<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 01 May 2026 18:39:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>EtherRAT Attack Targets Enterprise Admins</title>
		<link>https://firsthackersnews.com/etherrat-attack/</link>
					<comments>https://firsthackersnews.com/etherrat-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 01 May 2026 18:28:07 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BlueTeam]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EtherRAT]]></category>
		<category><![CDATA[#GitHubAbuse]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#RAT]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SEOpoisoning]]></category>
		<category><![CDATA[#SOC]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11676</guid>

					<description><![CDATA[<p>A newly identified campaign called EtherRAT is targeting enterprise environments by combining SEO manipulation, GitHub abuse, and blockchain-based</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/etherrat-attack/">EtherRAT Attack Targets Enterprise Admins</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified campaign called <strong>EtherRAT</strong> is targeting enterprise environments by combining SEO manipulation, GitHub abuse, and blockchain-based infrastructure. Instead of going after random users, attackers are focusing on IT professionals who already have elevated access.</p>



<p>This activity was uncovered by the Atos Threat Research Center in early 2026. The goal is clear—compromise high-privilege users and gain direct access to critical systems.</p>



<h2 class="wp-block-heading"><strong>How the Attack Starts</strong></h2>



<p>The attack begins with SEO poisoning across search engines like Bing, Yahoo, DuckDuckGo, and Yandex.</p>



<p>Attackers push fake GitHub repositories to the top of search results for queries related to popular admin tools. These repositories look legitimate and contain detailed documentation, but they don’t host malware directly.</p>



<p>The infection flow works like this:</p>



<ul class="wp-block-list">
<li>Fake GitHub repo acts as a trusted storefront</li>



<li>README links redirect users to another repository</li>



<li>Second repo hosts a malicious MSI installer</li>



<li>Payload is executed on the victim system</li>
</ul>



<p>This two-step setup helps attackers stay active even if one repository is removed.</p>



<h2 class="wp-block-heading"><strong>Targeting High-Privilege Users</strong></h2>



<p>The campaign specifically mimics well-known administrative tools such as PsExec, AzCopy, Sysmon, LAPS, and WinDbg. These tools are typically used by administrators, DevOps teams, and security analysts.</p>



<p>This approach acts as a filtering mechanism:</p>



<ul class="wp-block-list">
<li>Only users searching for these tools are targeted</li>



<li>Most victims already have elevated privileges</li>



<li>A successful infection gives immediate high-level access</li>
</ul>



<p>By abusing trust in commonly used tools, attackers increase the chances of execution without suspicion.</p>



<h2 class="wp-block-heading"><strong>Malware Behavior and Execution</strong></h2>



<p>Once the malicious installer runs, a multi-stage RAT is deployed using JavaScript and fileless techniques.</p>



<p>The behavior includes:</p>



<ul class="wp-block-list">
<li>Obfuscated scripts install Node.js and trigger execution</li>



<li>Payloads are decrypted in memory using AES-256</li>



<li>Persistence is created through Windows Registry Run keys</li>



<li>Malware runs under legitimate processes like conhost.exe</li>



<li>Continuous communication with attacker infrastructure</li>
</ul>



<p>The RAT allows attackers to execute commands, monitor systems, and extract sensitive data without obvious signs.</p>



<h2 class="wp-block-heading"><strong>Blockchain-Based Command and Control</strong></h2>



<p>One of the most unique aspects of EtherRAT is its use of blockchain for command-and-control.</p>



<p>Instead of fixed servers, the malware retrieves its C2 address from the Ethereum network. This makes it extremely difficult to block or disrupt.</p>



<p>Key advantages for attackers:</p>



<ul class="wp-block-list">
<li>No fixed IP or domain to blacklist</li>



<li>C2 can be updated instantly via blockchain transactions</li>
</ul>



<p>Because public blockchain infrastructure is widely accessible, traditional takedown strategies become ineffective.</p>



<h2 class="wp-block-heading"><strong>Ongoing Activity and Threat Impact</strong></h2>



<p>Researchers observed at least 40+ malicious GitHub repositories over several months, showing this is not a one-time campaign but an ongoing operation.</p>



<p>There are also similarities with techniques used by groups like Lazarus Group and MuddyWater, though attribution is still being analyzed.</p>



<p>Unlike typical large-scale malware campaigns, EtherRAT focuses on stealth and persistence. After initial access, attackers perform quiet reconnaissance instead of immediate disruptive actions.</p>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>This campaign highlights a shift in cyber threats:</p>



<ul class="wp-block-list">
<li>Attackers target fewer users but with higher value</li>



<li>Legitimate platforms like GitHub are used to build trust</li>



<li>Decentralized technologies like blockchain increase resilience</li>
</ul>



<p>Organizations should verify software sources, limit administrative privileges, and monitor unusual outbound traffic—especially connections to blockchain services.</p>



<p>EtherRAT shows how modern attackers are blending trusted platforms with advanced techniques to create highly targeted and durable threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/etherrat-attack/">EtherRAT Attack Targets Enterprise Admins</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/etherrat-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Android Spyware Platform Enables Resale</title>
		<link>https://firsthackersnews.com/android-spyware-platform/</link>
					<comments>https://firsthackersnews.com/android-spyware-platform/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 01 May 2026 17:36:53 +0000</pubDate>
				<category><![CDATA[Android malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[spyware]]></category>
		<category><![CDATA[#AndroidSecurity]]></category>
		<category><![CDATA[#AndroidSpyware]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MobileSecurity]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#Spyware]]></category>
		<category><![CDATA[#Stalkerware]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11672</guid>

