]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[#ZoomScam]]></category>
		<category><![CDATA[#ZoomUpdateMalware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11256</guid>

					<description><![CDATA[<p>A new scam is targeting Zoom users by exploiting trust in meeting invitations. In just twelve days, 1,437</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/">Fake Zoom Update Infects 1,437 in Days</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span style="font-size: revert; color: initial;">A new scam is targeting Zoom users by exploiting trust in meeting invitations.</span> </p>



<p>In just twelve days, 1,437 Windows users downloaded a malicious file after visiting a fake Zoom meeting page. What looked like a routine update turned into silent surveillance.</p>



<h2 class="wp-block-heading">How the Scam Works</h2>



<p>The attack begins with a fake domain designed to closely resemble Zoom’s official website.</p>



<p>When opened, the page displays a realistic Zoom waiting room. Fake participants join the meeting one by one. Background sounds and meeting chimes play to create authenticity.</p>



<p>Everything feels normal.</p>



<p>Then a “Network Issue” message appears on the screen.</p>



<p>This is intentional. The warning creates urgency and makes users believe their Zoom session requires a fix.</p>



<h2 class="wp-block-heading">The Fake Update Trap</h2>



<p>Shortly after the “network issue” appears, users see an “Update Available” pop-up.</p>



<p>A countdown timer starts. There is no option to close it.</p>



<p>Within seconds, a file downloads automatically. The page even switches to what looks like a Microsoft Store installation screen for “Zoom Workplace,” reinforcing the illusion.</p>



<p>But the downloaded file is not a Zoom update.</p>



<p>It is a modified Teramind monitoring agent — a legitimate employee surveillance tool — preconfigured to send data to attacker-controlled servers.</p>



<p>Once executed, the installer:</p>



<p>• Runs silently in the background<br>• Installs under a hidden system directory<br>• Uses legitimate Teramind binaries<br>• Avoids detection because the software itself is genuine</p>



<p>The tool operates in stealth mode, meaning no visible icons or program listings appear.</p>



<p>After installation, it begins collecting:</p>



<p>• Keystrokes<br>• Screens activity<br>• Application usage<br>• Clipboard content</p>



<p>It also includes anti-analysis techniques, behaving differently in sandbox or research environments.</p>



<p>Because it uses authentic software components, many antivirus tools fail to immediately flag it.</p>



<h2 class="wp-block-heading">Why This Attack Is Effective</h2>



<p>This campaign does not rely on sophisticated exploits.</p>



<p>It relies on timing and psychology.</p>



<p>Within 30 seconds, victims believe they are simply fixing a Zoom glitch. The interactive design even prevents automated security scanners from easily detecting the malicious behavior.</p>



<p>Instead of building new malware, attackers are misusing trusted corporate monitoring software.</p>



<p>That makes detection harder — and the deception more convincing.</p>



<h2 class="wp-block-heading">What To Do If You Suspect Infection</h2>



<p>If you visited the fake site or downloaded the file:</p>



<p>• Do not run the installer<br>• Check for unusual hidden folders in the ProgramData directory<br>• Review active background services for unknown entries<br>• Change passwords from a clean device<br>• Contact your IT or security team immediately</p>



<h2 class="wp-block-heading" id="h-indicators-of-compromise-iocs"><strong>Indicators of Compromise (IOCs)</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>Indicator Type</th><th>Value</th></tr></thead><tbody><tr><td><strong>File Hash (SHA-256)</strong></td><td>644ef9f5eea1d6a2bc39a62627ee3c7114a14e7050bafab8a76b9aa8069425fa</td></tr><tr><td><strong>Domain</strong></td><td>uswebzoomus[.]com</td></tr><tr><td><strong>Teramind Instance ID</strong></td><td>941afee582cc71135202939296679e229dd7cced</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/">Fake Zoom Update Infects 1,437 in Days</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zoom-update-scam-teramind-surveillance-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</title>
		<link>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/</link>
					<comments>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 24 Feb 2026 10:56:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#BankingTrojan]]></category>
		<category><![CDATA[#CryptoTheft]]></category>
		<category><![CDATA[#Cybercrime]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#iOSSecurity]]></category>
		<category><![CDATA[#MaaS]]></category>
		<category><![CDATA[#MalwareAsAService]]></category>
		<category><![CDATA[#MobileMalware]]></category>
		<category><![CDATA[#MobileSpyware]]></category>
		<category><![CDATA[#OTPBypass]]></category>
		<category><![CDATA[#Smishing]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#ZeroDayRAT]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11229</guid>