					<description><![CDATA[<p>A newly uncovered Android spyware platform is changing how surveillance malware spreads. Instead of being a single tool,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-spyware-platform/">Android Spyware Platform Enables Resale</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly uncovered Android spyware platform is changing how surveillance malware spreads. Instead of being a single tool, it works like a service that anyone can subscribe to, customize, and sell under their own name.</p>



<p>Researchers at Certo identified a spyware tool called <em>KidsProtect</em>, which presents itself as a parental monitoring app. This is a common disguise in the stalkerware space, where intrusive tracking features are marketed as safety tools.</p>



<p>But the reality is different. The platform is openly promoted in hacking communities with claims of stealth and stability, clearly targeting covert surveillance use rather than legitimate parental control.</p>



<p>Through a web dashboard, operators can monitor a device remotely with capabilities that go far beyond basic tracking. This includes listening to calls, accessing messages, tracking live location, and even capturing keystrokes—all without the victim’s knowledge.</p>



<h2 class="wp-block-heading">Deep Device Control and Evasion Tactics</h2>



<p>Once installed, the spyware runs silently in the background and gives attackers near-total visibility into the device.</p>



<p>Key functions include:</p>



<ul class="wp-block-list">
<li>Live microphone access and call recording</li>



<li>Real-time GPS tracking</li>



<li>Reading SMS and app messages (including WhatsApp and Telegram)</li>



<li>Keystroke logging for capturing passwords</li>



<li>Remote access to cameras</li>



<li>Monitoring screen activity in real time</li>
</ul>



<p>To achieve this level of control, the app abuses sensitive Android permissions such as access to location, microphone, camera, and storage. One of the most critical features it exploits is the Accessibility Service, which allows it to read screen content and interact with other apps—making real-time surveillance possible.</p>



<p>The spyware is also built to stay hidden and resist removal. It disguises itself as a system-like app (for example, “WiFi Service”), registers as a Device Administrator, and includes anti-uninstall protection. Even after a device restart, it automatically relaunches using a BootReceiver component.</p>



<p>Victims are often tricked into disabling built-in protections like Google Play Protect, allowing the malware to operate freely without interruption.</p>



<h2 class="wp-block-heading">A Growing Threat Through White-Label Resale</h2>



<p>What makes this platform especially dangerous is its white-label model. Buyers can rebrand the spyware, set their own pricing, and distribute it as if it were their own product. This turns malware into a scalable business model rather than a single tool.</p>



<p>With entry costs starting relatively low, even non-technical users can launch their own spyware operation. This lowers the barrier to entry and allows the ecosystem to grow quickly, even when authorities shut down known stalkerware providers.</p>



<p>The spyware operates under package names like <em>com.example.parentguard</em> and supports Android devices from version 7 onwards. It also allows unencrypted (cleartext) traffic, increasing the risk of data exposure.</p>



<p>Overall, this platform shows how stalkerware is evolving—from isolated tools into commercialized services that enable widespread surveillance with minimal effort.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/android-spyware-platform/">Android Spyware Platform Enables Resale</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/android-spyware-platform/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lazarus Delivers “Mach-O Man” macOS Malware via ClickFix</title>
		<link>https://firsthackersnews.com/lazarus-macos-malware/</link>
					<comments>https://firsthackersnews.com/lazarus-macos-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 07:17:56 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Linux Malware]]></category>
		<category><![CDATA[MacOS]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BlueTeam]]></category>
		<category><![CDATA[#ClickFix]]></category>
		<category><![CDATA[#CodesignBypass]]></category>
		<category><![CDATA[#EDR]]></category>
		<category><![CDATA[#Infostealer]]></category>
		<category><![CDATA[#KeychainAttack]]></category>
		<category><![CDATA[#LaunchAgent]]></category>
		<category><![CDATA[#MachOMan]]></category>
		<category><![CDATA[#macOSSecurity]]></category>
		<category><![CDATA[#SOC]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11667</guid>

					<description><![CDATA[<p>The Lazarus Group is actively using ClickFix-style social engineering to deploy a new macOS malware framework called “Mach-O</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lazarus-macos-malware/">Lazarus Delivers “Mach-O Man” macOS Malware via ClickFix</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Lazarus Group is actively using ClickFix-style social engineering to deploy a new macOS malware framework called “Mach-O Man.” Instead of exploiting vulnerabilities, the attack relies on user interaction, making it highly effective against modern defenses.</p>



<p>This activity has been closely analyzed by Mauro Eldritch, who has documented how this campaign is impacting high-value macOS users, especially in fintech and crypto sectors.</p>



<h2 class="wp-block-heading"><strong>Initial Access and Social Engineering Flow</strong></h2>



<p>The attack typically begins with targeted outreach on Telegram, where threat actors impersonate trusted contacts such as colleagues or business partners. Victims—often executives or developers—receive urgent meeting requests designed to trigger quick action.</p>



<p>They are then redirected to phishing pages that closely resemble platforms like Zoom, Microsoft Teams, or Google Meet. These pages claim a technical issue and instruct the user to fix it manually.</p>



<p>Instead of a traditional exploit, the victim is guided to copy and execute a Terminal command. Because this action is user-initiated, many security tools interpret it as legitimate behavior.</p>



<h2 class="wp-block-heading"><strong>Execution Chain and Malware Behavior</strong></h2>



<p>Once the command is executed, the infection chain unfolds in multiple stages designed to blend in with normal macOS activity.</p>



<figure class="wp-block-image size-full is-resized"><img fetchpriority="high" decoding="async" width="1024" height="527" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-4.png" alt="" class="wp-image-11668" style="aspect-ratio:1.943129509320623;width:823px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-4-300x154.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-4-768x395.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-4.png 1024w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Complete malware kit showing all components and variants (Source: ANY.RUN).<br></figcaption></figure>



<ul class="wp-block-list">
<li>The first-stage binary (commonly seen as <em>teamsSDK.bin</em>) acts as a downloader that retrieves additional components</li>



<li>Fake macOS applications are dropped, mimicking meeting tools or system prompts to appear legitimate</li>



<li>These apps repeatedly request user passwords, often using poorly written prompts to trick the victim</li>



<li>A secondary module (such as <em>D1YrHRTg.bin</em>) performs deep system profiling using native tools like sysctl</li>
</ul>



<p>The profiling stage gathers extensive system intelligence, including host identifiers, operating system details, running processes, network configuration, and browser-related data from Chrome, Safari, Brave, and similar applications.</p>



<p>Interestingly, researchers observed flaws in parts of the malware. Some profiling components enter continuous loops, repeatedly sending the same data to command-and-control infrastructure, which can cause noticeable performance issues on infected machines.</p>



<p>To avoid execution barriers, the malware leverages macOS utilities like codesign to apply ad-hoc signatures, helping malicious binaries run under standard policies without raising immediate suspicion.</p>



<h2 class="wp-block-heading">Credential Theft and Data Exfiltration</h2>



<p>The final stage of the attack is handled by a stealer component referred to as <em>macrasv2</em>. This module focuses on extracting high-value data from the compromised system.</p>



<p>Targets include:</p>



<ul class="wp-block-list">
<li>Browser-stored credentials and active session cookies</li>



<li>macOS Keychain entries containing saved secrets</li>



<li>Files that can grant access to SaaS platforms, internal systems, or crypto wallets</li>
</ul>



<p>All collected data is compressed into archive files (for example, <em>user_ext.zip</em>) and exfiltrated to attacker-controlled servers.</p>



<h2 class="wp-block-heading">Persistence Mechanism</h2>



<p>To maintain long-term access, additional components like <em>minst2.bin</em> are deployed. These create persistence by placing disguised binaries—often pretending to be legitimate services like OneDrive—inside directories labeled as security-related (such as an “Antivirus Service” folder).</p>



<p>The malware then registers itself as a LaunchAgent, ensuring execution every time the user logs in.</p>



<h2 class="wp-block-heading">Why This Campaign Is Effective</h2>



<p>This attack stands out because it avoids traditional exploitation techniques. By relying on user-executed commands and built-in macOS tools, the activity appears normal to many EDR solutions until after credentials and access tokens are already compromised.</p>



<p>For organizations where macOS devices are widely used—especially among developers and leadership—this creates a serious risk. A single compromised system can lead to broader access across internal infrastructure and financial assets.</p>



<h2 class="wp-block-heading">Detection and Defensive Considerations</h2>



<p>To counter this type of campaign, defenders need to shift focus toward behavior rather than just exploits.</p>



<ul class="wp-block-list">
<li>Monitor unusual Terminal activity and command execution patterns</li>



<li>Identify and block ClickFix-style phishing workflows</li>



<li>Regularly audit LaunchAgents for suspicious or disguised entries</li>



<li>Track outbound connections to uncommon ports or Telegram-related infrastructure</li>



<li>Use sandbox environments like ANY.RUN to safely analyze suspicious files, URLs, and execution chains</li>
</ul>



<p>Interactive sandboxing plays a key role in understanding how these multi-stage attacks operate, allowing defenders to reconstruct the full infection path and extract indicators for detection.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lazarus-macos-malware/">Lazarus Delivers “Mach-O Man” macOS Malware via ClickFix</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/lazarus-macos-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SonicWall Flaw Allows Access Bypass and Firewall Crash</title>
		<link>https://firsthackersnews.com/sonicwall-security-flaw/</link>
					<comments>https://firsthackersnews.com/sonicwall-security-flaw/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 07:01:08 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#FirewallSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#SecurityFlaw]]></category>
		<category><![CDATA[#SecurityRisk]]></category>
		<category><![CDATA[#SonicOS]]></category>
		<category><![CDATA[#SonicWall]]></category>
		<category><![CDATA[#Vulnerability]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[sonicwall]]></category>
		<category><![CDATA[SonicWall Firewall]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11663</guid>

					<description><![CDATA[<p>SonicWall has disclosed multiple security issues in its SonicOS software that could impact firewall security and availability. These</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sonicwall-security-flaw/">SonicWall Flaw Allows Access Bypass and Firewall Crash</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>SonicWall has disclosed multiple security issues in its SonicOS software that could impact firewall security and availability. These vulnerabilities, revealed in a recent advisory, could allow attackers to bypass access controls, access restricted areas, and even crash firewall systems.</p>