					<description><![CDATA[<p>ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/">ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>ZeroDayRAT is a newly discovered mobile spyware service that targets both Android and iOS devices. Unlike traditional malware that focuses only on spying or financial theft, this tool combines both into a single platform. It allows attackers to monitor victims in real time while also stealing money directly from banking and cryptocurrency apps.</p>



<p>Security researchers from Cyberthint found that ZeroDayRAT is being sold on Telegram as a Malware-as-a-Service (MaaS). This means even non-technical criminals can subscribe, access a web-based dashboard, and control infected devices remotely.</p>



<p>The infection usually starts with smishing messages — fake SMS alerts pretending to be service providers or app updates. Victims are tricked into installing a malicious Android APK or iOS payload. Once installed, the attacker gains full control through a browser-based control panel.</p>



<p>Through this dashboard, attackers can view device details, monitor messages, track GPS location, and even activate the microphone and camera. The malware also targets financial apps by using clipboard hijacking and fake login overlays to steal credentials. It can intercept OTP codes, allowing criminals to bypass two-factor authentication in real time.</p>



<p>ZeroDayRAT is sold in subscription tiers — $250 per day, $1000 per week, and $3500 per month — and transactions are reportedly handled through escrow services, indicating an organized criminal operation.</p>



<h2 class="wp-block-heading"><strong>What Makes ZeroDayRAT Dangerous</strong></h2>



<ul class="wp-block-list">
<li>Real-time GPS tracking and live surveillance</li>



<li>Remote camera and microphone activation</li>



<li>Screen recording and keylogging</li>



<li>Clipboard hijacking for cryptocurrency theft</li>



<li>Fake login overlays for banking and payment apps</li>



<li>OTP interception to bypass 2FA</li>



<li>Easy-to-use browser control panel</li>



<li>Sold as a subscription service on Telegram</li>
</ul>



<h2 class="wp-block-heading"><strong>Credibility Concerns</strong></h2>



<p>Security analysts say ZeroDayRAT appears to be a real threat, but some details raise questions. In one promotional screenshot, researchers noticed a browser tab labeled “Create USDT Wallet Address,” which looked staged or taken from demo material. This suggests that some features may be exaggerated for marketing.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="1024" height="570" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-5.png" alt="" class="wp-image-11230" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-200x111.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-300x167.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-400x223.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-600x334.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-768x428.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5-800x445.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-5.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Crypto Wallets and Banking Apps Are Primary Targets (Source: Cyberthint)</figcaption></figure>



<p>Even so, the overall capability of the tool reflects a growing shift in cybercrime. Criminals can now rent advanced surveillance kits that were once limited to highly skilled actors. ZeroDayRAT joins other mobile-focused threats like Anatsa, Arsink, and NFCShare that target banking apps, crypto wallets, and everyday mobile behavior.</p>



<p>As mobile malware continues to evolve, users and organizations must stay cautious. Most infections still begin with simple smishing messages or fake app downloads — proving that even small actions can lead to serious compromise.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/">ZeroDayRAT Turns Mobile Phones into Spy and Theft Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/zerodayrat-mobile-spyware-android-ios/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</title>
		<link>https://firsthackersnews.com/google-blocks-malicious-apps-2025/</link>
					<comments>https://firsthackersnews.com/google-blocks-malicious-apps-2025/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sat, 21 Feb 2026 06:13:24 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[google]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AIinSecurity]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AppSecurity]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalSafety]]></category>
		<category><![CDATA[#GooglePlay]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwarePrevention]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#PlayStore]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#SecurityNews]]></category>
		<category><![CDATA[#TechSecurity]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11225</guid>

					<description><![CDATA[<p>Google says it stopped more than 1.75 million malicious or policy-violating Android apps from reaching users in 2025.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-blocks-malicious-apps-2025/">Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Google says it stopped more than 1.75 million malicious or policy-violating Android apps from reaching users in 2025. Over 80,000 developer accounts were also banned to prevent repeat abuse.</p>



<p>The company credits stronger, multi-layered protections and AI-powered reviews for discouraging attackers from targeting the Play Store in the first place.</p>



<p>Every app submitted to Google Play now goes through more than 10,000 automated and human safety checks before publication, followed by continuous monitoring after it goes live. Google has also added generative AI models to help reviewers detect complex malware, fraud schemes, hidden subscriptions, and misuse of user data.</p>



<h2 class="wp-block-heading"><strong>Privacy, Reviews, and Child Safety &#8211; Google malicious apps</strong></h2>



<p>Beyond blocking malicious apps, Google strengthened privacy and trust controls across the platform.</p>