<p>While some of these issues require prior access or valid credentials, the overall risk remains significant—especially for organizations relying heavily on SonicWall firewalls to protect their networks. Immediate attention and updates are strongly recommended.</p>



<h2 class="wp-block-heading"><strong>Major Security Risks Identified</strong></h2>



<p>The most serious issue involves a flaw in how access controls are handled. Under certain conditions, an attacker on a nearby network could bypass normal authentication checks and gain access to sensitive management functions.</p>



<p>This type of access can be highly dangerous. If exploited, attackers may be able to:</p>



<ul class="wp-block-list">
<li>Change firewall rules</li>



<li>Disable security protections</li>



<li>Modify system configurations</li>
</ul>



<p>In addition to this, two other vulnerabilities affect users who already have access to the system. One allows attackers to move outside restricted directories and interact with protected services, while another can overload the system and force the firewall to crash.</p>



<h2 class="wp-block-heading"><strong>Breakdown of the Vulnerabilities</strong></h2>



<p>The advisory highlights three key issues that administrators should be aware of:</p>



<ul class="wp-block-list">
<li><strong>Access control bypass flaw</strong> – Allows unauthorized access to management functions from adjacent networks</li>



<li><strong>Path traversal issue</strong> – Lets authenticated users reach restricted system areas</li>



<li><strong>Buffer overflow vulnerability</strong> – Can be used to crash the firewall and disrupt operations</li>
</ul>



<p>Each of these issues presents a different level of risk, but together they create a serious security concern for affected systems.</p>



<h2 class="wp-block-heading"><strong>What Organizations Should Do</strong></h2>



<p>SonicWall has provided fixes and recommended actions to reduce the risk. Organizations using SonicOS should review the advisory and apply updates as soon as possible.</p>



<p>Delaying patches could leave systems exposed to attacks that impact both security and uptime. Ensuring that firewall software is up to date is critical to maintaining a strong defense.</p>



<p>These vulnerabilities highlight how even core security systems like firewalls can become targets. A single flaw can lead to access bypass or service disruption, affecting the entire network.</p>



<p>Staying updated, applying patches quickly, and monitoring systems closely remain essential steps in preventing such risks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/sonicwall-security-flaw/">SonicWall Flaw Allows Access Bypass and Firewall Crash</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/sonicwall-security-flaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WhatsApp Tests Safer Cloud Backup for Messages</title>
		<link>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/</link>
					<comments>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 19:17:49 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CloudBackup]]></category>
		<category><![CDATA[#CloudStorage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataPrivacy]]></category>
		<category><![CDATA[#EncryptedBackup]]></category>
		<category><![CDATA[#EndToEndEncryption]]></category>
		<category><![CDATA[#MessagingSecurity]]></category>
		<category><![CDATA[#PrivacyProtection]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#WhatsApp]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11658</guid>

					<description><![CDATA[<p>WhatsApp is developing a new cloud backup system that shifts away from relying entirely on third-party services like</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/">WhatsApp Tests Safer Cloud Backup for Messages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>WhatsApp is developing a new cloud backup system that shifts away from relying entirely on third-party services like Google Drive and iCloud. The idea is to bring backup storage under its own control, giving users a more secure and dedicated space for their chats, media, and files.</p>



<p>With this approach, users will no longer have to depend on shared cloud storage limits. Instead, WhatsApp aims to provide its own storage environment specifically built for messaging data. This is especially important as chat backups today include large files like high-resolution images, videos, and voice notes, which quickly consume available space.</p>



<p>All data stored in this system will be protected with end-to-end encryption by default. This means that messages remain private, and even WhatsApp itself cannot access the content. By keeping backups encrypted at all times, the platform is aiming to reduce the risk of unauthorized access or data exposure.</p>



<h2 class="wp-block-heading">Enhanced Security with Passkeys</h2>



<p>To strengthen protection further, WhatsApp is planning to introduce passkey-based authentication for backup access. Instead of using traditional passwords or long encryption keys, users will be able to unlock their backups using biometric methods such as fingerprint or facial recognition.</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" width="1024" height="754" src="https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-1024x754.png" alt="" class="wp-image-11659" style="aspect-ratio:1.3581289218482602;width:798px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-300x221.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-768x566.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3-1024x754.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/04/image-3.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">WhatsApp Backup Storage Limits Overview (Source: WABetaInfo)</figcaption></figure>



<p>This makes the process both simpler and more secure. The authentication is tied directly to the user’s device, which reduces the risk of attacks like phishing, credential theft, or brute-force attempts. The passkey is securely stored and can sync across trusted devices, allowing users to restore backups without needing to remember complex credentials.</p>



<p>At the same time, WhatsApp is expected to keep alternative options available. Users who prefer using passwords or encryption keys will still have that choice, ensuring flexibility for different security preferences.</p>



<h2 class="wp-block-heading">Storage Options and Rollout Plans</h2>



<p>The upcoming system is also expected to introduce dedicated storage plans for backups. Early expectations suggest a small free storage tier for basic use, along with larger paid options for users who need more capacity. This would allow users to manage their backup storage without affecting their personal cloud accounts.</p>



<p>Despite this shift, WhatsApp is likely to continue supporting third-party backups for users who prefer their current setup. This ensures a smoother transition without forcing immediate changes.</p>



<p>The feature is still in development and has not yet been released publicly. It is expected to go through multiple testing phases to ensure stability, security, and compatibility with existing systems before a wider rollout begins.</p>



<p>This move reflects a broader industry trend toward building self-contained ecosystems that prioritize privacy, security, and better control over user data, rather than relying entirely on external platforms.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/">WhatsApp Tests Safer Cloud Backup for Messages</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/whatsapp-encrypted-cloud-backup/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Checkmarx Breach: GitHub Repository Exposure Confirmed</title>
		<link>https://firsthackersnews.com/checkmarx-breach/</link>
					<comments>https://firsthackersnews.com/checkmarx-breach/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 28 Apr 2026 14:00:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exploitation]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#ApplicationSecurity]]></category>
		<category><![CDATA[#Checkmarx]]></category>
		<category><![CDATA[#CheckmarxBreach]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#DataLeak]]></category>
		<category><![CDATA[#GitHub]]></category>
		<category><![CDATA[#GitHubExposure]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#securityincident]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11652</guid>

					<description><![CDATA[<p>Application security company Checkmarx has confirmed a recent security incident involving exposure of an internal GitHub repository related</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/checkmarx-breach/">Checkmarx Breach: GitHub Repository Exposure Confirmed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Application security company Checkmarx has confirmed a recent security incident involving exposure of an internal GitHub repository related to the Checkmarx breach.</p>



<p>The issue came to light after data linked to the company appeared on dark web forums. Initial findings suggest that attackers were able to access the repository following an earlier breach involving the Checkmarx breach that impacted the company weeks before.</p>



<p>This shows how cyber attacks don’t always end with the first compromise. In many cases, attackers return later to extract more data or expand their access.</p>



<h2 class="wp-block-heading"><strong>What Happened</strong></h2>



<p>The incident appears to be connected to a previous supply chain attack that occurred in March 2026. Attackers likely used that initial access to move deeper into internal systems and eventually reach the GitHub repository.</p>



<p>Weeks later, some of that data was leaked publicly, bringing the incident into focus. This highlights a common pattern in modern attacks—<strong>initial access followed by delayed exploitation</strong>.</p>



<h2 class="wp-block-heading"><strong>Impact on Customers</strong></h2>



<p>Despite the seriousness of the situation, Checkmarx has stated that customer environments are not directly affected. The exposed repository was separate from production systems, and company policies do not allow customer data to be stored in such repositories.</p>



<p>Key points include:</p>



<ul class="wp-block-list">
<li>The affected repository is not connected to live customer systems</li>



<li>Customer data is not stored in the exposed environment</li>



<li>Ongoing analysis is being conducted to confirm what data was leaked</li>
</ul>



<p>The company has also stated that it will notify customers immediately if any sensitive information is found during the investigation.</p>



<h2 class="wp-block-heading"><strong>Investigation and Ongoing Analysis</strong></h2>



<p>Checkmarx is working with external forensic experts to understand the full scope of the breach. The investigation is focused on identifying what data was accessed, how attackers moved within the environment, and whether any additional systems were affected.</p>



<p>Security teams are also analyzing the leaked data to verify its contents and assess any potential risks.</p>



<h2 class="wp-block-heading"><strong>Response and Containment Measures</strong></h2>



<p>To control the situation, the company has taken immediate steps to secure its systems. Access to the affected GitHub repository has been restricted, and internal security teams are closely monitoring for any further suspicious activity.</p>



<p>These actions are aimed at preventing additional exposure and supporting the ongoing forensic investigation.</p>



<h2 class="wp-block-heading"><strong>What Organizations Should Do</strong></h2>



<p>Organizations using Checkmarx solutions are advised to stay updated through official communications. While there is no confirmed impact on customers, it is important to remain cautious and informed.</p>



<p>Security teams should review any updates provided by the company and reach out through official support channels if they have concerns or require clarification.</p>



<p>This incident highlights how supply chain attacks can evolve over time. Even after the initial breach is contained, attackers may still have access that can be used later.</p>



<p>It also reinforces the importance of separating development environments from production systems, as this can significantly reduce the impact of such exposures.</p>



<p>In today’s threat landscape, a single breach is rarely the end—it is often just the beginning of a longer attack chain.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/checkmarx-breach/">Checkmarx Breach: GitHub Repository Exposure Confirmed</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/checkmarx-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Multi Stage Malware Attack Uses Obfuscation to Evade Detection</title>
		<link>https://firsthackersnews.com/multi-stage-malware-attack/</link>
					<comments>https://firsthackersnews.com/multi-stage-malware-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 15:30:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malicious extension]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11647</guid>

					<description><![CDATA[<p>Security researchers have identified a new malware campaign that uses advanced hiding techniques and multi-stage payloads to avoid</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/multi-stage-malware-attack/">Multi Stage Malware Attack Uses Obfuscation to Evade Detection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have identified a new malware campaign that uses advanced hiding techniques and multi-stage payloads to avoid detection. Instead of launching a direct attack, the malware spreads in stages, making it harder for traditional security tools to detect and block it. This approach is characterized as a multi stage malware attack.</p>