<p><strong>Key highlights from 2025:</strong></p>



<ul class="wp-block-list">
<li>1.75+ million apps rejected for malware, fraud, hidden charges, or data misuse</li>



<li>80,000+ bad developer accounts banned</li>



<li>255,000 apps restricted from accessing excessive sensitive data</li>



<li>160 million fake or abusive ratings and reviews blocked</li>



<li>Extra protections added to prevent children from accessing high-risk apps</li>
</ul>



<p>Tools like Play Policy Insights and the Data Safety section help developers fix privacy issues before submission, reducing accidental violations.</p>



<h2 class="wp-block-heading"><strong>On-Device Protection with Play Protect</strong></h2>



<p>Security doesn’t stop at the Play Store. Google Play Protect now scans over 350 billion apps daily, including sideloaded apps installed outside the store.</p>



<p><strong>In 2025:</strong></p>



<ul class="wp-block-list">
<li>27 million new malicious sideloaded apps detected</li>



<li>Expanded fraud protection to 185 markets (2.8+ billion devices)</li>



<li>266 million risky installation attempts blocked</li>



<li>872,000 high-risk scam apps stopped</li>



<li>New in-call scam protection prevents users from disabling Play Protect during social-engineering attacks</li>
</ul>



<h2 class="wp-block-heading"><strong>How Google Strengthened Play Store Security in 2025</strong></h2>



<p>Developers made over 20 billion daily integrity checks using the Play Integrity API to protect apps from abuse and spoofing. Hardware-backed security signals and improved account verification are also being expanded, including limited distribution accounts for students and hobbyists.</p>



<p>Looking ahead, Google plans deeper AI integration, stricter verification, and new Android 16 protections such as built-in defenses against tapjacking.</p>



<p>Together, these measures show Google’s broader strategy: block malicious apps at scale, reduce fraud and privacy abuse, and strengthen trust across the Android ecosystem.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/google-blocks-malicious-apps-2025/">Google Blocks 1.75 Million Harmful Apps from Play Store in 2025</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/google-blocks-malicious-apps-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PromptSpy: Android Malware Uses Google Gemini AI</title>
		<link>https://firsthackersnews.com/promptspy/</link>
					<comments>https://firsthackersnews.com/promptspy/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 05:54:19 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AccessibilityAbuse]]></category>
		<category><![CDATA[#AISecurity]]></category>
		<category><![CDATA[#AndroidMalware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AppSecurity]]></category>
		<category><![CDATA[#BankingTrojan]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DigitalForensics]]></category>
		<category><![CDATA[#EmergingThreats]]></category>
		<category><![CDATA[#GeminiAI]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#MobileThreats]]></category>
		<category><![CDATA[#PhishingCampaign]]></category>
		<category><![CDATA[#PlayProtect]]></category>
		<category><![CDATA[#PromptSpy]]></category>
		<category><![CDATA[#RAT]]></category>
		<category><![CDATA[#RemoteAccessTrojan]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#VNC]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11210</guid>

					<description><![CDATA[<p>PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time decisions</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptspy/">PromptSpy: Android Malware Uses Google Gemini AI</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>PromptSpy is a newly discovered Android malware family that uses Google’s Gemini AI model to make real-time decisions on infected devices.</p>



<p>Instead of using fixed screen coordinates or simple automation rules, PromptSpy sends Gemini a natural-language request along with an XML snapshot of the current screen. This snapshot includes details about visible elements such as text, type, and screen position.</p>



<p>Gemini analyzes the screen content and responds with JSON instructions telling the malware what action to perform — such as tap, long-press, or swipe — and exactly where to do it.</p>



<p>The main goal is persistence. PromptSpy uses this AI-driven method to keep its malicious app pinned in the Recent Apps list, even when the user tries to close it.</p>



<p>The malware runs in a loop. It executes Gemini’s instructions using Android’s Accessibility Service, captures the updated screen, and sends it back to Gemini. This continues until the AI confirms the app is successfully pinned. Because it relies on AI analysis instead of hardcoded rules, it works across different devices, Android versions, and manufacturer customizations.</p>



<p>Security researchers at ESET describe PromptSpy as the first known Android malware to directly integrate generative AI into its execution flow. The focus is stealthy persistence and maintaining control over the device.</p>



<h3 class="wp-block-heading">Android AI Malware Capabilities</h3>



<p>Beyond AI-based persistence, PromptSpy also acts as a powerful remote access tool.</p>



<p>It includes a built-in VNC component that allows attackers to control the infected phone in real time. Once the victim grants Accessibility permissions, attackers can:</p>