<p>The attack starts with a targeted phishing email sent to specific organizations, particularly government-related entities. The email is designed to look legitimate, pretending to come from an internal consultant and referencing a real-looking project to gain trust.</p>



<p>To make the message more convincing, it is marked as urgent and includes a request for a read receipt. This increases the chances that the recipient will open the attachments without suspicion.</p>



<p>This multi stage malware attack poses serious threats to organizations, as its multi-layered nature complicates detection and remediation efforts.</p>



<p>The email contains two files with slightly misspelled names to appear like quick internal documents:</p>



<ul class="wp-block-list">
<li>A Word file pretending to be a report</li>



<li>A PDF file that looks like an official document</li>
</ul>



<p>These small tricks are used to make the attack look normal and believable.</p>



<h2 class="wp-block-heading">How the Multi-Stage Attack Works</h2>



<p>The infection process is carefully designed and happens in multiple steps. This layered approach helps the malware stay hidden during each stage.</p>



<p>When the Word file is opened, it asks the user to enable macros. If the user allows it, hidden code runs in the background and downloads a malicious file from an external server. This technique helps bypass basic security checks.</p>



<p>At the same time, the PDF file acts as another attack path. It shows a fake error message asking the user to update their PDF reader. If the user clicks the prompt, it downloads another malicious file disguised as a legitimate application.</p>



<p>Once installed, the malware:</p>



<ul class="wp-block-list">
<li>Connects to remote servers using trusted services</li>



<li>Uses tools like developer tunnels to maintain access</li>



<li>Sends stolen data through platforms like Discord</li>



<li>Executes commands on the infected system</li>
</ul>



<p>By using legitimate platforms, the malware blends in with normal network traffic, making it difficult to detect.</p>



<h2 class="wp-block-heading">Evasion Techniques and Why It’s Dangerous</h2>



<p>This malware uses several techniques to avoid being detected by security systems. It checks for analysis environments, hides its code, and uses trusted services to carry out its activities.</p>



<p>Some of its key evasion methods include:</p>



<ul class="wp-block-list">
<li>Hiding malicious code inside compiled scripts</li>



<li>Using trusted cloud services for communication</li>



<li>Disguising files with familiar names and branding</li>



<li>Delivering payloads in stages instead of all at once</li>
</ul>



<p>Because of these methods, the malware can remain active for a long time without being noticed. It can steal data, monitor systems, and give attackers remote access.</p>



<p>This attack shows a growing trend where cybercriminals rely on trusted platforms and multi-step infections to bypass traditional defenses. Organizations should focus on monitoring behavior, restricting macros, and educating users to recognize suspicious emails.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/multi-stage-malware-attack/">Multi Stage Malware Attack Uses Obfuscation to Evade Detection</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/multi-stage-malware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GPT-5.5 Bio Bug Bounty Boosts AI Safety</title>
		<link>https://firsthackersnews.com/gpt-5-5-bio-bug-bounty/</link>
					<comments>https://firsthackersnews.com/gpt-5-5-bio-bug-bounty/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 03:00:30 +0000</pubDate>
				<category><![CDATA[AI Expansion]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AIBugBounty]]></category>
		<category><![CDATA[#AIResearch]]></category>
		<category><![CDATA[#AISafety]]></category>
		<category><![CDATA[#ArtificialIntelligence]]></category>
		<category><![CDATA[#BugBountyProgram]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#GPT5]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MachineLearning]]></category>
		<category><![CDATA[#OpenAI]]></category>
		<category><![CDATA[#SecurityTesting]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11643</guid>

					<description><![CDATA[<p>OpenAI has introduced a new bug bounty program focused on improving the safety of its GPT-5.5 model, especially</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gpt-5-5-bio-bug-bounty/">GPT-5.5 Bio Bug Bounty Boosts AI Safety</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>OpenAI has introduced a new bug bounty program focused on improving the safety of its GPT-5.5 model, especially in the area of biological risks. This initiative is part of the gpt 5.5 bio bug bounty effort to enhance AI safety.</p>



<p>As AI systems become more powerful, there is growing concern that they could be misused to generate harmful biological information. This could be exploited by advanced threat groups or individuals with malicious intent. To reduce these risks, OpenAI is inviting experts to test the model and find weaknesses before attackers do, as part of the gpt 5.5 bio bug bounty program.</p>



<p>The program brings together cybersecurity researchers, biosecurity specialists, and AI red teamers to identify vulnerabilities and improve the model’s safety controls.</p>



<h2 class="wp-block-heading"><strong>The Challenge: Finding a Universal Jailbreak</strong></h2>



<p>The main objective of this program is to discover a “universal jailbreak.” In simple terms, this means creating a single prompt that can bypass the model’s built-in safety protections.</p>



<p>Participants are asked to design one prompt that can successfully make the model answer a set of restricted biological questions. The challenge must be completed in a clean session without triggering any warnings or safety systems.</p>



<p>This requires a strong understanding of:</p>



<ul class="wp-block-list">
<li>Prompt engineering techniques</li>



<li>AI model behavior and responses</li>



<li>Handling sensitive biological queries</li>
</ul>



<p>The testing is limited to a controlled environment, ensuring that all experiments are conducted safely.</p>



<h2 class="wp-block-heading"><strong>Rewards and Timeline</strong></h2>



<p>Because this is a complex and high-risk challenge, OpenAI is offering significant rewards for successful findings.</p>



<p>Key details include:</p>



<ul class="wp-block-list">
<li>A top reward of $25,000 for the first complete successful jailbreak</li>



<li>Additional rewards for partial findings that provide useful insights</li>



<li>Applications open until June 22, 2026</li>



<li>Testing runs from April 28 to July 27, 2026</li>
</ul>



<p>The structured timeline ensures that researchers have enough time to test while maintaining controlled access.</p>



<h2 class="wp-block-heading"><strong>Who Can Participate</strong></h2>



<p>Access to the program is restricted to ensure responsible testing and prevent misuse of sensitive information.</p>



<p>To participate:</p>



<ul class="wp-block-list">
<li>Researchers must apply with relevant experience in AI or biology</li>



<li>Selected participants may receive direct invitations</li>



<li>An active ChatGPT account is required</li>



<li>All participants must sign a Non-Disclosure Agreement (NDA)</li>
</ul>



<p>This ensures that all findings remain confidential and are handled responsibly.</p>



<h2 class="wp-block-heading"><strong>Why This Program Matters</strong></h2>



<p>This initiative highlights the growing importance of securing advanced AI systems. As models become more capable, the risks also increase, especially in sensitive areas like biology.</p>



<p>By working with experts and encouraging responsible testing, OpenAI aims to strengthen its safety systems and prevent potential misuse. This approach helps build more secure and reliable AI technologies for the future.</p>



<p>At the same time, it shows how collaboration between researchers and organizations is essential to stay ahead of emerging threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gpt-5-5-bio-bug-bounty/">GPT-5.5 Bio Bug Bounty Boosts AI Safety</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gpt-5-5-bio-bug-bounty/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Hide GoGra Backdoor in Outlook Mailboxes</title>
		<link>https://firsthackersnews.com/outlook-mailbox-malware/</link>
					<comments>https://firsthackersnews.com/outlook-mailbox-malware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 20:32:55 +0000</pubDate>
				<category><![CDATA[Backdoor]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Linux Malware]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#APT]]></category>
		<category><![CDATA[#Backdoor]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#datasecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#GoGra]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MicrosoftSecurity]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<category><![CDATA[#OutlookMalware]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11637</guid>

					<description><![CDATA[<p>A nation-state–linked threat group known as Harvester has developed a more advanced way to hide its malicious activity</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/outlook-mailbox-malware/">Hackers Hide GoGra Backdoor in Outlook Mailboxes</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A nation-state–linked threat group known as Harvester has developed a more advanced way to hide its malicious activity by using Microsoft Outlook as part of its attack infrastructure. Instead of relying on traditional command-and-control servers, the attackers are now sending instructions through real Outlook mailboxes, making the activity appear legitimate and much harder to detect.</p>



<p>This campaign involves a Linux version of the GoGra backdoor, showing that the group is expanding beyond its earlier Windows-based operations. By using trusted cloud services, the malware blends into normal network traffic, allowing it to bypass many standard security tools that typically look for suspicious external connections.</p>



<p>The attack appears to focus on espionage rather than financial gain. Evidence suggests that targets are mainly located in South Asia, with attackers using region-specific document names to make their phishing attempts more convincing. This level of targeting shows a carefully planned and strategic operation.</p>



<h2 class="wp-block-heading">Outlook Mailbox Malware Explained</h2>



<p>The attackers gain access through social engineering, tricking users into opening files that appear harmless. These files are often disguised as official documents, but they actually contain hidden malicious code.</p>



<p>Once the file is opened, the malware quietly installs itself in the background. It avoids drawing attention while setting up persistence, ensuring it can continue running even after the system is restarted.</p>



<p>Some key characteristics of the infection process include:</p>



<ul class="wp-block-list">
<li>Disguised files that look like PDFs or official documents</li>



<li>Malware hidden inside Linux executable files</li>



<li>Silent installation without visible signs</li>



<li>Persistence mechanisms that allow it to survive reboots</li>
</ul>



<p>This approach makes it difficult for users to realize they have been infected until much later.</p>



<h2 class="wp-block-heading">How the Backdoor Uses Microsoft Infrastructure</h2>



<p>What makes this attack particularly sophisticated is how it uses Microsoft’s own services as a communication channel. Instead of connecting to suspicious servers, the malware interacts with legitimate cloud infrastructure, which helps it stay hidden.</p>



<p>After installation, the backdoor uses Microsoft APIs to communicate with a real Outlook mailbox. It regularly checks for new messages that contain instructions from the attacker. These commands are processed on the infected system, and the results are sent back through email responses.</p>



<p>The malware is designed to clean up after itself, deleting messages once they are used. This reduces traces of the attack and makes forensic investigation more difficult.</p>



<p>The main capabilities of the backdoor include:</p>



<ul class="wp-block-list">
<li>Receiving commands through Outlook mailbox messages</li>



<li>Executing those commands on the infected machine</li>



<li>Sending results back via email</li>



<li>Removing evidence after communication</li>
</ul>



<p>Because all of this happens through trusted services, the activity can easily go unnoticed in normal network monitoring.</p>