<ul class="wp-block-list">
<li>View the device screen live</li>



<li>Simulate taps and gestures</li>



<li>Perform actions as if physically holding the phone</li>
</ul>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="1024" height="768" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-3.png" alt="" class="wp-image-11211" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-200x150.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-300x225.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-400x300.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-600x450.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-768x576.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3-800x600.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-3.png 1024w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Android/Phishing.Agent.M UI showing the same fake site as the PromptSpy dropper (Source: ESET).</figcaption></figure>



<p>The malware can capture lockscreen credentials, gather device information, take screenshots, record screen activity as video, and monitor which app is currently in use.</p>



<p>It communicates with a hardcoded command-and-control server using the VNC protocol, protected by AES encryption. The server can also send a Gemini API key and additional task instructions to the malware.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="968" height="1024" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-968x1024.png" alt="" class="wp-image-11212" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-200x212.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-284x300.png 284w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-400x423.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-600x635.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-768x813.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-800x846.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-968x1024.png 968w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-1200x1270.png 1200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-4-1452x1536.png 1452w" sizes="auto, (max-width: 968px) 100vw, 968px" /><figcaption class="wp-element-caption">Malware screen prompting installation of the PromptSpy payload (Source: ESET).<br></figcaption></figure>



<p>PromptSpy also actively blocks removal attempts. It abuses Accessibility permissions to place invisible overlays on important system buttons, including those used to uninstall the app or disable its privileges.</p>



<p>These transparent overlays intercept user taps on “Uninstall” or “Stop,” preventing normal removal.</p>



<p>Technical analysis shows that PromptSpy is delivered through a dropper app. The malicious payload (app-release.apk) is embedded inside the dropper’s assets directory.</p>



<h2 class="wp-block-heading"><strong>Campaign Spread and Target Regions</strong></h2>



<p>ESET connects PromptSpy to a multi-stage, financially driven campaign mainly targeting users in Argentina.</p>



<p>An earlier variant, VNCSpy, was uploaded from Hong Kong in January 2026. More advanced PromptSpy samples appeared from Argentina in February 2026.</p>



<p>The malware spread through domains such as mgardownload[.]com and m-mgarg[.]com, which imitated JPMorgan Chase branding under the name “MorganArg” using Spanish banking lures.</p>



<p>Analysis of the same infrastructure revealed another Android phishing trojan signed with the same certificate and using the same fake banking site, likely acting as the initial infection stage before deploying PromptSpy.</p>



<p>Although PromptSpy has not appeared widely in ESET telemetry and may still be in limited testing, the active domains confirm some real-world use.</p>



<p>Code findings, including simplified Chinese debug strings and references to Chinese Accessibility events, suggest development in a Chinese-speaking environment, even though current targets are in Latin America.</p>



<p>PromptSpy is not available on Google Play, and Google Play Protect now detects known variants.</p>



<p>This campaign follows ESET’s 2025 discovery of PromptLock, an AI-powered ransomware prototype, highlighting the growing use of generative AI in malware operations.</p>



<h2 class="wp-block-heading" id="h-iocs"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th><strong>SHA-1</strong></th><th><strong>Filename</strong></th><th><strong>Detection</strong></th><th><strong>Description</strong></th></tr></thead><tbody><tr><td>6BBC9AB132BA066F63676E05DA13D108598BC29B</td><td>net.ustexas.myavlive.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>375D7423E63C8F5F2CC814E8CFE697BA25168AFA</td><td>nlll4.un7o6.q38l5.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>3978AC5CD14E357320E127D6C87F10CB70A1DCC2</td><td>ppyzz.dpk0p.ln441.apk</td><td>Android/Spy.VNCSpy.A</td><td>Android VNCSpy malware.</td></tr><tr><td>E60D12017D2DA579DF87368F5596A0244621AE86</td><td>mgappc-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>9B1723284E311794987997CB7E8814EB6014713F</td><td>mgappm-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>076801BD9C6EB78FC0331A4C7A22C73199CC3824</td><td>mgappn-0.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>8364730E9BB2CF3A4B016DE1B34F38341C0EE2FA</td><td>mgappn-1.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy dropper.</td></tr><tr><td>F8F4C5BC498BCCE907DC975DD88BE8D594629909</td><td>app-release.apk</td><td>Android/Spy.PromptSpy.A</td><td>Android PromptSpy.</td></tr><tr><td>C14E9B062ED28115EDE096788F62B47A6ED841AC</td><td>mgapp.apk</td><td>Android/Phishing.Agent.M</td><td>Android phishing malware.</td></tr></tbody></table></figure>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/promptspy/">PromptSpy: Android Malware Uses Google Gemini AI</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/promptspy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