<h2 class="wp-block-heading">Why This Attack Is Concerning</h2>



<p>This campaign highlights a growing trend where attackers abuse legitimate platforms to hide their operations. By using trusted services like Microsoft’s cloud, they can bypass many traditional defenses that rely on detecting suspicious traffic.</p>



<p>The impact of such an attack can be serious. Attackers may gain long-term access to systems, collect sensitive data, and monitor user activity without being detected. Since the malware operates quietly and removes traces of its actions, it can remain active for extended periods.</p>



<p>This also shows how threat actors are evolving their techniques, moving toward more stealthy and persistent methods. Organizations can no longer rely only on basic perimeter defenses and must adopt more advanced monitoring strategies.</p>



<p>To reduce risk, security teams should pay close attention to unusual system behavior, unexpected background services, and abnormal use of cloud APIs. Monitoring activity from endpoints that do not typically interact with such services can help identify potential threats early.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/outlook-mailbox-malware/">Hackers Hide GoGra Backdoor in Outlook Mailboxes</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/outlook-mailbox-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Teams Boosts Performance on Low-End Devices</title>
		<link>https://firsthackersnews.com/microsoft-teams-efficiency-mode/</link>
					<comments>https://firsthackersnews.com/microsoft-teams-efficiency-mode/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 19:48:20 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[#CollaborationTools]]></category>
		<category><![CDATA[#DigitalWorkplace]]></category>
		<category><![CDATA[#EfficiencyMode]]></category>
		<category><![CDATA[#MicrosoftTeams]]></category>
		<category><![CDATA[#PerformanceOptimization]]></category>
		<category><![CDATA[#Productivity]]></category>
		<category><![CDATA[#SoftwareUpdate]]></category>
		<category><![CDATA[#TeamsUpdate]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#WorkplaceTech]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11631</guid>

					<description><![CDATA[<p>Microsoft is rolling out a new feature called Efficiency Mode in Microsoft Teams to improve performance, especially on</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-efficiency-mode/">Microsoft Teams Boosts Performance on Low-End Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft is rolling out a new feature called Efficiency Mode in Microsoft Teams to improve performance, especially on devices with limited hardware resources.</p>



<p>Many users experience slow performance during meetings or while switching between chats, particularly on older laptops or systems with low memory. This new mode is designed to solve that problem by making Teams smarter about how it uses system resources. The rollout is expected to begin in early May 2026 and will gradually reach users worldwide by mid-May.</p>



<p>Instead of applying the same performance settings to every device, Teams will now adapt based on the hardware it is running on. This means users with lower-end devices can still have a smooth experience without needing upgrades.</p>



<h2 class="wp-block-heading"><strong>How Efficiency Mode Works</strong></h2>



<p>When Efficiency Mode is active, Teams automatically adjusts its behavior to reduce strain on the system. These changes happen in the background without requiring user input.</p>



<p>Some of the key improvements include:</p>



<ul class="wp-block-list">
<li>Video quality is dynamically lowered during meetings to reduce CPU and bandwidth usage while still maintaining clear communication</li>



<li>The app launches faster by avoiding heavy initial loading, showing a simpler interface instead of opening a chat window immediately</li>



<li>Background processes are minimized to prevent unnecessary memory and CPU consumption</li>



<li>A visual indicator appears in the app so users know when Efficiency Mode is active</li>
</ul>



<p>These adjustments help reduce lag, improve responsiveness, and make meetings more stable, especially when multiple apps are running at the same time.</p>



<h2 class="wp-block-heading"><strong>Automatic Enablement and User Control</strong></h2>



<p>Efficiency Mode is automatically enabled on devices that are likely to benefit from it. This ensures users get better performance without needing to change any settings.</p>



<p>However, Microsoft also gives users full control. If someone prefers the standard experience with full visuals and higher resource usage, they can disable Efficiency Mode in the settings. This flexibility allows users to choose between performance and full feature usage based on their needs.</p>



<p>Importantly, Microsoft has confirmed that this feature does not affect compliance, privacy, or security settings, making it safe for both personal and enterprise use.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>What IT Teams Should Know</strong></h2>



<p>For organizations, this update is relatively simple to manage. Since the feature is enabled automatically, most environments will not require configuration changes.</p>



<p>Still, IT teams should be aware of a few key points:</p>



<ul class="wp-block-list">
<li>Helpdesk teams should understand how the feature works to assist users with questions</li>



<li>Employees may need guidance on how to turn the feature on or off</li>



<li>Internal documentation may need updates to reflect the new behavior of Teams</li>



<li>Monitoring user feedback can help determine if the feature improves productivity</li>
</ul>



<p>By preparing ahead, organizations can ensure a smooth transition and better user experience.</p>



<h2 class="wp-block-heading"><strong>Why This Matters</strong></h2>



<p>Efficiency Mode is an important step in making Teams more accessible and reliable across different types of devices. Not all users have high-performance systems, and performance issues can disrupt communication and collaboration.</p>



<p>By optimizing how Teams uses CPU, memory, and network resources, Microsoft is improving usability without removing core features. This means more users can participate in meetings, collaborate effectively, and stay productive regardless of their device limitations.</p>



<p>In the long run, features like this help reduce the gap between high-end and low-end devices, making modern workplace tools more inclusive and efficient.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-efficiency-mode/">Microsoft Teams Boosts Performance on Low-End Devices</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-teams-efficiency-mode/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
